Feb 12 19:42:58.050392 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 12 19:42:58.050425 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 12 19:42:58.050442 kernel: BIOS-provided physical RAM map: Feb 12 19:42:58.050450 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 19:42:58.050460 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 19:42:58.050468 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 19:42:58.050479 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffd7fff] usable Feb 12 19:42:58.050489 kernel: BIOS-e820: [mem 0x000000007ffd8000-0x000000007fffffff] reserved Feb 12 19:42:58.050502 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 12 19:42:58.050512 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 19:42:58.050522 kernel: NX (Execute Disable) protection: active Feb 12 19:42:58.050531 kernel: SMBIOS 2.8 present. Feb 12 19:42:58.050540 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Feb 12 19:42:58.050550 kernel: Hypervisor detected: KVM Feb 12 19:42:58.050561 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 19:42:58.050571 kernel: kvm-clock: cpu 0, msr 6efaa001, primary cpu clock Feb 12 19:42:58.050599 kernel: kvm-clock: using sched offset of 4533538319 cycles Feb 12 19:42:58.050607 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 19:42:58.050614 kernel: tsc: Detected 2494.138 MHz processor Feb 12 19:42:58.050622 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 19:42:58.050629 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 19:42:58.050636 kernel: last_pfn = 0x7ffd8 max_arch_pfn = 0x400000000 Feb 12 19:42:58.050644 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 19:42:58.050654 kernel: ACPI: Early table checksum verification disabled Feb 12 19:42:58.050663 kernel: ACPI: RSDP 0x00000000000F5A50 000014 (v00 BOCHS ) Feb 12 19:42:58.050673 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:42:58.050683 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:42:58.050692 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:42:58.050702 kernel: ACPI: FACS 0x000000007FFE0000 000040 Feb 12 19:42:58.050712 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:42:58.050722 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:42:58.050732 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:42:58.050746 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:42:58.050755 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Feb 12 19:42:58.050762 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Feb 12 19:42:58.050769 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Feb 12 19:42:58.050777 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Feb 12 19:42:58.050784 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Feb 12 19:42:58.050791 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Feb 12 19:42:58.050798 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Feb 12 19:42:58.050812 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 19:42:58.050819 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 19:42:58.050831 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 12 19:42:58.050843 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Feb 12 19:42:58.050855 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffd7fff] -> [mem 0x00000000-0x7ffd7fff] Feb 12 19:42:58.050868 kernel: NODE_DATA(0) allocated [mem 0x7ffd2000-0x7ffd7fff] Feb 12 19:42:58.050882 kernel: Zone ranges: Feb 12 19:42:58.050894 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 19:42:58.050905 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffd7fff] Feb 12 19:42:58.050918 kernel: Normal empty Feb 12 19:42:58.050930 kernel: Movable zone start for each node Feb 12 19:42:58.050937 kernel: Early memory node ranges Feb 12 19:42:58.050945 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 19:42:58.050952 kernel: node 0: [mem 0x0000000000100000-0x000000007ffd7fff] Feb 12 19:42:58.050960 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffd7fff] Feb 12 19:42:58.050972 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:42:58.050985 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 19:42:58.050995 kernel: On node 0, zone DMA32: 40 pages in unavailable ranges Feb 12 19:42:58.051007 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 12 19:42:58.051020 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 19:42:58.051033 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 19:42:58.051046 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 12 19:42:58.051059 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 19:42:58.051067 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 19:42:58.051079 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 19:42:58.051086 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 19:42:58.051094 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 19:42:58.051102 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 19:42:58.051110 kernel: TSC deadline timer available Feb 12 19:42:58.051123 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 19:42:58.051133 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Feb 12 19:42:58.051144 kernel: Booting paravirtualized kernel on KVM Feb 12 19:42:58.051154 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 19:42:58.051170 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 19:42:58.051181 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 19:42:58.051193 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 19:42:58.051205 kernel: pcpu-alloc: [0] 0 1 Feb 12 19:42:58.051218 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Feb 12 19:42:58.051231 kernel: kvm-guest: PV spinlocks disabled, no host support Feb 12 19:42:58.051244 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515800 Feb 12 19:42:58.051257 kernel: Policy zone: DMA32 Feb 12 19:42:58.051295 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 12 19:42:58.051308 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:42:58.051317 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:42:58.051329 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 19:42:58.051341 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:42:58.051354 kernel: Memory: 1975320K/2096600K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121020K reserved, 0K cma-reserved) Feb 12 19:42:58.051367 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:42:58.051380 kernel: Kernel/User page tables isolation: enabled Feb 12 19:42:58.051393 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 19:42:58.051410 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 19:42:58.051423 kernel: rcu: Hierarchical RCU implementation. Feb 12 19:42:58.051437 kernel: rcu: RCU event tracing is enabled. Feb 12 19:42:58.051450 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:42:58.051463 kernel: Rude variant of Tasks RCU enabled. Feb 12 19:42:58.051476 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:42:58.051490 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:42:58.051501 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:42:58.051514 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 19:42:58.051526 kernel: random: crng init done Feb 12 19:42:58.051534 kernel: Console: colour VGA+ 80x25 Feb 12 19:42:58.051543 kernel: printk: console [tty0] enabled Feb 12 19:42:58.051555 kernel: printk: console [ttyS0] enabled Feb 12 19:42:58.051565 kernel: ACPI: Core revision 20210730 Feb 12 19:42:58.051576 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 12 19:42:58.051651 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 19:42:58.051662 kernel: x2apic enabled Feb 12 19:42:58.051673 kernel: Switched APIC routing to physical x2apic. Feb 12 19:42:58.051689 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 19:42:58.051700 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39838d43, max_idle_ns: 440795267131 ns Feb 12 19:42:58.051711 kernel: Calibrating delay loop (skipped) preset value.. 4988.27 BogoMIPS (lpj=2494138) Feb 12 19:42:58.051723 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Feb 12 19:42:58.051735 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Feb 12 19:42:58.051746 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 19:42:58.051758 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 19:42:58.051772 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 19:42:58.051786 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 19:42:58.051803 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Feb 12 19:42:58.051827 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 19:42:58.051842 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 19:42:58.051860 kernel: MDS: Mitigation: Clear CPU buffers Feb 12 19:42:58.051874 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 19:42:58.051888 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 19:42:58.051901 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 19:42:58.051912 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 19:42:58.051924 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 19:42:58.051935 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 12 19:42:58.051950 kernel: Freeing SMP alternatives memory: 32K Feb 12 19:42:58.051962 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:42:58.051974 kernel: LSM: Security Framework initializing Feb 12 19:42:58.051986 kernel: SELinux: Initializing. Feb 12 19:42:58.051998 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 19:42:58.052011 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 19:42:58.052028 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x3f, stepping: 0x2) Feb 12 19:42:58.052042 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 12 19:42:58.052056 kernel: signal: max sigframe size: 1776 Feb 12 19:42:58.052070 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:42:58.052085 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 19:42:58.052099 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:42:58.052113 kernel: x86: Booting SMP configuration: Feb 12 19:42:58.052128 kernel: .... node #0, CPUs: #1 Feb 12 19:42:58.052142 kernel: kvm-clock: cpu 1, msr 6efaa041, secondary cpu clock Feb 12 19:42:58.052156 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Feb 12 19:42:58.052174 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:42:58.052188 kernel: smpboot: Max logical packages: 1 Feb 12 19:42:58.052202 kernel: smpboot: Total of 2 processors activated (9976.55 BogoMIPS) Feb 12 19:42:58.052216 kernel: devtmpfs: initialized Feb 12 19:42:58.052228 kernel: x86/mm: Memory block size: 128MB Feb 12 19:42:58.052240 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:42:58.052253 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:42:58.052265 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:42:58.052277 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:42:58.052294 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:42:58.052308 kernel: audit: type=2000 audit(1707766977.626:1): state=initialized audit_enabled=0 res=1 Feb 12 19:42:58.052322 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:42:58.052336 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 19:42:58.052350 kernel: cpuidle: using governor menu Feb 12 19:42:58.052364 kernel: ACPI: bus type PCI registered Feb 12 19:42:58.052379 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:42:58.052394 kernel: dca service started, version 1.12.1 Feb 12 19:42:58.052408 kernel: PCI: Using configuration type 1 for base access Feb 12 19:42:58.052426 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 19:42:58.052441 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:42:58.052455 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:42:58.052469 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:42:58.052483 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:42:58.052495 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:42:58.052509 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:42:58.052522 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:42:58.052536 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:42:58.052555 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:42:58.052569 kernel: ACPI: Interpreter enabled Feb 12 19:42:58.052607 kernel: ACPI: PM: (supports S0 S5) Feb 12 19:42:58.052620 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 19:42:58.052635 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 19:42:58.052649 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 12 19:42:58.052664 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 19:42:58.052967 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 19:42:58.053112 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 19:42:58.053125 kernel: acpiphp: Slot [3] registered Feb 12 19:42:58.053134 kernel: acpiphp: Slot [4] registered Feb 12 19:42:58.053142 kernel: acpiphp: Slot [5] registered Feb 12 19:42:58.053151 kernel: acpiphp: Slot [6] registered Feb 12 19:42:58.053163 kernel: acpiphp: Slot [7] registered Feb 12 19:42:58.053175 kernel: acpiphp: Slot [8] registered Feb 12 19:42:58.053186 kernel: acpiphp: Slot [9] registered Feb 12 19:42:58.053203 kernel: acpiphp: Slot [10] registered Feb 12 19:42:58.053242 kernel: acpiphp: Slot [11] registered Feb 12 19:42:58.053253 kernel: acpiphp: Slot [12] registered Feb 12 19:42:58.053265 kernel: acpiphp: Slot [13] registered Feb 12 19:42:58.053278 kernel: acpiphp: Slot [14] registered Feb 12 19:42:58.053296 kernel: acpiphp: Slot [15] registered Feb 12 19:42:58.053327 kernel: acpiphp: Slot [16] registered Feb 12 19:42:58.053339 kernel: acpiphp: Slot [17] registered Feb 12 19:42:58.053353 kernel: acpiphp: Slot [18] registered Feb 12 19:42:58.053366 kernel: acpiphp: Slot [19] registered Feb 12 19:42:58.053386 kernel: acpiphp: Slot [20] registered Feb 12 19:42:58.053399 kernel: acpiphp: Slot [21] registered Feb 12 19:42:58.053412 kernel: acpiphp: Slot [22] registered Feb 12 19:42:58.053425 kernel: acpiphp: Slot [23] registered Feb 12 19:42:58.053438 kernel: acpiphp: Slot [24] registered Feb 12 19:42:58.053451 kernel: acpiphp: Slot [25] registered Feb 12 19:42:58.053463 kernel: acpiphp: Slot [26] registered Feb 12 19:42:58.053477 kernel: acpiphp: Slot [27] registered Feb 12 19:42:58.053489 kernel: acpiphp: Slot [28] registered Feb 12 19:42:58.053506 kernel: acpiphp: Slot [29] registered Feb 12 19:42:58.053518 kernel: acpiphp: Slot [30] registered Feb 12 19:42:58.053529 kernel: acpiphp: Slot [31] registered Feb 12 19:42:58.053541 kernel: PCI host bridge to bus 0000:00 Feb 12 19:42:58.053784 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 19:42:58.053882 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 19:42:58.053965 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 19:42:58.054084 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 12 19:42:58.054209 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 12 19:42:58.054330 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 19:42:58.054511 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 19:42:58.054683 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 19:42:58.054840 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 12 19:42:58.054975 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Feb 12 19:42:58.055083 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 19:42:58.055172 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 19:42:58.055323 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 19:42:58.055436 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 19:42:58.055605 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Feb 12 19:42:58.055736 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Feb 12 19:42:58.055886 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 19:42:58.056035 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 12 19:42:58.056162 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 12 19:42:58.056320 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 12 19:42:58.056450 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 12 19:42:58.056606 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 12 19:42:58.056740 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Feb 12 19:42:58.056870 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 12 19:42:58.057091 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 19:42:58.057214 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 12 19:42:58.057341 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Feb 12 19:42:58.057433 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Feb 12 19:42:58.057520 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 12 19:42:58.057640 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 12 19:42:58.057736 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Feb 12 19:42:58.057832 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Feb 12 19:42:58.057943 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 12 19:42:58.058055 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Feb 12 19:42:58.058185 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Feb 12 19:42:58.058306 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Feb 12 19:42:58.058437 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 12 19:42:58.064645 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Feb 12 19:42:58.064928 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Feb 12 19:42:58.066847 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Feb 12 19:42:58.066966 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 12 19:42:58.067070 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Feb 12 19:42:58.067162 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Feb 12 19:42:58.067254 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Feb 12 19:42:58.067355 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Feb 12 19:42:58.067458 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Feb 12 19:42:58.067614 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Feb 12 19:42:58.067710 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Feb 12 19:42:58.067722 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 19:42:58.067731 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 19:42:58.067739 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 19:42:58.067754 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 19:42:58.067762 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 19:42:58.067771 kernel: iommu: Default domain type: Translated Feb 12 19:42:58.067779 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 19:42:58.067873 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 12 19:42:58.068072 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 19:42:58.072863 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 12 19:42:58.072917 kernel: vgaarb: loaded Feb 12 19:42:58.072940 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:42:58.072952 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:42:58.072963 kernel: PTP clock support registered Feb 12 19:42:58.072975 kernel: PCI: Using ACPI for IRQ routing Feb 12 19:42:58.072987 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 19:42:58.073000 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 19:42:58.073011 kernel: e820: reserve RAM buffer [mem 0x7ffd8000-0x7fffffff] Feb 12 19:42:58.073019 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 12 19:42:58.073028 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 12 19:42:58.073040 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 19:42:58.073049 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:42:58.073070 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:42:58.073082 kernel: pnp: PnP ACPI init Feb 12 19:42:58.073091 kernel: pnp: PnP ACPI: found 4 devices Feb 12 19:42:58.073100 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 19:42:58.073108 kernel: NET: Registered PF_INET protocol family Feb 12 19:42:58.073117 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:42:58.073127 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 19:42:58.073143 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:42:58.073155 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 19:42:58.073167 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 19:42:58.073181 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 19:42:58.073192 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 19:42:58.073205 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 19:42:58.073219 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:42:58.073232 kernel: NET: Registered PF_XDP protocol family Feb 12 19:42:58.073379 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 19:42:58.073506 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 19:42:58.073805 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 19:42:58.073974 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 12 19:42:58.074098 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 12 19:42:58.074258 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 12 19:42:58.074795 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 19:42:58.074936 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 19:42:58.074959 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 12 19:42:58.075096 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x730 took 39101 usecs Feb 12 19:42:58.075114 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:42:58.075124 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 19:42:58.075135 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39838d43, max_idle_ns: 440795267131 ns Feb 12 19:42:58.075148 kernel: Initialise system trusted keyrings Feb 12 19:42:58.075164 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 19:42:58.075176 kernel: Key type asymmetric registered Feb 12 19:42:58.075188 kernel: Asymmetric key parser 'x509' registered Feb 12 19:42:58.075208 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:42:58.075220 kernel: io scheduler mq-deadline registered Feb 12 19:42:58.075233 kernel: io scheduler kyber registered Feb 12 19:42:58.075244 kernel: io scheduler bfq registered Feb 12 19:42:58.075258 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 19:42:58.075272 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 12 19:42:58.075286 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 19:42:58.075299 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 19:42:58.075312 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:42:58.075324 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 19:42:58.075343 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 19:42:58.075355 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 19:42:58.075368 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 19:42:58.075382 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 19:42:58.075639 kernel: rtc_cmos 00:03: RTC can wake from S4 Feb 12 19:42:58.075798 kernel: rtc_cmos 00:03: registered as rtc0 Feb 12 19:42:58.075925 kernel: rtc_cmos 00:03: setting system clock to 2024-02-12T19:42:57 UTC (1707766977) Feb 12 19:42:58.076058 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Feb 12 19:42:58.076075 kernel: intel_pstate: CPU model not supported Feb 12 19:42:58.076086 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:42:58.076097 kernel: Segment Routing with IPv6 Feb 12 19:42:58.076108 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:42:58.076119 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:42:58.076130 kernel: Key type dns_resolver registered Feb 12 19:42:58.076141 kernel: IPI shorthand broadcast: enabled Feb 12 19:42:58.076154 kernel: sched_clock: Marking stable (748002921, 119962860)->(1032528459, -164562678) Feb 12 19:42:58.076171 kernel: registered taskstats version 1 Feb 12 19:42:58.076184 kernel: Loading compiled-in X.509 certificates Feb 12 19:42:58.076196 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 12 19:42:58.076206 kernel: Key type .fscrypt registered Feb 12 19:42:58.076218 kernel: Key type fscrypt-provisioning registered Feb 12 19:42:58.076232 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:42:58.076242 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:42:58.076251 kernel: ima: No architecture policies found Feb 12 19:42:58.076259 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 19:42:58.076270 kernel: Write protecting the kernel read-only data: 28672k Feb 12 19:42:58.076279 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 19:42:58.076287 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 19:42:58.076362 kernel: Run /init as init process Feb 12 19:42:58.076374 kernel: with arguments: Feb 12 19:42:58.076385 kernel: /init Feb 12 19:42:58.076421 kernel: with environment: Feb 12 19:42:58.076432 kernel: HOME=/ Feb 12 19:42:58.076441 kernel: TERM=linux Feb 12 19:42:58.076452 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:42:58.076465 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:42:58.076497 systemd[1]: Detected virtualization kvm. Feb 12 19:42:58.076507 systemd[1]: Detected architecture x86-64. Feb 12 19:42:58.076515 systemd[1]: Running in initrd. Feb 12 19:42:58.076524 systemd[1]: No hostname configured, using default hostname. Feb 12 19:42:58.076532 systemd[1]: Hostname set to . Feb 12 19:42:58.076545 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:42:58.076555 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:42:58.076568 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:42:58.076627 systemd[1]: Reached target cryptsetup.target. Feb 12 19:42:58.076688 systemd[1]: Reached target paths.target. Feb 12 19:42:58.076697 systemd[1]: Reached target slices.target. Feb 12 19:42:58.076708 systemd[1]: Reached target swap.target. Feb 12 19:42:58.076717 systemd[1]: Reached target timers.target. Feb 12 19:42:58.076732 systemd[1]: Listening on iscsid.socket. Feb 12 19:42:58.076745 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:42:58.076759 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:42:58.076772 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:42:58.076786 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:42:58.076798 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:42:58.076811 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:42:58.076822 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:42:58.076836 systemd[1]: Reached target sockets.target. Feb 12 19:42:58.076848 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:42:58.076861 systemd[1]: Finished network-cleanup.service. Feb 12 19:42:58.076874 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:42:58.076886 systemd[1]: Starting systemd-journald.service... Feb 12 19:42:58.076895 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:42:58.076911 systemd[1]: Starting systemd-resolved.service... Feb 12 19:42:58.076921 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:42:58.076930 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:42:58.076940 kernel: audit: type=1130 audit(1707766978.039:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.076952 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:42:58.076973 systemd-journald[185]: Journal started Feb 12 19:42:58.077074 systemd-journald[185]: Runtime Journal (/run/log/journal/d6c40b8191e7442e89bc4d05ce85e3b3) is 4.9M, max 39.5M, 34.5M free. Feb 12 19:42:58.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.066777 systemd-modules-load[186]: Inserted module 'overlay' Feb 12 19:42:58.107198 systemd[1]: Started systemd-journald.service. Feb 12 19:42:58.107230 kernel: audit: type=1130 audit(1707766978.102:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.083348 systemd-resolved[187]: Positive Trust Anchors: Feb 12 19:42:58.113494 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:42:58.113529 kernel: Bridge firewalling registered Feb 12 19:42:58.083360 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:42:58.118038 kernel: audit: type=1130 audit(1707766978.109:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.083395 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:42:58.131606 kernel: audit: type=1130 audit(1707766978.110:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.131641 kernel: audit: type=1130 audit(1707766978.111:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.087286 systemd-resolved[187]: Defaulting to hostname 'linux'. Feb 12 19:42:58.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.110528 systemd[1]: Started systemd-resolved.service. Feb 12 19:42:58.144403 kernel: audit: type=1130 audit(1707766978.139:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.144469 kernel: SCSI subsystem initialized Feb 12 19:42:58.111218 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:42:58.111956 systemd[1]: Reached target nss-lookup.target. Feb 12 19:42:58.113403 systemd-modules-load[186]: Inserted module 'br_netfilter' Feb 12 19:42:58.117520 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:42:58.121361 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:42:58.132817 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:42:58.158629 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:42:58.158735 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:42:58.158753 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:42:58.161013 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:42:58.163096 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:42:58.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.168617 kernel: audit: type=1130 audit(1707766978.160:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.169527 systemd-modules-load[186]: Inserted module 'dm_multipath' Feb 12 19:42:58.171942 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:42:58.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.185143 dracut-cmdline[202]: dracut-dracut-053 Feb 12 19:42:58.189145 kernel: audit: type=1130 audit(1707766978.171:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.173857 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:42:58.196288 dracut-cmdline[202]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 12 19:42:58.196733 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:42:58.202871 kernel: audit: type=1130 audit(1707766978.198:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.308632 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:42:58.323617 kernel: iscsi: registered transport (tcp) Feb 12 19:42:58.347974 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:42:58.348062 kernel: QLogic iSCSI HBA Driver Feb 12 19:42:58.404483 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:42:58.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.406739 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:42:58.470659 kernel: raid6: avx2x4 gen() 16141 MB/s Feb 12 19:42:58.487658 kernel: raid6: avx2x4 xor() 6325 MB/s Feb 12 19:42:58.504661 kernel: raid6: avx2x2 gen() 15543 MB/s Feb 12 19:42:58.521666 kernel: raid6: avx2x2 xor() 18322 MB/s Feb 12 19:42:58.538672 kernel: raid6: avx2x1 gen() 11220 MB/s Feb 12 19:42:58.555669 kernel: raid6: avx2x1 xor() 13984 MB/s Feb 12 19:42:58.572654 kernel: raid6: sse2x4 gen() 10584 MB/s Feb 12 19:42:58.589652 kernel: raid6: sse2x4 xor() 6054 MB/s Feb 12 19:42:58.606641 kernel: raid6: sse2x2 gen() 10700 MB/s Feb 12 19:42:58.623693 kernel: raid6: sse2x2 xor() 6814 MB/s Feb 12 19:42:58.640651 kernel: raid6: sse2x1 gen() 8170 MB/s Feb 12 19:42:58.658500 kernel: raid6: sse2x1 xor() 5485 MB/s Feb 12 19:42:58.658609 kernel: raid6: using algorithm avx2x4 gen() 16141 MB/s Feb 12 19:42:58.658627 kernel: raid6: .... xor() 6325 MB/s, rmw enabled Feb 12 19:42:58.659159 kernel: raid6: using avx2x2 recovery algorithm Feb 12 19:42:58.675630 kernel: xor: automatically using best checksumming function avx Feb 12 19:42:58.802638 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 19:42:58.818735 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:42:58.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.819000 audit: BPF prog-id=7 op=LOAD Feb 12 19:42:58.819000 audit: BPF prog-id=8 op=LOAD Feb 12 19:42:58.820491 systemd[1]: Starting systemd-udevd.service... Feb 12 19:42:58.840073 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 12 19:42:58.848753 systemd[1]: Started systemd-udevd.service. Feb 12 19:42:58.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.850821 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:42:58.868625 dracut-pre-trigger[386]: rd.md=0: removing MD RAID activation Feb 12 19:42:58.928524 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:42:58.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.930298 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:42:58.989628 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:42:58.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:59.073103 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Feb 12 19:42:59.083595 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 19:42:59.083701 kernel: GPT:9289727 != 125829119 Feb 12 19:42:59.083715 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 19:42:59.083726 kernel: GPT:9289727 != 125829119 Feb 12 19:42:59.083737 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 19:42:59.083748 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:42:59.085616 kernel: scsi host0: Virtio SCSI HBA Feb 12 19:42:59.091616 kernel: virtio_blk virtio5: [vdb] 948 512-byte logical blocks (485 kB/474 KiB) Feb 12 19:42:59.103617 kernel: libata version 3.00 loaded. Feb 12 19:42:59.121618 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:42:59.147628 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 12 19:42:59.169617 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (442) Feb 12 19:42:59.177397 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:42:59.179501 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:42:59.183611 kernel: scsi host1: ata_piix Feb 12 19:42:59.185438 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:42:59.188088 systemd[1]: Starting disk-uuid.service... Feb 12 19:42:59.197654 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 19:42:59.197762 kernel: AES CTR mode by8 optimization enabled Feb 12 19:42:59.202625 kernel: scsi host2: ata_piix Feb 12 19:42:59.202922 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Feb 12 19:42:59.202937 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Feb 12 19:42:59.208553 disk-uuid[460]: Primary Header is updated. Feb 12 19:42:59.208553 disk-uuid[460]: Secondary Entries is updated. Feb 12 19:42:59.208553 disk-uuid[460]: Secondary Header is updated. Feb 12 19:42:59.280849 kernel: ACPI: bus type USB registered Feb 12 19:42:59.280890 kernel: usbcore: registered new interface driver usbfs Feb 12 19:42:59.280907 kernel: usbcore: registered new interface driver hub Feb 12 19:42:59.280923 kernel: usbcore: registered new device driver usb Feb 12 19:42:59.209948 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:42:59.292989 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:42:59.378617 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Feb 12 19:42:59.382618 kernel: ehci-pci: EHCI PCI platform driver Feb 12 19:42:59.388620 kernel: uhci_hcd: USB Universal Host Controller Interface driver Feb 12 19:42:59.411748 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Feb 12 19:42:59.412175 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Feb 12 19:42:59.413240 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Feb 12 19:42:59.415749 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Feb 12 19:42:59.416099 kernel: hub 1-0:1.0: USB hub found Feb 12 19:42:59.417081 kernel: hub 1-0:1.0: 2 ports detected Feb 12 19:43:00.224621 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:43:00.224720 disk-uuid[462]: The operation has completed successfully. Feb 12 19:43:00.305157 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:43:00.306572 systemd[1]: Finished disk-uuid.service. Feb 12 19:43:00.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:00.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:00.309881 systemd[1]: Starting verity-setup.service... Feb 12 19:43:00.345630 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 19:43:00.441414 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:43:00.444936 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:43:00.446982 systemd[1]: Finished verity-setup.service. Feb 12 19:43:00.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:00.582641 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:43:00.583997 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:43:00.585757 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:43:00.587618 systemd[1]: Starting ignition-setup.service... Feb 12 19:43:00.589957 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:43:00.616394 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:43:00.616504 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:43:00.616535 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:43:00.654227 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:43:00.669558 systemd[1]: Finished ignition-setup.service. Feb 12 19:43:00.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:00.672166 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:43:00.872811 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:43:00.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:00.888000 audit: BPF prog-id=9 op=LOAD Feb 12 19:43:00.893026 systemd[1]: Starting systemd-networkd.service... Feb 12 19:43:01.011356 systemd-networkd[688]: lo: Link UP Feb 12 19:43:01.012193 systemd-networkd[688]: lo: Gained carrier Feb 12 19:43:01.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.017932 systemd-networkd[688]: Enumeration completed Feb 12 19:43:01.019124 systemd-networkd[688]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:43:01.027349 systemd[1]: Started systemd-networkd.service. Feb 12 19:43:01.028231 systemd[1]: Reached target network.target. Feb 12 19:43:01.038979 systemd[1]: Starting iscsiuio.service... Feb 12 19:43:01.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.083049 systemd[1]: Started iscsiuio.service. Feb 12 19:43:01.083531 systemd-networkd[688]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Feb 12 19:43:01.087423 systemd-networkd[688]: eth1: Link UP Feb 12 19:43:01.087439 systemd-networkd[688]: eth1: Gained carrier Feb 12 19:43:01.089669 systemd[1]: Starting iscsid.service... Feb 12 19:43:01.096434 systemd-networkd[688]: eth0: Link UP Feb 12 19:43:01.097084 iscsid[693]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:43:01.097084 iscsid[693]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:43:01.097084 iscsid[693]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:43:01.097084 iscsid[693]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:43:01.097084 iscsid[693]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:43:01.097084 iscsid[693]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:43:01.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.099649 systemd-networkd[688]: eth0: Gained carrier Feb 12 19:43:01.100303 systemd[1]: Started iscsid.service. Feb 12 19:43:01.108419 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:43:01.136164 systemd-networkd[688]: eth0: DHCPv4 address 147.182.245.110/20, gateway 147.182.240.1 acquired from 169.254.169.253 Feb 12 19:43:01.163079 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:43:01.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.163804 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:43:01.164282 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:43:01.164985 systemd[1]: Reached target remote-fs.target. Feb 12 19:43:01.171848 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:43:01.181720 systemd-networkd[688]: eth1: DHCPv4 address 10.124.0.18/20 acquired from 169.254.169.253 Feb 12 19:43:01.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.204811 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:43:01.318757 ignition[610]: Ignition 2.14.0 Feb 12 19:43:01.318800 ignition[610]: Stage: fetch-offline Feb 12 19:43:01.319242 ignition[610]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:43:01.319289 ignition[610]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:43:01.329745 ignition[610]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:43:01.329969 ignition[610]: parsed url from cmdline: "" Feb 12 19:43:01.329977 ignition[610]: no config URL provided Feb 12 19:43:01.329988 ignition[610]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:43:01.330004 ignition[610]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:43:01.330015 ignition[610]: failed to fetch config: resource requires networking Feb 12 19:43:01.330687 ignition[610]: Ignition finished successfully Feb 12 19:43:01.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.334310 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:43:01.336210 systemd[1]: Starting ignition-fetch.service... Feb 12 19:43:01.350038 ignition[707]: Ignition 2.14.0 Feb 12 19:43:01.350680 ignition[707]: Stage: fetch Feb 12 19:43:01.350945 ignition[707]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:43:01.350978 ignition[707]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:43:01.354713 ignition[707]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:43:01.354974 ignition[707]: parsed url from cmdline: "" Feb 12 19:43:01.354981 ignition[707]: no config URL provided Feb 12 19:43:01.354991 ignition[707]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:43:01.355005 ignition[707]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:43:01.355062 ignition[707]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Feb 12 19:43:01.378018 ignition[707]: GET result: OK Feb 12 19:43:01.378249 ignition[707]: parsing config with SHA512: bf52d2361a209d52403c7f40100d14380cb83c6ac83aa1948256fc8665ee88e187013dd6194bd97dd3fc9b31da9537d5b15f576a3eb807163bb95287cbbd8a18 Feb 12 19:43:01.411338 unknown[707]: fetched base config from "system" Feb 12 19:43:01.412165 unknown[707]: fetched base config from "system" Feb 12 19:43:01.412706 unknown[707]: fetched user config from "digitalocean" Feb 12 19:43:01.414327 ignition[707]: fetch: fetch complete Feb 12 19:43:01.414551 ignition[707]: fetch: fetch passed Feb 12 19:43:01.414756 ignition[707]: Ignition finished successfully Feb 12 19:43:01.416559 systemd[1]: Finished ignition-fetch.service. Feb 12 19:43:01.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.418969 systemd[1]: Starting ignition-kargs.service... Feb 12 19:43:01.440056 ignition[713]: Ignition 2.14.0 Feb 12 19:43:01.440071 ignition[713]: Stage: kargs Feb 12 19:43:01.440274 ignition[713]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:43:01.440302 ignition[713]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:43:01.443130 ignition[713]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:43:01.445486 ignition[713]: kargs: kargs passed Feb 12 19:43:01.445605 ignition[713]: Ignition finished successfully Feb 12 19:43:01.447343 systemd[1]: Finished ignition-kargs.service. Feb 12 19:43:01.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.449695 systemd[1]: Starting ignition-disks.service... Feb 12 19:43:01.462333 ignition[719]: Ignition 2.14.0 Feb 12 19:43:01.462364 ignition[719]: Stage: disks Feb 12 19:43:01.462547 ignition[719]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:43:01.462574 ignition[719]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:43:01.464982 ignition[719]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:43:01.466465 ignition[719]: disks: disks passed Feb 12 19:43:01.467947 systemd[1]: Finished ignition-disks.service. Feb 12 19:43:01.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.466613 ignition[719]: Ignition finished successfully Feb 12 19:43:01.469365 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:43:01.469801 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:43:01.470744 systemd[1]: Reached target local-fs.target. Feb 12 19:43:01.471518 systemd[1]: Reached target sysinit.target. Feb 12 19:43:01.472221 systemd[1]: Reached target basic.target. Feb 12 19:43:01.474548 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:43:01.500166 systemd-fsck[727]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 12 19:43:01.506890 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:43:01.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.510338 systemd[1]: Mounting sysroot.mount... Feb 12 19:43:01.526753 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:43:01.528186 systemd[1]: Mounted sysroot.mount. Feb 12 19:43:01.531446 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:43:01.535799 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:43:01.538056 systemd[1]: Starting flatcar-digitalocean-network.service... Feb 12 19:43:01.541011 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:43:01.541663 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:43:01.541738 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:43:01.547538 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:43:01.554740 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:43:01.559428 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:43:01.576639 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (735) Feb 12 19:43:01.576754 initrd-setup-root[740]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:43:01.589657 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:43:01.589796 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:43:01.589826 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:43:01.594149 initrd-setup-root[756]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:43:01.610426 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:43:01.612942 initrd-setup-root[774]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:43:01.624878 initrd-setup-root[784]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:43:01.717306 coreos-metadata[733]: Feb 12 19:43:01.717 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:43:01.732135 coreos-metadata[733]: Feb 12 19:43:01.731 INFO Fetch successful Feb 12 19:43:01.743959 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Feb 12 19:43:01.744097 systemd[1]: Finished flatcar-digitalocean-network.service. Feb 12 19:43:01.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.749668 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:43:01.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.751774 systemd[1]: Starting ignition-mount.service... Feb 12 19:43:01.753691 systemd[1]: Starting sysroot-boot.service... Feb 12 19:43:01.771167 coreos-metadata[734]: Feb 12 19:43:01.770 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:43:01.778142 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 19:43:01.778388 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 19:43:01.785804 coreos-metadata[734]: Feb 12 19:43:01.785 INFO Fetch successful Feb 12 19:43:01.794924 coreos-metadata[734]: Feb 12 19:43:01.794 INFO wrote hostname ci-3510.3.2-0-21133d5f73 to /sysroot/etc/hostname Feb 12 19:43:01.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.796225 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:43:01.803070 ignition[805]: INFO : Ignition 2.14.0 Feb 12 19:43:01.804555 ignition[805]: INFO : Stage: mount Feb 12 19:43:01.805640 ignition[805]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:43:01.806390 ignition[805]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:43:01.809140 ignition[805]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:43:01.812970 systemd[1]: Finished sysroot-boot.service. Feb 12 19:43:01.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.815423 ignition[805]: INFO : mount: mount passed Feb 12 19:43:01.816168 ignition[805]: INFO : Ignition finished successfully Feb 12 19:43:01.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:01.817737 systemd[1]: Finished ignition-mount.service. Feb 12 19:43:01.820819 systemd[1]: Starting ignition-files.service... Feb 12 19:43:01.841120 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:43:01.851637 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (813) Feb 12 19:43:01.855205 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:43:01.855326 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:43:01.855344 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:43:01.863838 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:43:01.886912 ignition[832]: INFO : Ignition 2.14.0 Feb 12 19:43:01.888514 ignition[832]: INFO : Stage: files Feb 12 19:43:01.889804 ignition[832]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:43:01.891252 ignition[832]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:43:01.896408 ignition[832]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:43:01.901873 ignition[832]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:43:01.904713 ignition[832]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:43:01.904713 ignition[832]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:43:01.911399 ignition[832]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:43:01.912552 ignition[832]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:43:01.913867 unknown[832]: wrote ssh authorized keys file for user: core Feb 12 19:43:01.914732 ignition[832]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:43:01.915307 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:43:01.915307 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 19:43:02.305145 systemd-networkd[688]: eth1: Gained IPv6LL Feb 12 19:43:02.369047 systemd-networkd[688]: eth0: Gained IPv6LL Feb 12 19:43:02.427494 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:43:02.718590 ignition[832]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 19:43:02.719952 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:43:02.719952 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:43:02.719952 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 19:43:03.192262 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:43:03.327079 ignition[832]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 19:43:03.328603 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:43:03.328603 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:43:03.328603 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 12 19:43:03.392272 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:43:03.688890 ignition[832]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 12 19:43:03.690303 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:43:03.690303 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:43:03.690303 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 12 19:43:03.736290 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:43:04.391803 ignition[832]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 12 19:43:04.393706 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:43:04.393706 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:43:04.393706 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:43:04.393706 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:43:04.393706 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:43:04.393706 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:43:04.393706 ignition[832]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:43:04.393706 ignition[832]: INFO : files: op(a): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 19:43:04.393706 ignition[832]: INFO : files: op(a): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 19:43:04.393706 ignition[832]: INFO : files: op(b): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:43:04.393706 ignition[832]: INFO : files: op(b): op(c): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:43:04.402300 ignition[832]: INFO : files: op(b): op(c): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:43:04.402300 ignition[832]: INFO : files: op(b): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:43:04.402300 ignition[832]: INFO : files: op(d): [started] processing unit "prepare-critools.service" Feb 12 19:43:04.402300 ignition[832]: INFO : files: op(d): op(e): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:43:04.402300 ignition[832]: INFO : files: op(d): op(e): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:43:04.402300 ignition[832]: INFO : files: op(d): [finished] processing unit "prepare-critools.service" Feb 12 19:43:04.402300 ignition[832]: INFO : files: op(f): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:43:04.402300 ignition[832]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:43:04.402300 ignition[832]: INFO : files: op(10): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:43:04.402300 ignition[832]: INFO : files: op(10): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:43:04.402300 ignition[832]: INFO : files: op(11): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 19:43:04.402300 ignition[832]: INFO : files: op(11): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 19:43:04.402300 ignition[832]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:43:04.402300 ignition[832]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:43:04.402300 ignition[832]: INFO : files: files passed Feb 12 19:43:04.402300 ignition[832]: INFO : Ignition finished successfully Feb 12 19:43:04.437411 kernel: kauditd_printk_skb: 29 callbacks suppressed Feb 12 19:43:04.437450 kernel: audit: type=1130 audit(1707766984.405:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.437469 kernel: audit: type=1130 audit(1707766984.421:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.437483 kernel: audit: type=1131 audit(1707766984.424:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.437498 kernel: audit: type=1130 audit(1707766984.431:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.404333 systemd[1]: Finished ignition-files.service. Feb 12 19:43:04.407587 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:43:04.439776 initrd-setup-root-after-ignition[857]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:43:04.413139 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:43:04.414978 systemd[1]: Starting ignition-quench.service... Feb 12 19:43:04.420829 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:43:04.420954 systemd[1]: Finished ignition-quench.service. Feb 12 19:43:04.430124 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:43:04.431965 systemd[1]: Reached target ignition-complete.target. Feb 12 19:43:04.438085 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:43:04.472833 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:43:04.473769 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:43:04.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.479181 systemd[1]: Reached target initrd-fs.target. Feb 12 19:43:04.481709 kernel: audit: type=1130 audit(1707766984.474:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.481746 kernel: audit: type=1131 audit(1707766984.477:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.481912 systemd[1]: Reached target initrd.target. Feb 12 19:43:04.483195 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:43:04.484746 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:43:04.502951 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:43:04.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.507651 kernel: audit: type=1130 audit(1707766984.503:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.505220 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:43:04.519549 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:43:04.521129 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:43:04.522528 systemd[1]: Stopped target timers.target. Feb 12 19:43:04.523516 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:43:04.524317 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:43:04.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.528072 systemd[1]: Stopped target initrd.target. Feb 12 19:43:04.528627 kernel: audit: type=1131 audit(1707766984.524:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.529231 systemd[1]: Stopped target basic.target. Feb 12 19:43:04.529756 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:43:04.530845 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:43:04.531691 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:43:04.532470 systemd[1]: Stopped target remote-fs.target. Feb 12 19:43:04.533248 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:43:04.534025 systemd[1]: Stopped target sysinit.target. Feb 12 19:43:04.534893 systemd[1]: Stopped target local-fs.target. Feb 12 19:43:04.535561 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:43:04.536278 systemd[1]: Stopped target swap.target. Feb 12 19:43:04.536869 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:43:04.540499 kernel: audit: type=1131 audit(1707766984.537:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.537021 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:43:04.537717 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:43:04.545673 kernel: audit: type=1131 audit(1707766984.541:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.540940 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:43:04.541128 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:43:04.541937 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:43:04.542114 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:43:04.549063 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:43:04.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.549296 systemd[1]: Stopped ignition-files.service. Feb 12 19:43:04.550860 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:43:04.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.551082 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:43:04.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.553954 systemd[1]: Stopping ignition-mount.service... Feb 12 19:43:04.554920 systemd[1]: Stopping iscsiuio.service... Feb 12 19:43:04.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.562799 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:43:04.566375 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:43:04.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.566851 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:43:04.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.567611 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:43:04.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.567845 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:43:04.570863 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:43:04.571028 systemd[1]: Stopped iscsiuio.service. Feb 12 19:43:04.573562 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:43:04.573732 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:43:04.587788 ignition[870]: INFO : Ignition 2.14.0 Feb 12 19:43:04.587788 ignition[870]: INFO : Stage: umount Feb 12 19:43:04.589221 ignition[870]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:43:04.589221 ignition[870]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:43:04.591118 ignition[870]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:43:04.597109 ignition[870]: INFO : umount: umount passed Feb 12 19:43:04.597109 ignition[870]: INFO : Ignition finished successfully Feb 12 19:43:04.599627 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:43:04.599800 systemd[1]: Stopped ignition-mount.service. Feb 12 19:43:04.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.600829 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:43:04.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.600898 systemd[1]: Stopped ignition-disks.service. Feb 12 19:43:04.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.601410 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:43:04.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.601460 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:43:04.602167 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:43:04.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.602208 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:43:04.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.603105 systemd[1]: Stopped target network.target. Feb 12 19:43:04.603865 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:43:04.603936 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:43:04.605062 systemd[1]: Stopped target paths.target. Feb 12 19:43:04.607420 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:43:04.609685 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:43:04.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.610189 systemd[1]: Stopped target slices.target. Feb 12 19:43:04.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.610710 systemd[1]: Stopped target sockets.target. Feb 12 19:43:04.611190 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:43:04.611244 systemd[1]: Closed iscsid.socket. Feb 12 19:43:04.611700 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:43:04.611755 systemd[1]: Closed iscsiuio.socket. Feb 12 19:43:04.612168 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:43:04.612234 systemd[1]: Stopped ignition-setup.service. Feb 12 19:43:04.612970 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:43:04.613632 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:43:04.615706 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:43:04.617233 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:43:04.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.617383 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:43:04.617608 systemd-networkd[688]: eth0: DHCPv6 lease lost Feb 12 19:43:04.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.618822 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:43:04.628000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:43:04.618888 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:43:04.621792 systemd-networkd[688]: eth1: DHCPv6 lease lost Feb 12 19:43:04.626021 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:43:04.626179 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:43:04.632000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:43:04.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.627631 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:43:04.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.627780 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:43:04.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.628795 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:43:04.628846 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:43:04.631060 systemd[1]: Stopping network-cleanup.service... Feb 12 19:43:04.632076 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:43:04.632163 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:43:04.633205 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:43:04.633278 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:43:04.633969 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:43:04.634028 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:43:04.634768 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:43:04.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.652986 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:43:04.653910 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:43:04.654116 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:43:04.657113 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:43:04.657168 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:43:04.658101 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:43:04.658150 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:43:04.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.659012 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:43:04.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.659084 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:43:04.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.660055 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:43:04.660108 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:43:04.660707 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:43:04.660761 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:43:04.663053 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:43:04.663509 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:43:04.663649 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:43:04.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.671289 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:43:04.671373 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:43:04.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.674209 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:43:04.674302 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:43:04.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.677175 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 19:43:04.678051 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:43:04.678177 systemd[1]: Stopped network-cleanup.service. Feb 12 19:43:04.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.679547 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:43:04.679713 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:43:04.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:04.681103 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:43:04.683216 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:43:04.700525 systemd[1]: Switching root. Feb 12 19:43:04.721525 iscsid[693]: iscsid shutting down. Feb 12 19:43:04.722247 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Feb 12 19:43:04.722307 systemd-journald[185]: Journal stopped Feb 12 19:43:10.893679 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:43:10.893797 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:43:10.893821 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:43:10.893839 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:43:10.893857 kernel: SELinux: policy capability open_perms=1 Feb 12 19:43:10.893874 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:43:10.893902 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:43:10.893919 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:43:10.893937 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:43:10.893964 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:43:10.893988 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:43:10.894015 systemd[1]: Successfully loaded SELinux policy in 64.437ms. Feb 12 19:43:10.894051 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 12.429ms. Feb 12 19:43:10.894075 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:43:10.894094 systemd[1]: Detected virtualization kvm. Feb 12 19:43:10.894110 systemd[1]: Detected architecture x86-64. Feb 12 19:43:10.894128 systemd[1]: Detected first boot. Feb 12 19:43:10.894146 systemd[1]: Hostname set to . Feb 12 19:43:10.894170 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:43:10.894188 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:43:10.894205 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:43:10.894226 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:43:10.894255 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:43:10.894278 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:43:10.894306 kernel: kauditd_printk_skb: 49 callbacks suppressed Feb 12 19:43:10.894327 kernel: audit: type=1334 audit(1707766990.401:92): prog-id=12 op=LOAD Feb 12 19:43:10.894345 kernel: audit: type=1334 audit(1707766990.404:93): prog-id=3 op=UNLOAD Feb 12 19:43:10.894364 kernel: audit: type=1334 audit(1707766990.404:94): prog-id=13 op=LOAD Feb 12 19:43:10.894398 kernel: audit: type=1334 audit(1707766990.404:95): prog-id=14 op=LOAD Feb 12 19:43:10.894416 kernel: audit: type=1334 audit(1707766990.404:96): prog-id=4 op=UNLOAD Feb 12 19:43:10.894434 kernel: audit: type=1334 audit(1707766990.404:97): prog-id=5 op=UNLOAD Feb 12 19:43:10.894450 kernel: audit: type=1334 audit(1707766990.419:98): prog-id=15 op=LOAD Feb 12 19:43:10.894469 kernel: audit: type=1334 audit(1707766990.419:99): prog-id=12 op=UNLOAD Feb 12 19:43:10.894492 kernel: audit: type=1334 audit(1707766990.420:100): prog-id=16 op=LOAD Feb 12 19:43:10.894514 kernel: audit: type=1334 audit(1707766990.423:101): prog-id=17 op=LOAD Feb 12 19:43:10.894534 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:43:10.894555 systemd[1]: Stopped iscsid.service. Feb 12 19:43:10.898087 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:43:10.898208 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:43:10.898236 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:43:10.898270 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:43:10.898314 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:43:10.898428 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 19:43:10.898450 systemd[1]: Created slice system-getty.slice. Feb 12 19:43:10.898469 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:43:10.898488 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:43:10.898507 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:43:10.898524 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:43:10.898551 systemd[1]: Created slice user.slice. Feb 12 19:43:10.898570 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:43:10.898612 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:43:10.898633 systemd[1]: Set up automount boot.automount. Feb 12 19:43:10.898653 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:43:10.898671 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:43:10.898690 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:43:10.898707 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:43:10.898728 systemd[1]: Reached target integritysetup.target. Feb 12 19:43:10.898753 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:43:10.898773 systemd[1]: Reached target remote-fs.target. Feb 12 19:43:10.898792 systemd[1]: Reached target slices.target. Feb 12 19:43:10.898810 systemd[1]: Reached target swap.target. Feb 12 19:43:10.898829 systemd[1]: Reached target torcx.target. Feb 12 19:43:10.898847 systemd[1]: Reached target veritysetup.target. Feb 12 19:43:10.898866 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:43:10.898887 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:43:10.898910 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:43:10.898930 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:43:10.898959 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:43:10.898981 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:43:10.899002 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:43:10.899021 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:43:10.899040 systemd[1]: Mounting media.mount... Feb 12 19:43:10.899061 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:43:10.899084 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:43:10.899106 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:43:10.899127 systemd[1]: Mounting tmp.mount... Feb 12 19:43:10.899151 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:43:10.899170 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:43:10.899190 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:43:10.899209 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:43:10.899229 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:43:10.899249 systemd[1]: Starting modprobe@drm.service... Feb 12 19:43:10.899268 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:43:10.899287 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:43:10.899306 systemd[1]: Starting modprobe@loop.service... Feb 12 19:43:10.899336 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:43:10.899357 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:43:10.899377 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:43:10.899398 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:43:10.899418 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:43:10.899437 systemd[1]: Stopped systemd-journald.service. Feb 12 19:43:10.899455 systemd[1]: Starting systemd-journald.service... Feb 12 19:43:10.899474 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:43:10.899492 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:43:10.899519 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:43:10.899538 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:43:10.899559 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:43:10.899599 systemd[1]: Stopped verity-setup.service. Feb 12 19:43:10.899625 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:43:10.899645 kernel: loop: module loaded Feb 12 19:43:10.899669 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:43:10.899691 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:43:10.899712 systemd[1]: Mounted media.mount. Feb 12 19:43:10.899745 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:43:10.899776 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:43:10.899801 systemd[1]: Mounted tmp.mount. Feb 12 19:43:10.899821 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:43:10.899841 kernel: fuse: init (API version 7.34) Feb 12 19:43:10.899861 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:43:10.899886 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:43:10.899908 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:43:10.899929 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:43:10.899951 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:43:10.899972 systemd[1]: Finished modprobe@drm.service. Feb 12 19:43:10.899997 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:43:10.900019 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:43:10.900038 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:43:10.900056 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:43:10.900075 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:43:10.900098 systemd[1]: Finished modprobe@loop.service. Feb 12 19:43:10.900118 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:43:10.900139 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:43:10.900160 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:43:10.900182 systemd[1]: Reached target network-pre.target. Feb 12 19:43:10.900209 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:43:10.900231 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:43:10.900259 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:43:10.900287 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:43:10.900306 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:43:10.900330 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:43:10.900350 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:43:10.900379 systemd-journald[970]: Journal started Feb 12 19:43:10.900505 systemd-journald[970]: Runtime Journal (/run/log/journal/d6c40b8191e7442e89bc4d05ce85e3b3) is 4.9M, max 39.5M, 34.5M free. Feb 12 19:43:04.897000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:43:04.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:43:04.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:43:04.966000 audit: BPF prog-id=10 op=LOAD Feb 12 19:43:04.966000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:43:04.966000 audit: BPF prog-id=11 op=LOAD Feb 12 19:43:04.966000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:43:05.100000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:43:05.100000 audit[903]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:05.100000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:43:05.101000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:43:05.101000 audit[903]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:05.101000 audit: CWD cwd="/" Feb 12 19:43:05.101000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:05.101000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:05.101000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:43:10.401000 audit: BPF prog-id=12 op=LOAD Feb 12 19:43:10.404000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:43:10.404000 audit: BPF prog-id=13 op=LOAD Feb 12 19:43:10.404000 audit: BPF prog-id=14 op=LOAD Feb 12 19:43:10.404000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:43:10.404000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:43:10.419000 audit: BPF prog-id=15 op=LOAD Feb 12 19:43:10.419000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:43:10.420000 audit: BPF prog-id=16 op=LOAD Feb 12 19:43:10.423000 audit: BPF prog-id=17 op=LOAD Feb 12 19:43:10.424000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:43:10.424000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:43:10.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.436000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:43:10.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.694000 audit: BPF prog-id=18 op=LOAD Feb 12 19:43:10.695000 audit: BPF prog-id=19 op=LOAD Feb 12 19:43:10.697000 audit: BPF prog-id=20 op=LOAD Feb 12 19:43:10.697000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:43:10.697000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:43:10.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.916001 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:43:10.916078 systemd[1]: Started systemd-journald.service. Feb 12 19:43:10.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.890000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:43:10.890000 audit[970]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff4a837960 a2=4000 a3=7fff4a8379fc items=0 ppid=1 pid=970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:10.890000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:43:10.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.398853 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:43:05.097666 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:43:10.398882 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 19:43:05.098305 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:43:10.425959 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:43:05.098337 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:43:10.915284 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:43:05.098525 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:43:10.916081 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:43:05.098543 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:43:10.921211 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:43:05.098631 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:43:05.098652 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:43:05.098974 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:43:05.099033 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:43:05.099050 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:43:05.099873 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:43:05.099928 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:43:05.099952 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:43:05.099976 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:43:05.100005 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:43:05.100027 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:05Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:43:09.387233 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:09Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:43:09.387717 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:09Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:43:09.387947 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:09Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:43:09.388280 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:09Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:43:09.388363 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:09Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:43:09.388451 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2024-02-12T19:43:09Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:43:10.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.964198 systemd-journald[970]: Time spent on flushing to /var/log/journal/d6c40b8191e7442e89bc4d05ce85e3b3 is 136.606ms for 1177 entries. Feb 12 19:43:10.964198 systemd-journald[970]: System Journal (/var/log/journal/d6c40b8191e7442e89bc4d05ce85e3b3) is 8.0M, max 195.6M, 187.6M free. Feb 12 19:43:11.148055 systemd-journald[970]: Received client request to flush runtime journal. Feb 12 19:43:11.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:11.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:11.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.956618 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:43:11.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:10.958319 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:43:11.052973 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:43:11.131378 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:43:11.132293 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:43:11.136826 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:43:11.139756 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:43:11.150221 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:43:11.175640 udevadm[1014]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 19:43:11.485757 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:43:11.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:11.488805 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:43:11.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:11.559874 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:43:12.336435 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:43:12.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:12.340000 audit: BPF prog-id=21 op=LOAD Feb 12 19:43:12.340000 audit: BPF prog-id=22 op=LOAD Feb 12 19:43:12.340000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:43:12.340000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:43:12.342452 systemd[1]: Starting systemd-udevd.service... Feb 12 19:43:12.379634 systemd-udevd[1017]: Using default interface naming scheme 'v252'. Feb 12 19:43:12.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:12.454000 audit: BPF prog-id=23 op=LOAD Feb 12 19:43:12.452737 systemd[1]: Started systemd-udevd.service. Feb 12 19:43:12.456680 systemd[1]: Starting systemd-networkd.service... Feb 12 19:43:12.467000 audit: BPF prog-id=24 op=LOAD Feb 12 19:43:12.468000 audit: BPF prog-id=25 op=LOAD Feb 12 19:43:12.468000 audit: BPF prog-id=26 op=LOAD Feb 12 19:43:12.470238 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:43:12.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:12.546258 systemd[1]: Started systemd-userdbd.service. Feb 12 19:43:12.627768 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:43:12.646716 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 19:43:12.670153 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:43:12.670490 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:43:12.672725 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:43:12.676949 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:43:12.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:12.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:12.682086 systemd[1]: Starting modprobe@loop.service... Feb 12 19:43:12.682881 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:43:12.683010 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:43:12.683163 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:43:12.684136 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:43:12.684432 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:43:12.685604 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:43:12.685827 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:43:12.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:12.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:12.688371 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:43:12.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:12.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:12.690439 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:43:12.690652 systemd[1]: Finished modprobe@loop.service. Feb 12 19:43:12.691536 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:43:12.717464 systemd-networkd[1023]: lo: Link UP Feb 12 19:43:12.717481 systemd-networkd[1023]: lo: Gained carrier Feb 12 19:43:12.718338 systemd-networkd[1023]: Enumeration completed Feb 12 19:43:12.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:12.718538 systemd[1]: Started systemd-networkd.service. Feb 12 19:43:12.719957 systemd-networkd[1023]: eth1: Configuring with /run/systemd/network/10-7a:db:58:b4:57:14.network. Feb 12 19:43:12.722483 systemd-networkd[1023]: eth0: Configuring with /run/systemd/network/10-e2:aa:78:0c:3d:19.network. Feb 12 19:43:12.723866 systemd-networkd[1023]: eth1: Link UP Feb 12 19:43:12.723882 systemd-networkd[1023]: eth1: Gained carrier Feb 12 19:43:12.729104 systemd-networkd[1023]: eth0: Link UP Feb 12 19:43:12.729119 systemd-networkd[1023]: eth0: Gained carrier Feb 12 19:43:12.788625 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 19:43:12.800661 kernel: ACPI: button: Power Button [PWRF] Feb 12 19:43:12.802000 audit[1033]: AVC avc: denied { confidentiality } for pid=1033 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:43:12.802000 audit[1033]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=561a07d7f6d0 a1=32194 a2=7f999513fbc5 a3=5 items=108 ppid=1017 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:12.802000 audit: CWD cwd="/" Feb 12 19:43:12.802000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=1 name=(null) inode=14020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=2 name=(null) inode=14020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=3 name=(null) inode=14021 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=4 name=(null) inode=14020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=5 name=(null) inode=14022 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=6 name=(null) inode=14020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=7 name=(null) inode=14023 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=8 name=(null) inode=14023 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=9 name=(null) inode=14024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=10 name=(null) inode=14023 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=11 name=(null) inode=14025 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=12 name=(null) inode=14023 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=13 name=(null) inode=14026 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=14 name=(null) inode=14023 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=15 name=(null) inode=14027 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=16 name=(null) inode=14023 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=17 name=(null) inode=14028 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=18 name=(null) inode=14020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=19 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=20 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=21 name=(null) inode=14030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=22 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=23 name=(null) inode=14031 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=24 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=25 name=(null) inode=14032 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=26 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=27 name=(null) inode=14033 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=28 name=(null) inode=14029 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=29 name=(null) inode=14034 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=30 name=(null) inode=14020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=31 name=(null) inode=14035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=32 name=(null) inode=14035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=33 name=(null) inode=14036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=34 name=(null) inode=14035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=35 name=(null) inode=14037 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=36 name=(null) inode=14035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=37 name=(null) inode=14038 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=38 name=(null) inode=14035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=39 name=(null) inode=14039 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=40 name=(null) inode=14035 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=41 name=(null) inode=14040 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=42 name=(null) inode=14020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=43 name=(null) inode=14041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=44 name=(null) inode=14041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=45 name=(null) inode=14042 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=46 name=(null) inode=14041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=47 name=(null) inode=14043 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=48 name=(null) inode=14041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=49 name=(null) inode=14044 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=50 name=(null) inode=14041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=51 name=(null) inode=14045 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=52 name=(null) inode=14041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=53 name=(null) inode=14046 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=55 name=(null) inode=14047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=56 name=(null) inode=14047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=57 name=(null) inode=14048 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=58 name=(null) inode=14047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=59 name=(null) inode=14049 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=60 name=(null) inode=14047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=61 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=62 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=63 name=(null) inode=14051 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=64 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=65 name=(null) inode=14052 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=66 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=67 name=(null) inode=14053 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=68 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=69 name=(null) inode=14054 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=70 name=(null) inode=14050 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=71 name=(null) inode=14055 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=72 name=(null) inode=14047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=73 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=74 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=75 name=(null) inode=14057 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=76 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=77 name=(null) inode=14058 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=78 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=79 name=(null) inode=14059 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=80 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=81 name=(null) inode=14060 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=82 name=(null) inode=14056 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=83 name=(null) inode=14061 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=84 name=(null) inode=14047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=85 name=(null) inode=14062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=86 name=(null) inode=14062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=87 name=(null) inode=14063 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=88 name=(null) inode=14062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=89 name=(null) inode=14064 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=90 name=(null) inode=14062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=91 name=(null) inode=14065 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=92 name=(null) inode=14062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=93 name=(null) inode=14066 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=94 name=(null) inode=14062 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=95 name=(null) inode=14067 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=96 name=(null) inode=14047 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=97 name=(null) inode=14068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=98 name=(null) inode=14068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=99 name=(null) inode=14069 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=100 name=(null) inode=14068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=101 name=(null) inode=14070 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=102 name=(null) inode=14068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=103 name=(null) inode=14071 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=104 name=(null) inode=14068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=105 name=(null) inode=14072 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=106 name=(null) inode=14068 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PATH item=107 name=(null) inode=14073 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:43:12.802000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:43:12.869622 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 12 19:43:12.882649 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 12 19:43:12.898622 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:43:13.066901 kernel: EDAC MC: Ver: 3.0.0 Feb 12 19:43:13.091046 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:43:13.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:13.094521 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:43:13.144539 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:43:13.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:13.184530 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:43:13.185313 systemd[1]: Reached target cryptsetup.target. Feb 12 19:43:13.189148 systemd[1]: Starting lvm2-activation.service... Feb 12 19:43:13.198801 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:43:13.241333 systemd[1]: Finished lvm2-activation.service. Feb 12 19:43:13.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:13.243344 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:43:13.247517 systemd[1]: Mounting media-configdrive.mount... Feb 12 19:43:13.249294 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:43:13.249695 systemd[1]: Reached target machines.target. Feb 12 19:43:13.253073 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:43:13.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:13.287053 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:43:13.302820 kernel: ISO 9660 Extensions: RRIP_1991A Feb 12 19:43:13.305483 systemd[1]: Mounted media-configdrive.mount. Feb 12 19:43:13.306279 systemd[1]: Reached target local-fs.target. Feb 12 19:43:13.309918 systemd[1]: Starting ldconfig.service... Feb 12 19:43:13.312039 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:43:13.312162 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:43:13.315823 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:43:13.320297 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:43:13.322976 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:43:13.323105 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:43:13.347551 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:43:13.387335 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1062 (bootctl) Feb 12 19:43:13.390146 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:43:13.396014 systemd-tmpfiles[1064]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:43:13.403680 systemd-tmpfiles[1064]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:43:13.407720 systemd-tmpfiles[1064]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:43:13.622014 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:43:13.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:13.623355 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:43:13.734190 systemd-fsck[1068]: fsck.fat 4.2 (2021-01-31) Feb 12 19:43:13.734190 systemd-fsck[1068]: /dev/vda1: 789 files, 115339/258078 clusters Feb 12 19:43:13.748194 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:43:13.751428 systemd[1]: Mounting boot.mount... Feb 12 19:43:13.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:13.789323 systemd[1]: Mounted boot.mount. Feb 12 19:43:13.832780 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:43:13.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:13.980397 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:43:13.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:13.983958 systemd[1]: Starting audit-rules.service... Feb 12 19:43:14.001473 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:43:14.005472 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:43:14.011000 audit: BPF prog-id=27 op=LOAD Feb 12 19:43:14.017198 systemd-networkd[1023]: eth0: Gained IPv6LL Feb 12 19:43:14.018195 systemd[1]: Starting systemd-resolved.service... Feb 12 19:43:14.020000 audit: BPF prog-id=28 op=LOAD Feb 12 19:43:14.022985 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:43:14.027934 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:43:14.048920 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:43:14.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:14.049754 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:43:14.110000 audit[1077]: SYSTEM_BOOT pid=1077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:43:14.128340 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:43:14.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:14.144944 systemd-networkd[1023]: eth1: Gained IPv6LL Feb 12 19:43:14.165554 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:43:14.166253 systemd[1]: Reached target time-set.target. Feb 12 19:43:14.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:14.205031 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:43:14.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:14.213859 augenrules[1092]: No rules Feb 12 19:43:14.213000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:43:14.213000 audit[1092]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffefae60dd0 a2=420 a3=0 items=0 ppid=1071 pid=1092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:14.213000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:43:14.215689 systemd[1]: Finished audit-rules.service. Feb 12 19:43:14.224358 systemd-resolved[1075]: Positive Trust Anchors: Feb 12 19:43:14.224837 systemd-resolved[1075]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:43:14.224989 systemd-resolved[1075]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:43:14.235046 systemd-resolved[1075]: Using system hostname 'ci-3510.3.2-0-21133d5f73'. Feb 12 19:43:14.239077 systemd[1]: Started systemd-resolved.service. Feb 12 19:43:14.239812 systemd[1]: Reached target network.target. Feb 12 19:43:14.240253 systemd[1]: Reached target nss-lookup.target. Feb 12 19:43:15.254992 systemd-timesyncd[1076]: Contacted time server 45.33.103.94:123 (0.flatcar.pool.ntp.org). Feb 12 19:43:15.255084 systemd-timesyncd[1076]: Initial clock synchronization to Mon 2024-02-12 19:43:15.254761 UTC. Feb 12 19:43:15.255883 systemd-resolved[1075]: Clock change detected. Flushing caches. Feb 12 19:43:15.329823 ldconfig[1061]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:43:15.381187 systemd[1]: Finished ldconfig.service. Feb 12 19:43:15.384329 systemd[1]: Starting systemd-update-done.service... Feb 12 19:43:15.399535 systemd[1]: Finished systemd-update-done.service. Feb 12 19:43:15.400594 systemd[1]: Reached target sysinit.target. Feb 12 19:43:15.401186 systemd[1]: Started motdgen.path. Feb 12 19:43:15.401632 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:43:15.402447 systemd[1]: Started logrotate.timer. Feb 12 19:43:15.403079 systemd[1]: Started mdadm.timer. Feb 12 19:43:15.403561 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:43:15.403921 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:43:15.403978 systemd[1]: Reached target paths.target. Feb 12 19:43:15.405090 systemd[1]: Reached target timers.target. Feb 12 19:43:15.406556 systemd[1]: Listening on dbus.socket. Feb 12 19:43:15.408807 systemd[1]: Starting docker.socket... Feb 12 19:43:15.414787 systemd[1]: Listening on sshd.socket. Feb 12 19:43:15.415513 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:43:15.416492 systemd[1]: Listening on docker.socket. Feb 12 19:43:15.425156 systemd[1]: Reached target sockets.target. Feb 12 19:43:15.426311 systemd[1]: Reached target basic.target. Feb 12 19:43:15.426960 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:43:15.427012 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:43:15.429235 systemd[1]: Starting containerd.service... Feb 12 19:43:15.431684 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 19:43:15.435529 systemd[1]: Starting dbus.service... Feb 12 19:43:15.440449 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:43:15.443149 systemd[1]: Starting extend-filesystems.service... Feb 12 19:43:15.443931 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:43:15.447347 systemd[1]: Starting motdgen.service... Feb 12 19:43:15.471851 jq[1105]: false Feb 12 19:43:15.452581 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:43:15.459036 systemd[1]: Starting prepare-critools.service... Feb 12 19:43:15.463444 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:43:15.467490 systemd[1]: Starting sshd-keygen.service... Feb 12 19:43:15.474653 systemd[1]: Starting systemd-logind.service... Feb 12 19:43:15.477796 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:43:15.477895 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:43:15.478902 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:43:15.482547 systemd[1]: Starting update-engine.service... Feb 12 19:43:15.486054 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:43:15.496693 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:43:15.496965 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:43:15.513526 jq[1118]: true Feb 12 19:43:15.543820 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:43:15.544167 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:43:15.549445 tar[1121]: ./ Feb 12 19:43:15.549445 tar[1121]: ./loopback Feb 12 19:43:15.554106 tar[1125]: crictl Feb 12 19:43:15.583120 jq[1128]: true Feb 12 19:43:15.588910 extend-filesystems[1106]: Found vda Feb 12 19:43:15.601978 dbus-daemon[1102]: [system] SELinux support is enabled Feb 12 19:43:15.602738 systemd[1]: Started dbus.service. Feb 12 19:43:15.603280 extend-filesystems[1106]: Found vda1 Feb 12 19:43:15.604580 extend-filesystems[1106]: Found vda2 Feb 12 19:43:15.605365 extend-filesystems[1106]: Found vda3 Feb 12 19:43:15.606438 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:43:15.606481 systemd[1]: Reached target system-config.target. Feb 12 19:43:15.607072 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:43:15.607419 extend-filesystems[1106]: Found usr Feb 12 19:43:15.608663 extend-filesystems[1106]: Found vda4 Feb 12 19:43:15.610378 systemd[1]: Starting user-configdrive.service... Feb 12 19:43:15.613241 extend-filesystems[1106]: Found vda6 Feb 12 19:43:15.613241 extend-filesystems[1106]: Found vda7 Feb 12 19:43:15.613241 extend-filesystems[1106]: Found vda9 Feb 12 19:43:15.613241 extend-filesystems[1106]: Checking size of /dev/vda9 Feb 12 19:43:15.620163 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:43:15.620438 systemd[1]: Finished motdgen.service. Feb 12 19:43:15.699649 coreos-cloudinit[1143]: 2024/02/12 19:43:15 Checking availability of "cloud-drive" Feb 12 19:43:15.700504 coreos-cloudinit[1143]: 2024/02/12 19:43:15 Fetching user-data from datasource of type "cloud-drive" Feb 12 19:43:15.700640 coreos-cloudinit[1143]: 2024/02/12 19:43:15 Attempting to read from "/media/configdrive/openstack/latest/user_data" Feb 12 19:43:15.703841 coreos-cloudinit[1143]: 2024/02/12 19:43:15 Fetching meta-data from datasource of type "cloud-drive" Feb 12 19:43:15.704308 coreos-cloudinit[1143]: 2024/02/12 19:43:15 Attempting to read from "/media/configdrive/openstack/latest/meta_data.json" Feb 12 19:43:15.740982 extend-filesystems[1106]: Resized partition /dev/vda9 Feb 12 19:43:15.746187 update_engine[1117]: I0212 19:43:15.744596 1117 main.cc:92] Flatcar Update Engine starting Feb 12 19:43:15.753984 systemd[1]: Started update-engine.service. Feb 12 19:43:15.757764 update_engine[1117]: I0212 19:43:15.757544 1117 update_check_scheduler.cc:74] Next update check in 7m59s Feb 12 19:43:15.757828 systemd[1]: Started locksmithd.service. Feb 12 19:43:15.772770 extend-filesystems[1162]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 19:43:15.776350 coreos-cloudinit[1143]: Detected an Ignition config. Exiting... Feb 12 19:43:15.782549 systemd[1]: Finished user-configdrive.service. Feb 12 19:43:15.783295 systemd[1]: Reached target user-config.target. Feb 12 19:43:15.789238 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Feb 12 19:43:15.899337 env[1126]: time="2024-02-12T19:43:15.897635493Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:43:15.925053 bash[1164]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:43:15.925612 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:43:15.943677 coreos-metadata[1101]: Feb 12 19:43:15.943 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:43:15.948851 tar[1121]: ./bandwidth Feb 12 19:43:15.959656 coreos-metadata[1101]: Feb 12 19:43:15.959 INFO Fetch successful Feb 12 19:43:15.977763 env[1126]: time="2024-02-12T19:43:15.977681724Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:43:15.977970 env[1126]: time="2024-02-12T19:43:15.977938287Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:43:15.979618 unknown[1101]: wrote ssh authorized keys file for user: core Feb 12 19:43:15.981607 env[1126]: time="2024-02-12T19:43:15.980688216Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:43:15.981607 env[1126]: time="2024-02-12T19:43:15.980738434Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:43:15.983608 env[1126]: time="2024-02-12T19:43:15.983550916Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:43:15.983608 env[1126]: time="2024-02-12T19:43:15.983599779Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:43:15.984054 env[1126]: time="2024-02-12T19:43:15.983623415Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:43:15.984054 env[1126]: time="2024-02-12T19:43:15.983663653Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:43:15.984054 env[1126]: time="2024-02-12T19:43:15.983816411Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:43:15.984906 env[1126]: time="2024-02-12T19:43:15.984842701Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:43:15.985168 env[1126]: time="2024-02-12T19:43:15.985111063Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:43:15.985168 env[1126]: time="2024-02-12T19:43:15.985151592Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:43:15.985329 env[1126]: time="2024-02-12T19:43:15.985310750Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:43:15.985369 env[1126]: time="2024-02-12T19:43:15.985333248Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:43:16.007650 systemd-logind[1116]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 19:43:16.007724 systemd-logind[1116]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 19:43:16.009426 systemd-logind[1116]: New seat seat0. Feb 12 19:43:16.013549 systemd[1]: Started systemd-logind.service. Feb 12 19:43:16.101927 env[1126]: time="2024-02-12T19:43:16.091359090Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:43:16.101927 env[1126]: time="2024-02-12T19:43:16.091430934Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:43:16.101927 env[1126]: time="2024-02-12T19:43:16.091450276Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:43:16.101927 env[1126]: time="2024-02-12T19:43:16.091494922Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:43:16.101927 env[1126]: time="2024-02-12T19:43:16.091519770Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:43:16.101927 env[1126]: time="2024-02-12T19:43:16.091538169Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:43:16.101927 env[1126]: time="2024-02-12T19:43:16.091555119Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:43:16.101927 env[1126]: time="2024-02-12T19:43:16.091572919Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:43:16.101927 env[1126]: time="2024-02-12T19:43:16.091589883Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:43:16.101927 env[1126]: time="2024-02-12T19:43:16.091610426Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:43:16.101927 env[1126]: time="2024-02-12T19:43:16.091628619Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:43:16.101927 env[1126]: time="2024-02-12T19:43:16.091813348Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:43:16.104681 env[1126]: time="2024-02-12T19:43:16.104630856Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:43:16.104806 env[1126]: time="2024-02-12T19:43:16.104783609Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:43:16.105809 env[1126]: time="2024-02-12T19:43:16.105330510Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:43:16.105809 env[1126]: time="2024-02-12T19:43:16.105436837Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:43:16.105809 env[1126]: time="2024-02-12T19:43:16.105458701Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:43:16.105809 env[1126]: time="2024-02-12T19:43:16.105564444Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:43:16.105809 env[1126]: time="2024-02-12T19:43:16.105586959Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:43:16.105809 env[1126]: time="2024-02-12T19:43:16.105610930Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:43:16.105809 env[1126]: time="2024-02-12T19:43:16.105627182Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:43:16.105809 env[1126]: time="2024-02-12T19:43:16.105644486Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:43:16.105809 env[1126]: time="2024-02-12T19:43:16.105662365Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:43:16.105809 env[1126]: time="2024-02-12T19:43:16.105685671Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:43:16.105809 env[1126]: time="2024-02-12T19:43:16.105705440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:43:16.105809 env[1126]: time="2024-02-12T19:43:16.105727854Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:43:16.112763 env[1126]: time="2024-02-12T19:43:16.111520401Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:43:16.112763 env[1126]: time="2024-02-12T19:43:16.111579176Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:43:16.112763 env[1126]: time="2024-02-12T19:43:16.111604881Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:43:16.112763 env[1126]: time="2024-02-12T19:43:16.111623912Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:43:16.112763 env[1126]: time="2024-02-12T19:43:16.111651075Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:43:16.112763 env[1126]: time="2024-02-12T19:43:16.111675592Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:43:16.112763 env[1126]: time="2024-02-12T19:43:16.111705530Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:43:16.112763 env[1126]: time="2024-02-12T19:43:16.111760371Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:43:16.113016 env[1126]: time="2024-02-12T19:43:16.112062590Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:43:16.113016 env[1126]: time="2024-02-12T19:43:16.112145613Z" level=info msg="Connect containerd service" Feb 12 19:43:16.113016 env[1126]: time="2024-02-12T19:43:16.112228680Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:43:16.115413 env[1126]: time="2024-02-12T19:43:16.114018699Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:43:16.115413 env[1126]: time="2024-02-12T19:43:16.114805882Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:43:16.115413 env[1126]: time="2024-02-12T19:43:16.114861559Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:43:16.115413 env[1126]: time="2024-02-12T19:43:16.114934023Z" level=info msg="containerd successfully booted in 0.272446s" Feb 12 19:43:16.115564 update-ssh-keys[1173]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:43:16.115750 systemd[1]: Started containerd.service. Feb 12 19:43:16.117271 env[1126]: time="2024-02-12T19:43:16.117187763Z" level=info msg="Start subscribing containerd event" Feb 12 19:43:16.117448 env[1126]: time="2024-02-12T19:43:16.117431428Z" level=info msg="Start recovering state" Feb 12 19:43:16.117602 env[1126]: time="2024-02-12T19:43:16.117590119Z" level=info msg="Start event monitor" Feb 12 19:43:16.117670 env[1126]: time="2024-02-12T19:43:16.117657055Z" level=info msg="Start snapshots syncer" Feb 12 19:43:16.117737 env[1126]: time="2024-02-12T19:43:16.117724149Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:43:16.117798 env[1126]: time="2024-02-12T19:43:16.117785870Z" level=info msg="Start streaming server" Feb 12 19:43:16.120484 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 19:43:16.151257 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Feb 12 19:43:16.173364 locksmithd[1163]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:43:16.219231 extend-filesystems[1162]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 19:43:16.219231 extend-filesystems[1162]: old_desc_blocks = 1, new_desc_blocks = 8 Feb 12 19:43:16.219231 extend-filesystems[1162]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Feb 12 19:43:16.222967 extend-filesystems[1106]: Resized filesystem in /dev/vda9 Feb 12 19:43:16.222967 extend-filesystems[1106]: Found vdb Feb 12 19:43:16.221060 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:43:16.221339 systemd[1]: Finished extend-filesystems.service. Feb 12 19:43:16.241025 tar[1121]: ./ptp Feb 12 19:43:16.311035 tar[1121]: ./vlan Feb 12 19:43:16.368687 tar[1121]: ./host-device Feb 12 19:43:16.425274 tar[1121]: ./tuning Feb 12 19:43:16.429345 sshd_keygen[1133]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:43:16.498171 systemd[1]: Finished sshd-keygen.service. Feb 12 19:43:16.501472 systemd[1]: Starting issuegen.service... Feb 12 19:43:16.508441 tar[1121]: ./vrf Feb 12 19:43:16.512312 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:43:16.512595 systemd[1]: Finished issuegen.service. Feb 12 19:43:16.515394 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:43:16.538852 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:43:16.544075 systemd[1]: Started getty@tty1.service. Feb 12 19:43:16.547053 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 19:43:16.547927 systemd[1]: Reached target getty.target. Feb 12 19:43:16.573270 tar[1121]: ./sbr Feb 12 19:43:16.617428 tar[1121]: ./tap Feb 12 19:43:16.667565 tar[1121]: ./dhcp Feb 12 19:43:16.803759 tar[1121]: ./static Feb 12 19:43:16.845077 tar[1121]: ./firewall Feb 12 19:43:16.909750 tar[1121]: ./macvlan Feb 12 19:43:16.927128 systemd[1]: Finished prepare-critools.service. Feb 12 19:43:16.962809 tar[1121]: ./dummy Feb 12 19:43:16.999525 tar[1121]: ./bridge Feb 12 19:43:17.041924 tar[1121]: ./ipvlan Feb 12 19:43:17.082703 tar[1121]: ./portmap Feb 12 19:43:17.118978 tar[1121]: ./host-local Feb 12 19:43:17.167705 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:43:17.169058 systemd[1]: Reached target multi-user.target. Feb 12 19:43:17.172392 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:43:17.183321 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:43:17.183792 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:43:17.185105 systemd[1]: Startup finished in 1.048s (kernel) + 7.012s (initrd) + 11.351s (userspace) = 19.411s. Feb 12 19:43:25.380081 systemd[1]: Created slice system-sshd.slice. Feb 12 19:43:25.386858 systemd[1]: Started sshd@0-147.182.245.110:22-139.178.68.195:34220.service. Feb 12 19:43:25.525606 sshd[1195]: Accepted publickey for core from 139.178.68.195 port 34220 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:43:25.529873 sshd[1195]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:43:25.548386 systemd[1]: Created slice user-500.slice. Feb 12 19:43:25.550855 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:43:25.556690 systemd-logind[1116]: New session 1 of user core. Feb 12 19:43:25.569855 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:43:25.572342 systemd[1]: Starting user@500.service... Feb 12 19:43:25.578700 (systemd)[1198]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:43:25.686858 systemd[1198]: Queued start job for default target default.target. Feb 12 19:43:25.687609 systemd[1198]: Reached target paths.target. Feb 12 19:43:25.687634 systemd[1198]: Reached target sockets.target. Feb 12 19:43:25.687647 systemd[1198]: Reached target timers.target. Feb 12 19:43:25.687660 systemd[1198]: Reached target basic.target. Feb 12 19:43:25.687829 systemd[1]: Started user@500.service. Feb 12 19:43:25.689309 systemd[1]: Started session-1.scope. Feb 12 19:43:25.689831 systemd[1198]: Reached target default.target. Feb 12 19:43:25.689999 systemd[1198]: Startup finished in 100ms. Feb 12 19:43:25.759430 systemd[1]: Started sshd@1-147.182.245.110:22-139.178.68.195:34224.service. Feb 12 19:43:25.818908 sshd[1207]: Accepted publickey for core from 139.178.68.195 port 34224 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:43:25.821580 sshd[1207]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:43:25.829792 systemd-logind[1116]: New session 2 of user core. Feb 12 19:43:25.830414 systemd[1]: Started session-2.scope. Feb 12 19:43:25.913560 sshd[1207]: pam_unix(sshd:session): session closed for user core Feb 12 19:43:25.920511 systemd[1]: sshd@1-147.182.245.110:22-139.178.68.195:34224.service: Deactivated successfully. Feb 12 19:43:25.921728 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 19:43:25.925070 systemd-logind[1116]: Session 2 logged out. Waiting for processes to exit. Feb 12 19:43:25.927594 systemd[1]: Started sshd@2-147.182.245.110:22-139.178.68.195:34236.service. Feb 12 19:43:25.930763 systemd-logind[1116]: Removed session 2. Feb 12 19:43:25.985973 sshd[1213]: Accepted publickey for core from 139.178.68.195 port 34236 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:43:25.989061 sshd[1213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:43:25.997194 systemd[1]: Started session-3.scope. Feb 12 19:43:25.997884 systemd-logind[1116]: New session 3 of user core. Feb 12 19:43:26.062044 sshd[1213]: pam_unix(sshd:session): session closed for user core Feb 12 19:43:26.067977 systemd[1]: sshd@2-147.182.245.110:22-139.178.68.195:34236.service: Deactivated successfully. Feb 12 19:43:26.068959 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 19:43:26.071129 systemd[1]: Started sshd@3-147.182.245.110:22-139.178.68.195:51216.service. Feb 12 19:43:26.073615 systemd-logind[1116]: Session 3 logged out. Waiting for processes to exit. Feb 12 19:43:26.075019 systemd-logind[1116]: Removed session 3. Feb 12 19:43:26.129263 sshd[1219]: Accepted publickey for core from 139.178.68.195 port 51216 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:43:26.131700 sshd[1219]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:43:26.138687 systemd-logind[1116]: New session 4 of user core. Feb 12 19:43:26.139478 systemd[1]: Started session-4.scope. Feb 12 19:43:26.213791 sshd[1219]: pam_unix(sshd:session): session closed for user core Feb 12 19:43:26.221865 systemd[1]: Started sshd@4-147.182.245.110:22-139.178.68.195:51222.service. Feb 12 19:43:26.223039 systemd[1]: sshd@3-147.182.245.110:22-139.178.68.195:51216.service: Deactivated successfully. Feb 12 19:43:26.224288 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:43:26.226104 systemd-logind[1116]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:43:26.227524 systemd-logind[1116]: Removed session 4. Feb 12 19:43:26.279926 sshd[1224]: Accepted publickey for core from 139.178.68.195 port 51222 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:43:26.282695 sshd[1224]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:43:26.292044 systemd[1]: Started session-5.scope. Feb 12 19:43:26.292636 systemd-logind[1116]: New session 5 of user core. Feb 12 19:43:26.401946 sudo[1228]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:43:26.402852 sudo[1228]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:43:26.419298 dbus-daemon[1102]: н\xc6 \u0001V: received setenforce notice (enforcing=1323139424) Feb 12 19:43:26.420605 sudo[1228]: pam_unix(sudo:session): session closed for user root Feb 12 19:43:26.425947 sshd[1224]: pam_unix(sshd:session): session closed for user core Feb 12 19:43:26.434617 systemd[1]: Started sshd@5-147.182.245.110:22-139.178.68.195:51232.service. Feb 12 19:43:26.435692 systemd[1]: sshd@4-147.182.245.110:22-139.178.68.195:51222.service: Deactivated successfully. Feb 12 19:43:26.437466 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:43:26.438925 systemd-logind[1116]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:43:26.440909 systemd-logind[1116]: Removed session 5. Feb 12 19:43:26.495975 sshd[1231]: Accepted publickey for core from 139.178.68.195 port 51232 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:43:26.498913 sshd[1231]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:43:26.506309 systemd-logind[1116]: New session 6 of user core. Feb 12 19:43:26.507921 systemd[1]: Started session-6.scope. Feb 12 19:43:26.579115 sudo[1236]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:43:26.580230 sudo[1236]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:43:26.586453 sudo[1236]: pam_unix(sudo:session): session closed for user root Feb 12 19:43:26.596120 sudo[1235]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:43:26.596752 sudo[1235]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:43:26.617674 systemd[1]: Stopping audit-rules.service... Feb 12 19:43:26.619000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:43:26.621052 auditctl[1239]: No rules Feb 12 19:43:26.621426 kernel: kauditd_printk_skb: 192 callbacks suppressed Feb 12 19:43:26.621500 kernel: audit: type=1305 audit(1707767006.619:179): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:43:26.622547 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:43:26.622940 systemd[1]: Stopped audit-rules.service. Feb 12 19:43:26.619000 audit[1239]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffda55f4480 a2=420 a3=0 items=0 ppid=1 pid=1239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:26.627856 systemd[1]: Starting audit-rules.service... Feb 12 19:43:26.628960 kernel: audit: type=1300 audit(1707767006.619:179): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffda55f4480 a2=420 a3=0 items=0 ppid=1 pid=1239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:26.619000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:43:26.635268 kernel: audit: type=1327 audit(1707767006.619:179): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:43:26.635403 kernel: audit: type=1131 audit(1707767006.620:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:26.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:26.667652 augenrules[1256]: No rules Feb 12 19:43:26.679309 kernel: audit: type=1130 audit(1707767006.668:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:26.679449 kernel: audit: type=1106 audit(1707767006.676:182): pid=1235 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:43:26.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:26.676000 audit[1235]: USER_END pid=1235 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:43:26.677902 sudo[1235]: pam_unix(sudo:session): session closed for user root Feb 12 19:43:26.669971 systemd[1]: Finished audit-rules.service. Feb 12 19:43:26.676000 audit[1235]: CRED_DISP pid=1235 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:43:26.686602 kernel: audit: type=1104 audit(1707767006.676:183): pid=1235 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:43:26.690416 sshd[1231]: pam_unix(sshd:session): session closed for user core Feb 12 19:43:26.703260 kernel: audit: type=1106 audit(1707767006.692:184): pid=1231 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:43:26.692000 audit[1231]: USER_END pid=1231 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:43:26.697051 systemd[1]: sshd@5-147.182.245.110:22-139.178.68.195:51232.service: Deactivated successfully. Feb 12 19:43:26.698291 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:43:26.702041 systemd[1]: Started sshd@6-147.182.245.110:22-139.178.68.195:51240.service. Feb 12 19:43:26.707365 systemd-logind[1116]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:43:26.692000 audit[1231]: CRED_DISP pid=1231 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:43:26.712383 kernel: audit: type=1104 audit(1707767006.692:185): pid=1231 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:43:26.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.182.245.110:22-139.178.68.195:51232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:26.718319 kernel: audit: type=1131 audit(1707767006.693:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.182.245.110:22-139.178.68.195:51232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:26.718650 systemd-logind[1116]: Removed session 6. Feb 12 19:43:26.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.182.245.110:22-139.178.68.195:51240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:26.768000 audit[1262]: USER_ACCT pid=1262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:43:26.769539 sshd[1262]: Accepted publickey for core from 139.178.68.195 port 51240 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:43:26.770000 audit[1262]: CRED_ACQ pid=1262 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:43:26.771000 audit[1262]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff59ccc350 a2=3 a3=0 items=0 ppid=1 pid=1262 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:26.771000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:43:26.773178 sshd[1262]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:43:26.781519 systemd[1]: Started session-7.scope. Feb 12 19:43:26.782949 systemd-logind[1116]: New session 7 of user core. Feb 12 19:43:26.794000 audit[1262]: USER_START pid=1262 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:43:26.797000 audit[1264]: CRED_ACQ pid=1264 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:43:26.855000 audit[1265]: USER_ACCT pid=1265 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:43:26.857375 sudo[1265]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:43:26.856000 audit[1265]: CRED_REFR pid=1265 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:43:26.858670 sudo[1265]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:43:26.865000 audit[1265]: USER_START pid=1265 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:43:27.451326 systemd[1]: Reloading. Feb 12 19:43:27.579762 /usr/lib/systemd/system-generators/torcx-generator[1295]: time="2024-02-12T19:43:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:43:27.579807 /usr/lib/systemd/system-generators/torcx-generator[1295]: time="2024-02-12T19:43:27Z" level=info msg="torcx already run" Feb 12 19:43:27.742497 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:43:27.743188 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:43:27.782819 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:43:27.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.880000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.880000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.881000 audit: BPF prog-id=34 op=LOAD Feb 12 19:43:27.881000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:43:27.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit: BPF prog-id=35 op=LOAD Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.883000 audit: BPF prog-id=36 op=LOAD Feb 12 19:43:27.883000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:43:27.883000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:43:27.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.885000 audit: BPF prog-id=37 op=LOAD Feb 12 19:43:27.885000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:43:27.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.887000 audit: BPF prog-id=38 op=LOAD Feb 12 19:43:27.887000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:43:27.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.889000 audit: BPF prog-id=39 op=LOAD Feb 12 19:43:27.889000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit: BPF prog-id=40 op=LOAD Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.891000 audit: BPF prog-id=41 op=LOAD Feb 12 19:43:27.891000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:43:27.891000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:43:27.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.893000 audit: BPF prog-id=42 op=LOAD Feb 12 19:43:27.894000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:43:27.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.894000 audit: BPF prog-id=43 op=LOAD Feb 12 19:43:27.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.895000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.895000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.895000 audit: BPF prog-id=44 op=LOAD Feb 12 19:43:27.896000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:43:27.896000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:43:27.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.898000 audit: BPF prog-id=45 op=LOAD Feb 12 19:43:27.899000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:43:27.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.902000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.903000 audit: BPF prog-id=46 op=LOAD Feb 12 19:43:27.903000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:43:27.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.905000 audit: BPF prog-id=47 op=LOAD Feb 12 19:43:27.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:27.905000 audit: BPF prog-id=48 op=LOAD Feb 12 19:43:27.906000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:43:27.906000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:43:27.920477 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:43:27.930364 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:43:27.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:27.933495 systemd[1]: Reached target network-online.target. Feb 12 19:43:27.937858 systemd[1]: Started kubelet.service. Feb 12 19:43:27.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:27.960129 systemd[1]: Starting coreos-metadata.service... Feb 12 19:43:28.022319 coreos-metadata[1349]: Feb 12 19:43:28.021 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:43:28.042252 coreos-metadata[1349]: Feb 12 19:43:28.040 INFO Fetch successful Feb 12 19:43:28.067085 systemd[1]: Finished coreos-metadata.service. Feb 12 19:43:28.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:28.081495 kubelet[1341]: E0212 19:43:28.081420 1341 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:43:28.084885 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:43:28.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:43:28.085096 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:43:28.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:28.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:28.694356 systemd[1]: Stopped kubelet.service. Feb 12 19:43:28.732353 systemd[1]: Reloading. Feb 12 19:43:28.845776 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2024-02-12T19:43:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:43:28.845808 /usr/lib/systemd/system-generators/torcx-generator[1406]: time="2024-02-12T19:43:28Z" level=info msg="torcx already run" Feb 12 19:43:29.012562 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:43:29.012599 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:43:29.054402 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:43:29.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.156000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit: BPF prog-id=49 op=LOAD Feb 12 19:43:29.157000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit: BPF prog-id=50 op=LOAD Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.157000 audit: BPF prog-id=51 op=LOAD Feb 12 19:43:29.157000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:43:29.157000 audit: BPF prog-id=36 op=UNLOAD Feb 12 19:43:29.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.159000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.159000 audit: BPF prog-id=52 op=LOAD Feb 12 19:43:29.159000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:43:29.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.160000 audit: BPF prog-id=53 op=LOAD Feb 12 19:43:29.160000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:43:29.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit: BPF prog-id=54 op=LOAD Feb 12 19:43:29.162000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit: BPF prog-id=55 op=LOAD Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.162000 audit: BPF prog-id=56 op=LOAD Feb 12 19:43:29.162000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:43:29.162000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:43:29.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.164000 audit: BPF prog-id=57 op=LOAD Feb 12 19:43:29.164000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:43:29.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit: BPF prog-id=58 op=LOAD Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.165000 audit: BPF prog-id=59 op=LOAD Feb 12 19:43:29.165000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:43:29.165000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:43:29.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.167000 audit: BPF prog-id=60 op=LOAD Feb 12 19:43:29.167000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:43:29.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.171000 audit: BPF prog-id=61 op=LOAD Feb 12 19:43:29.171000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:43:29.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit: BPF prog-id=62 op=LOAD Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:29.173000 audit: BPF prog-id=63 op=LOAD Feb 12 19:43:29.173000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:43:29.173000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:43:29.200338 systemd[1]: Started kubelet.service. Feb 12 19:43:29.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:29.324939 kubelet[1452]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:43:29.324939 kubelet[1452]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:43:29.324939 kubelet[1452]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:43:29.324939 kubelet[1452]: I0212 19:43:29.319985 1452 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:43:30.926907 kubelet[1452]: I0212 19:43:30.926290 1452 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 19:43:30.926907 kubelet[1452]: I0212 19:43:30.926353 1452 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:43:30.926907 kubelet[1452]: I0212 19:43:30.926848 1452 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 19:43:30.931526 kubelet[1452]: I0212 19:43:30.931457 1452 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:43:30.943740 kubelet[1452]: I0212 19:43:30.943692 1452 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:43:30.944677 kubelet[1452]: I0212 19:43:30.944639 1452 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:43:30.946048 kubelet[1452]: I0212 19:43:30.945345 1452 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 19:43:30.946577 kubelet[1452]: I0212 19:43:30.946549 1452 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 19:43:30.946732 kubelet[1452]: I0212 19:43:30.946716 1452 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 19:43:30.947022 kubelet[1452]: I0212 19:43:30.946996 1452 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:43:30.947632 kubelet[1452]: I0212 19:43:30.947608 1452 kubelet.go:393] "Attempting to sync node with API server" Feb 12 19:43:30.947783 kubelet[1452]: I0212 19:43:30.947768 1452 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:43:30.947909 kubelet[1452]: I0212 19:43:30.947896 1452 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:43:30.948026 kubelet[1452]: I0212 19:43:30.948012 1452 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:43:30.950061 kubelet[1452]: E0212 19:43:30.950022 1452 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:30.950888 kubelet[1452]: E0212 19:43:30.950802 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:30.952667 kubelet[1452]: I0212 19:43:30.952632 1452 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:43:30.953757 kubelet[1452]: W0212 19:43:30.953719 1452 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:43:30.957483 kubelet[1452]: I0212 19:43:30.957384 1452 server.go:1232] "Started kubelet" Feb 12 19:43:30.958000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:30.958000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:43:30.958000 audit[1452]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ba1740 a1=c000ba8b10 a2=c000ba1710 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:30.958000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:43:30.961236 kubelet[1452]: I0212 19:43:30.961169 1452 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:43:30.961000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:30.961000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:43:30.961000 audit[1452]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb4000 a1=c000cc2018 a2=c000d18060 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:30.961000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:43:30.963553 kubelet[1452]: I0212 19:43:30.962993 1452 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:43:30.963553 kubelet[1452]: I0212 19:43:30.963236 1452 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:43:30.965726 kubelet[1452]: I0212 19:43:30.961455 1452 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:43:30.969162 kubelet[1452]: I0212 19:43:30.969121 1452 server.go:462] "Adding debug handlers to kubelet server" Feb 12 19:43:30.973817 kubelet[1452]: I0212 19:43:30.961516 1452 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:43:30.974534 kubelet[1452]: I0212 19:43:30.974499 1452 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 19:43:30.974755 kubelet[1452]: E0212 19:43:30.962877 1452 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:43:30.974982 kubelet[1452]: E0212 19:43:30.974957 1452 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:43:30.986187 kubelet[1452]: I0212 19:43:30.986146 1452 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 19:43:30.987305 kubelet[1452]: I0212 19:43:30.987269 1452 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:43:30.987592 kubelet[1452]: I0212 19:43:30.987572 1452 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 19:43:30.993602 kubelet[1452]: E0212 19:43:30.993431 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c5f3df488", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 30, 957325448, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 30, 957325448, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:30.994370 kubelet[1452]: W0212 19:43:30.994335 1452 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "147.182.245.110" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:43:30.994639 kubelet[1452]: E0212 19:43:30.994617 1452 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "147.182.245.110" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:43:30.994894 kubelet[1452]: W0212 19:43:30.994869 1452 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:43:30.995057 kubelet[1452]: E0212 19:43:30.995039 1452 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:43:30.995305 kubelet[1452]: E0212 19:43:30.995284 1452 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"147.182.245.110\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 12 19:43:30.996915 kubelet[1452]: E0212 19:43:30.996787 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c604a7797", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 30, 974922647, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 30, 974922647, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:30.998817 kubelet[1452]: W0212 19:43:30.998774 1452 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:43:30.999034 kubelet[1452]: E0212 19:43:30.999012 1452 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:43:31.035416 kubelet[1452]: I0212 19:43:31.035378 1452 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:43:31.035664 kubelet[1452]: I0212 19:43:31.035646 1452 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:43:31.035791 kubelet[1452]: I0212 19:43:31.035776 1452 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:43:31.040245 kubelet[1452]: E0212 19:43:31.039879 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c63d4756f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 147.182.245.110 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34297711, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34297711, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:31.043101 kubelet[1452]: I0212 19:43:31.043057 1452 policy_none.go:49] "None policy: Start" Feb 12 19:43:31.043560 kubelet[1452]: E0212 19:43:31.043018 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c63d4f3d1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 147.182.245.110 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34330065, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34330065, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:31.047004 kubelet[1452]: I0212 19:43:31.045458 1452 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:43:31.047004 kubelet[1452]: I0212 19:43:31.045540 1452 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:43:31.053000 audit[1467]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1467 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:31.053000 audit[1467]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd5ef18400 a2=0 a3=7ffd5ef183ec items=0 ppid=1452 pid=1467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:31.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:43:31.055071 kubelet[1452]: E0212 19:43:31.054524 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c63d5021b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 147.182.245.110 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34333723, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34333723, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:31.057000 audit[1470]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:31.057000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff6e40b600 a2=0 a3=7fff6e40b5ec items=0 ppid=1452 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:31.057000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:43:31.061779 systemd[1]: Created slice kubepods.slice. Feb 12 19:43:31.073636 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:43:31.085328 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:43:31.089506 kubelet[1452]: I0212 19:43:31.089474 1452 kubelet_node_status.go:70] "Attempting to register node" node="147.182.245.110" Feb 12 19:43:31.093555 kubelet[1452]: E0212 19:43:31.093279 1452 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="147.182.245.110" Feb 12 19:43:31.094510 kubelet[1452]: E0212 19:43:31.093941 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c63d4756f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 147.182.245.110 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34297711, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 89402813, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events "147.182.245.110.17b3350c63d4756f" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:31.095159 kubelet[1452]: I0212 19:43:31.095115 1452 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:43:31.095500 kubelet[1452]: I0212 19:43:31.095462 1452 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:43:31.094000 audit[1452]: AVC avc: denied { mac_admin } for pid=1452 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:31.094000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:43:31.094000 audit[1452]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ea56e0 a1=c000efa138 a2=c000ea56b0 a3=25 items=0 ppid=1 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:31.094000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:43:31.096555 kubelet[1452]: I0212 19:43:31.095935 1452 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:43:31.101417 kubelet[1452]: E0212 19:43:31.099568 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c63d4f3d1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 147.182.245.110 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34330065, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 89417607, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events "147.182.245.110.17b3350c63d4f3d1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:31.102049 kubelet[1452]: E0212 19:43:31.101998 1452 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"147.182.245.110\" not found" Feb 12 19:43:31.103188 kubelet[1452]: E0212 19:43:31.103047 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c63d5021b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 147.182.245.110 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34333723, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 89420380, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events "147.182.245.110.17b3350c63d5021b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:31.070000 audit[1472]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:31.070000 audit[1472]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd3cbbe390 a2=0 a3=7ffd3cbbe37c items=0 ppid=1452 pid=1472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:31.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:43:31.109465 kubelet[1452]: E0212 19:43:31.109327 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c67e54bdd", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 102510045, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 102510045, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:31.116000 audit[1478]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1478 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:31.116000 audit[1478]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdd2d94f80 a2=0 a3=7ffdd2d94f6c items=0 ppid=1452 pid=1478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:31.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:43:31.202742 kubelet[1452]: E0212 19:43:31.198386 1452 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"147.182.245.110\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 12 19:43:31.202000 audit[1483]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1483 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:31.202000 audit[1483]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc4dcc7070 a2=0 a3=7ffc4dcc705c items=0 ppid=1452 pid=1483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:31.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:43:31.208620 kubelet[1452]: I0212 19:43:31.206358 1452 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 19:43:31.208000 audit[1484]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:31.208000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeb73731f0 a2=0 a3=7ffeb73731dc items=0 ppid=1452 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:31.208000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:43:31.210328 kubelet[1452]: I0212 19:43:31.210292 1452 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 19:43:31.210476 kubelet[1452]: I0212 19:43:31.210459 1452 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 19:43:31.210836 kubelet[1452]: I0212 19:43:31.210799 1452 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 19:43:31.211024 kubelet[1452]: E0212 19:43:31.211010 1452 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:43:31.211000 audit[1485]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:31.211000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9080c710 a2=0 a3=7ffd9080c6fc items=0 ppid=1452 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:31.211000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:43:31.214000 audit[1487]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:31.214000 audit[1486]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:31.214000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6667c9b0 a2=0 a3=10e3 items=0 ppid=1452 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:31.214000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:43:31.217073 kubelet[1452]: W0212 19:43:31.217030 1452 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:43:31.214000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe98fd0810 a2=0 a3=7ffe98fd07fc items=0 ppid=1452 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:31.218457 kubelet[1452]: E0212 19:43:31.217341 1452 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:43:31.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:43:31.218000 audit[1488]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:31.218000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff0eec2ed0 a2=0 a3=7fff0eec2ebc items=0 ppid=1452 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:31.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:43:31.220000 audit[1489]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:31.220000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdfcc96470 a2=0 a3=7ffdfcc9645c items=0 ppid=1452 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:31.220000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:43:31.221000 audit[1490]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:31.221000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff559d07e0 a2=0 a3=7fff559d07cc items=0 ppid=1452 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:31.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:43:31.297395 kubelet[1452]: I0212 19:43:31.297342 1452 kubelet_node_status.go:70] "Attempting to register node" node="147.182.245.110" Feb 12 19:43:31.299921 kubelet[1452]: E0212 19:43:31.299871 1452 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="147.182.245.110" Feb 12 19:43:31.312530 kubelet[1452]: E0212 19:43:31.300883 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c63d4756f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 147.182.245.110 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34297711, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 297272169, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events "147.182.245.110.17b3350c63d4756f" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:31.317745 kubelet[1452]: E0212 19:43:31.317089 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c63d4f3d1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 147.182.245.110 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34330065, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 297282515, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events "147.182.245.110.17b3350c63d4f3d1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:31.320929 kubelet[1452]: E0212 19:43:31.320651 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c63d5021b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 147.182.245.110 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34333723, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 297287590, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events "147.182.245.110.17b3350c63d5021b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:31.610781 kubelet[1452]: E0212 19:43:31.609411 1452 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"147.182.245.110\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 12 19:43:31.702876 kubelet[1452]: I0212 19:43:31.702327 1452 kubelet_node_status.go:70] "Attempting to register node" node="147.182.245.110" Feb 12 19:43:31.713352 kubelet[1452]: E0212 19:43:31.712586 1452 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="147.182.245.110" Feb 12 19:43:31.713352 kubelet[1452]: E0212 19:43:31.712689 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c63d4756f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 147.182.245.110 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34297711, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 702248956, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events "147.182.245.110.17b3350c63d4756f" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:31.719596 kubelet[1452]: E0212 19:43:31.718764 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c63d4f3d1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 147.182.245.110 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34330065, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 702278668, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events "147.182.245.110.17b3350c63d4f3d1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:31.721618 kubelet[1452]: E0212 19:43:31.721389 1452 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110.17b3350c63d5021b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"147.182.245.110", UID:"147.182.245.110", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 147.182.245.110 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"147.182.245.110"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 34333723, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 43, 31, 702282818, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"147.182.245.110"}': 'events "147.182.245.110.17b3350c63d5021b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:43:31.930438 kubelet[1452]: I0212 19:43:31.930338 1452 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 19:43:31.951717 kubelet[1452]: E0212 19:43:31.951625 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:32.378352 kubelet[1452]: E0212 19:43:32.378173 1452 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "147.182.245.110" not found Feb 12 19:43:32.426897 kubelet[1452]: E0212 19:43:32.426795 1452 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"147.182.245.110\" not found" node="147.182.245.110" Feb 12 19:43:32.515324 kubelet[1452]: I0212 19:43:32.515275 1452 kubelet_node_status.go:70] "Attempting to register node" node="147.182.245.110" Feb 12 19:43:32.536406 kubelet[1452]: I0212 19:43:32.535895 1452 kubelet_node_status.go:73] "Successfully registered node" node="147.182.245.110" Feb 12 19:43:32.673258 kubelet[1452]: I0212 19:43:32.673193 1452 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 19:43:32.673776 env[1126]: time="2024-02-12T19:43:32.673714606Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:43:32.675030 kubelet[1452]: I0212 19:43:32.674982 1452 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 19:43:32.751341 sudo[1265]: pam_unix(sudo:session): session closed for user root Feb 12 19:43:32.750000 audit[1265]: USER_END pid=1265 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:43:32.752978 kernel: kauditd_printk_skb: 410 callbacks suppressed Feb 12 19:43:32.753160 kernel: audit: type=1106 audit(1707767012.750:562): pid=1265 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:43:32.753000 audit[1265]: CRED_DISP pid=1265 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:43:32.762002 kernel: audit: type=1104 audit(1707767012.753:563): pid=1265 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:43:32.763555 sshd[1262]: pam_unix(sshd:session): session closed for user core Feb 12 19:43:32.777935 systemd[1]: sshd@6-147.182.245.110:22-139.178.68.195:51240.service: Deactivated successfully. Feb 12 19:43:32.779091 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:43:32.789689 kernel: audit: type=1106 audit(1707767012.773:564): pid=1262 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:43:32.789823 kernel: audit: type=1104 audit(1707767012.773:565): pid=1262 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:43:32.773000 audit[1262]: USER_END pid=1262 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:43:32.773000 audit[1262]: CRED_DISP pid=1262 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:43:32.792829 systemd-logind[1116]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:43:32.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.182.245.110:22-139.178.68.195:51240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:32.795332 systemd-logind[1116]: Removed session 7. Feb 12 19:43:32.797290 kernel: audit: type=1131 audit(1707767012.776:566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.182.245.110:22-139.178.68.195:51240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:43:32.952807 kubelet[1452]: E0212 19:43:32.952442 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:32.954989 kubelet[1452]: I0212 19:43:32.952495 1452 apiserver.go:52] "Watching apiserver" Feb 12 19:43:32.962665 kubelet[1452]: I0212 19:43:32.962602 1452 topology_manager.go:215] "Topology Admit Handler" podUID="eb3de0af-eb6e-49e6-9424-e910de0fb17d" podNamespace="calico-system" podName="calico-node-fggcf" Feb 12 19:43:32.963146 kubelet[1452]: I0212 19:43:32.963066 1452 topology_manager.go:215] "Topology Admit Handler" podUID="91c2c594-31ce-4082-9992-a9001ced4b19" podNamespace="calico-system" podName="csi-node-driver-2h4rf" Feb 12 19:43:32.963465 kubelet[1452]: I0212 19:43:32.963443 1452 topology_manager.go:215] "Topology Admit Handler" podUID="b3efa4a0-a8ac-4259-a8bf-e6228daf04af" podNamespace="kube-system" podName="kube-proxy-2tmfq" Feb 12 19:43:32.966632 kubelet[1452]: E0212 19:43:32.966571 1452 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2h4rf" podUID="91c2c594-31ce-4082-9992-a9001ced4b19" Feb 12 19:43:32.977723 systemd[1]: Created slice kubepods-besteffort-podb3efa4a0_a8ac_4259_a8bf_e6228daf04af.slice. Feb 12 19:43:32.982781 systemd[1]: Created slice kubepods-besteffort-podeb3de0af_eb6e_49e6_9424_e910de0fb17d.slice. Feb 12 19:43:32.993171 kubelet[1452]: I0212 19:43:32.993069 1452 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:43:33.040575 kubelet[1452]: I0212 19:43:33.015563 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b3efa4a0-a8ac-4259-a8bf-e6228daf04af-kube-proxy\") pod \"kube-proxy-2tmfq\" (UID: \"b3efa4a0-a8ac-4259-a8bf-e6228daf04af\") " pod="kube-system/kube-proxy-2tmfq" Feb 12 19:43:33.040575 kubelet[1452]: I0212 19:43:33.015636 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/eb3de0af-eb6e-49e6-9424-e910de0fb17d-xtables-lock\") pod \"calico-node-fggcf\" (UID: \"eb3de0af-eb6e-49e6-9424-e910de0fb17d\") " pod="calico-system/calico-node-fggcf" Feb 12 19:43:33.040575 kubelet[1452]: I0212 19:43:33.015674 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/eb3de0af-eb6e-49e6-9424-e910de0fb17d-var-run-calico\") pod \"calico-node-fggcf\" (UID: \"eb3de0af-eb6e-49e6-9424-e910de0fb17d\") " pod="calico-system/calico-node-fggcf" Feb 12 19:43:33.040575 kubelet[1452]: I0212 19:43:33.015703 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/eb3de0af-eb6e-49e6-9424-e910de0fb17d-cni-bin-dir\") pod \"calico-node-fggcf\" (UID: \"eb3de0af-eb6e-49e6-9424-e910de0fb17d\") " pod="calico-system/calico-node-fggcf" Feb 12 19:43:33.040575 kubelet[1452]: I0212 19:43:33.015738 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rr9lh\" (UniqueName: \"kubernetes.io/projected/eb3de0af-eb6e-49e6-9424-e910de0fb17d-kube-api-access-rr9lh\") pod \"calico-node-fggcf\" (UID: \"eb3de0af-eb6e-49e6-9424-e910de0fb17d\") " pod="calico-system/calico-node-fggcf" Feb 12 19:43:33.041143 kubelet[1452]: I0212 19:43:33.015768 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7tzdf\" (UniqueName: \"kubernetes.io/projected/91c2c594-31ce-4082-9992-a9001ced4b19-kube-api-access-7tzdf\") pod \"csi-node-driver-2h4rf\" (UID: \"91c2c594-31ce-4082-9992-a9001ced4b19\") " pod="calico-system/csi-node-driver-2h4rf" Feb 12 19:43:33.041143 kubelet[1452]: I0212 19:43:33.015797 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/91c2c594-31ce-4082-9992-a9001ced4b19-varrun\") pod \"csi-node-driver-2h4rf\" (UID: \"91c2c594-31ce-4082-9992-a9001ced4b19\") " pod="calico-system/csi-node-driver-2h4rf" Feb 12 19:43:33.041143 kubelet[1452]: I0212 19:43:33.015826 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/91c2c594-31ce-4082-9992-a9001ced4b19-registration-dir\") pod \"csi-node-driver-2h4rf\" (UID: \"91c2c594-31ce-4082-9992-a9001ced4b19\") " pod="calico-system/csi-node-driver-2h4rf" Feb 12 19:43:33.041143 kubelet[1452]: I0212 19:43:33.015860 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b3efa4a0-a8ac-4259-a8bf-e6228daf04af-lib-modules\") pod \"kube-proxy-2tmfq\" (UID: \"b3efa4a0-a8ac-4259-a8bf-e6228daf04af\") " pod="kube-system/kube-proxy-2tmfq" Feb 12 19:43:33.041143 kubelet[1452]: I0212 19:43:33.015963 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/eb3de0af-eb6e-49e6-9424-e910de0fb17d-lib-modules\") pod \"calico-node-fggcf\" (UID: \"eb3de0af-eb6e-49e6-9424-e910de0fb17d\") " pod="calico-system/calico-node-fggcf" Feb 12 19:43:33.043851 kubelet[1452]: I0212 19:43:33.016001 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/eb3de0af-eb6e-49e6-9424-e910de0fb17d-cni-net-dir\") pod \"calico-node-fggcf\" (UID: \"eb3de0af-eb6e-49e6-9424-e910de0fb17d\") " pod="calico-system/calico-node-fggcf" Feb 12 19:43:33.043851 kubelet[1452]: I0212 19:43:33.016032 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/eb3de0af-eb6e-49e6-9424-e910de0fb17d-cni-log-dir\") pod \"calico-node-fggcf\" (UID: \"eb3de0af-eb6e-49e6-9424-e910de0fb17d\") " pod="calico-system/calico-node-fggcf" Feb 12 19:43:33.043851 kubelet[1452]: I0212 19:43:33.016076 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b3efa4a0-a8ac-4259-a8bf-e6228daf04af-xtables-lock\") pod \"kube-proxy-2tmfq\" (UID: \"b3efa4a0-a8ac-4259-a8bf-e6228daf04af\") " pod="kube-system/kube-proxy-2tmfq" Feb 12 19:43:33.043851 kubelet[1452]: I0212 19:43:33.016107 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/91c2c594-31ce-4082-9992-a9001ced4b19-kubelet-dir\") pod \"csi-node-driver-2h4rf\" (UID: \"91c2c594-31ce-4082-9992-a9001ced4b19\") " pod="calico-system/csi-node-driver-2h4rf" Feb 12 19:43:33.043851 kubelet[1452]: I0212 19:43:33.016134 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/91c2c594-31ce-4082-9992-a9001ced4b19-socket-dir\") pod \"csi-node-driver-2h4rf\" (UID: \"91c2c594-31ce-4082-9992-a9001ced4b19\") " pod="calico-system/csi-node-driver-2h4rf" Feb 12 19:43:33.044164 kubelet[1452]: I0212 19:43:33.016168 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h76db\" (UniqueName: \"kubernetes.io/projected/b3efa4a0-a8ac-4259-a8bf-e6228daf04af-kube-api-access-h76db\") pod \"kube-proxy-2tmfq\" (UID: \"b3efa4a0-a8ac-4259-a8bf-e6228daf04af\") " pod="kube-system/kube-proxy-2tmfq" Feb 12 19:43:33.044164 kubelet[1452]: I0212 19:43:33.016214 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/eb3de0af-eb6e-49e6-9424-e910de0fb17d-policysync\") pod \"calico-node-fggcf\" (UID: \"eb3de0af-eb6e-49e6-9424-e910de0fb17d\") " pod="calico-system/calico-node-fggcf" Feb 12 19:43:33.044164 kubelet[1452]: I0212 19:43:33.016248 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/eb3de0af-eb6e-49e6-9424-e910de0fb17d-tigera-ca-bundle\") pod \"calico-node-fggcf\" (UID: \"eb3de0af-eb6e-49e6-9424-e910de0fb17d\") " pod="calico-system/calico-node-fggcf" Feb 12 19:43:33.044164 kubelet[1452]: I0212 19:43:33.016276 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/eb3de0af-eb6e-49e6-9424-e910de0fb17d-node-certs\") pod \"calico-node-fggcf\" (UID: \"eb3de0af-eb6e-49e6-9424-e910de0fb17d\") " pod="calico-system/calico-node-fggcf" Feb 12 19:43:33.044164 kubelet[1452]: I0212 19:43:33.016305 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/eb3de0af-eb6e-49e6-9424-e910de0fb17d-var-lib-calico\") pod \"calico-node-fggcf\" (UID: \"eb3de0af-eb6e-49e6-9424-e910de0fb17d\") " pod="calico-system/calico-node-fggcf" Feb 12 19:43:33.044489 kubelet[1452]: I0212 19:43:33.016380 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/eb3de0af-eb6e-49e6-9424-e910de0fb17d-flexvol-driver-host\") pod \"calico-node-fggcf\" (UID: \"eb3de0af-eb6e-49e6-9424-e910de0fb17d\") " pod="calico-system/calico-node-fggcf" Feb 12 19:43:33.136918 kubelet[1452]: E0212 19:43:33.136879 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:33.137325 kubelet[1452]: W0212 19:43:33.137218 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:33.137554 kubelet[1452]: E0212 19:43:33.137533 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:33.160439 kubelet[1452]: E0212 19:43:33.160394 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:33.160777 kubelet[1452]: W0212 19:43:33.160737 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:33.160934 kubelet[1452]: E0212 19:43:33.160913 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:33.170257 kubelet[1452]: E0212 19:43:33.164998 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:33.170257 kubelet[1452]: W0212 19:43:33.165026 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:33.170257 kubelet[1452]: E0212 19:43:33.165057 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:33.171995 kubelet[1452]: E0212 19:43:33.171716 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:33.171995 kubelet[1452]: W0212 19:43:33.171871 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:33.171995 kubelet[1452]: E0212 19:43:33.171910 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:33.350249 kubelet[1452]: E0212 19:43:33.347060 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:43:33.350249 kubelet[1452]: E0212 19:43:33.347899 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:43:33.351961 env[1126]: time="2024-02-12T19:43:33.351370023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2tmfq,Uid:b3efa4a0-a8ac-4259-a8bf-e6228daf04af,Namespace:kube-system,Attempt:0,}" Feb 12 19:43:33.352538 env[1126]: time="2024-02-12T19:43:33.352322213Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fggcf,Uid:eb3de0af-eb6e-49e6-9424-e910de0fb17d,Namespace:calico-system,Attempt:0,}" Feb 12 19:43:33.960965 kubelet[1452]: E0212 19:43:33.960832 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:34.212545 kubelet[1452]: E0212 19:43:34.211511 1452 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2h4rf" podUID="91c2c594-31ce-4082-9992-a9001ced4b19" Feb 12 19:43:34.332426 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3557509586.mount: Deactivated successfully. Feb 12 19:43:34.357089 env[1126]: time="2024-02-12T19:43:34.356879849Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:34.361136 env[1126]: time="2024-02-12T19:43:34.361043386Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:34.375092 env[1126]: time="2024-02-12T19:43:34.374963503Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:34.380083 env[1126]: time="2024-02-12T19:43:34.379950318Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:34.382719 env[1126]: time="2024-02-12T19:43:34.382662233Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:34.391795 env[1126]: time="2024-02-12T19:43:34.390795544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:34.392894 env[1126]: time="2024-02-12T19:43:34.392311354Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:34.397978 env[1126]: time="2024-02-12T19:43:34.397907164Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:34.492182 env[1126]: time="2024-02-12T19:43:34.491925042Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:43:34.492182 env[1126]: time="2024-02-12T19:43:34.492096962Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:43:34.492975 env[1126]: time="2024-02-12T19:43:34.492148446Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:43:34.493094 env[1126]: time="2024-02-12T19:43:34.493014320Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/be84673b28ead0e0783fde94146be150d98e67378e0f0a2c70f470b9e502ea5e pid=1517 runtime=io.containerd.runc.v2 Feb 12 19:43:34.503655 env[1126]: time="2024-02-12T19:43:34.503511045Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:43:34.503655 env[1126]: time="2024-02-12T19:43:34.503588162Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:43:34.505363 env[1126]: time="2024-02-12T19:43:34.503630564Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:43:34.506368 env[1126]: time="2024-02-12T19:43:34.506249617Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4d53feeec1a2f3b6886e6ea3ce2147cd231269cea1976839b5e883aea2774394 pid=1516 runtime=io.containerd.runc.v2 Feb 12 19:43:34.531044 systemd[1]: Started cri-containerd-be84673b28ead0e0783fde94146be150d98e67378e0f0a2c70f470b9e502ea5e.scope. Feb 12 19:43:34.563067 systemd[1]: Started cri-containerd-4d53feeec1a2f3b6886e6ea3ce2147cd231269cea1976839b5e883aea2774394.scope. Feb 12 19:43:34.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.597805 kernel: audit: type=1400 audit(1707767014.589:567): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.598031 kernel: audit: type=1400 audit(1707767014.589:568): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.598069 kernel: audit: type=1400 audit(1707767014.589:569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.607430 kernel: audit: type=1400 audit(1707767014.589:570): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618246 kernel: audit: type=1400 audit(1707767014.589:571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.593000 audit: BPF prog-id=64 op=LOAD Feb 12 19:43:34.596000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.596000 audit[1537]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1517 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:34.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383436373362323865616430653037383366646539343134366265 Feb 12 19:43:34.596000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.596000 audit[1537]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1517 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:34.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383436373362323865616430653037383366646539343134366265 Feb 12 19:43:34.596000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.596000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.596000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.596000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.596000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.596000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.596000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.596000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.596000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.596000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.596000 audit: BPF prog-id=65 op=LOAD Feb 12 19:43:34.596000 audit[1537]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0001adbb0 items=0 ppid=1517 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:34.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383436373362323865616430653037383366646539343134366265 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit: BPF prog-id=66 op=LOAD Feb 12 19:43:34.600000 audit[1537]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0001adbf8 items=0 ppid=1517 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:34.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383436373362323865616430653037383366646539343134366265 Feb 12 19:43:34.600000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:43:34.600000 audit: BPF prog-id=65 op=UNLOAD Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { perfmon } for pid=1537 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit[1537]: AVC avc: denied { bpf } for pid=1537 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.600000 audit: BPF prog-id=67 op=LOAD Feb 12 19:43:34.600000 audit[1537]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00023c008 items=0 ppid=1517 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:34.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265383436373362323865616430653037383366646539343134366265 Feb 12 19:43:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.616000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.616000 audit: BPF prog-id=68 op=LOAD Feb 12 19:43:34.617000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.617000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1516 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:34.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464353366656565633161326633623638383665366561336365323134 Feb 12 19:43:34.617000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.617000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1516 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:34.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464353366656565633161326633623638383665366561336365323134 Feb 12 19:43:34.617000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.617000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.617000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.617000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.617000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.617000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.617000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.617000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.617000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.617000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.617000 audit: BPF prog-id=69 op=LOAD Feb 12 19:43:34.617000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015d6a0 items=0 ppid=1516 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:34.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464353366656565633161326633623638383665366561336365323134 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit: BPF prog-id=70 op=LOAD Feb 12 19:43:34.618000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015d6e8 items=0 ppid=1516 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:34.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464353366656565633161326633623638383665366561336365323134 Feb 12 19:43:34.618000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:43:34.618000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { perfmon } for pid=1538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit[1538]: AVC avc: denied { bpf } for pid=1538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:34.618000 audit: BPF prog-id=71 op=LOAD Feb 12 19:43:34.618000 audit[1538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00015daf8 items=0 ppid=1516 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:34.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464353366656565633161326633623638383665366561336365323134 Feb 12 19:43:34.653515 env[1126]: time="2024-02-12T19:43:34.651402495Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2tmfq,Uid:b3efa4a0-a8ac-4259-a8bf-e6228daf04af,Namespace:kube-system,Attempt:0,} returns sandbox id \"4d53feeec1a2f3b6886e6ea3ce2147cd231269cea1976839b5e883aea2774394\"" Feb 12 19:43:34.654949 kubelet[1452]: E0212 19:43:34.654842 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:43:34.658803 env[1126]: time="2024-02-12T19:43:34.658736404Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 12 19:43:34.667732 env[1126]: time="2024-02-12T19:43:34.667673637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fggcf,Uid:eb3de0af-eb6e-49e6-9424-e910de0fb17d,Namespace:calico-system,Attempt:0,} returns sandbox id \"be84673b28ead0e0783fde94146be150d98e67378e0f0a2c70f470b9e502ea5e\"" Feb 12 19:43:34.670017 kubelet[1452]: E0212 19:43:34.669650 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:43:34.961461 kubelet[1452]: E0212 19:43:34.961177 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:35.962328 kubelet[1452]: E0212 19:43:35.962272 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:36.216413 kubelet[1452]: E0212 19:43:36.216258 1452 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2h4rf" podUID="91c2c594-31ce-4082-9992-a9001ced4b19" Feb 12 19:43:36.310760 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4257382312.mount: Deactivated successfully. Feb 12 19:43:36.962786 kubelet[1452]: E0212 19:43:36.962639 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:37.487101 env[1126]: time="2024-02-12T19:43:37.486981720Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:37.493967 env[1126]: time="2024-02-12T19:43:37.493918560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:37.496995 env[1126]: time="2024-02-12T19:43:37.496901432Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:37.506877 env[1126]: time="2024-02-12T19:43:37.506802316Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:37.507897 env[1126]: time="2024-02-12T19:43:37.507791840Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 12 19:43:37.510921 env[1126]: time="2024-02-12T19:43:37.510849381Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:43:37.513014 env[1126]: time="2024-02-12T19:43:37.512948826Z" level=info msg="CreateContainer within sandbox \"4d53feeec1a2f3b6886e6ea3ce2147cd231269cea1976839b5e883aea2774394\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:43:37.551506 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1015855366.mount: Deactivated successfully. Feb 12 19:43:37.593618 env[1126]: time="2024-02-12T19:43:37.593487645Z" level=info msg="CreateContainer within sandbox \"4d53feeec1a2f3b6886e6ea3ce2147cd231269cea1976839b5e883aea2774394\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"61032cb70452add2d3e10d67f6778216f657827e0836ffc2d5d8c312b57a300f\"" Feb 12 19:43:37.596640 env[1126]: time="2024-02-12T19:43:37.595637681Z" level=info msg="StartContainer for \"61032cb70452add2d3e10d67f6778216f657827e0836ffc2d5d8c312b57a300f\"" Feb 12 19:43:37.645469 systemd[1]: Started cri-containerd-61032cb70452add2d3e10d67f6778216f657827e0836ffc2d5d8c312b57a300f.scope. Feb 12 19:43:37.702000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.702000 audit[1592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1516 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:37.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631303332636237303435326164643264336531306436376636373738 Feb 12 19:43:37.703000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.703000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.703000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.703000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.703000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.703000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.703000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.703000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.703000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.703000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.703000 audit: BPF prog-id=72 op=LOAD Feb 12 19:43:37.703000 audit[1592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002cbbe0 items=0 ppid=1516 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:37.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631303332636237303435326164643264336531306436376636373738 Feb 12 19:43:37.704000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.704000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.704000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.704000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.704000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.704000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.704000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.704000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.704000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.704000 audit: BPF prog-id=73 op=LOAD Feb 12 19:43:37.704000 audit[1592]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002cbc28 items=0 ppid=1516 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:37.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631303332636237303435326164643264336531306436376636373738 Feb 12 19:43:37.706000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:43:37.706000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:43:37.706000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.706000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.706000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.706000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.706000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.706000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.706000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.706000 audit[1592]: AVC avc: denied { perfmon } for pid=1592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.706000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.706000 audit[1592]: AVC avc: denied { bpf } for pid=1592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:37.706000 audit: BPF prog-id=74 op=LOAD Feb 12 19:43:37.706000 audit[1592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002cbcb8 items=0 ppid=1516 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:37.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631303332636237303435326164643264336531306436376636373738 Feb 12 19:43:37.758910 env[1126]: time="2024-02-12T19:43:37.757157626Z" level=info msg="StartContainer for \"61032cb70452add2d3e10d67f6778216f657827e0836ffc2d5d8c312b57a300f\" returns successfully" Feb 12 19:43:37.908652 kernel: kauditd_printk_skb: 152 callbacks suppressed Feb 12 19:43:37.908966 kernel: audit: type=1325 audit(1707767017.902:609): table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:37.902000 audit[1643]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:37.903000 audit[1644]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:37.915274 kernel: audit: type=1325 audit(1707767017.903:610): table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:37.903000 audit[1644]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4c32c700 a2=0 a3=7ffc4c32c6ec items=0 ppid=1603 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:37.903000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:43:37.924720 kernel: audit: type=1300 audit(1707767017.903:610): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4c32c700 a2=0 a3=7ffc4c32c6ec items=0 ppid=1603 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:37.924924 kernel: audit: type=1327 audit(1707767017.903:610): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:43:37.924973 kernel: audit: type=1325 audit(1707767017.905:611): table=nat:16 family=10 entries=1 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:37.905000 audit[1645]: NETFILTER_CFG table=nat:16 family=10 entries=1 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:37.905000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb4a358e0 a2=0 a3=7fffb4a358cc items=0 ppid=1603 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:37.933149 kernel: audit: type=1300 audit(1707767017.905:611): arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb4a358e0 a2=0 a3=7fffb4a358cc items=0 ppid=1603 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:37.933372 kernel: audit: type=1327 audit(1707767017.905:611): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:43:37.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:43:37.939398 kernel: audit: type=1325 audit(1707767017.907:612): table=filter:17 family=10 entries=1 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:37.907000 audit[1646]: NETFILTER_CFG table=filter:17 family=10 entries=1 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:37.907000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffabb590d0 a2=0 a3=7fffabb590bc items=0 ppid=1603 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:37.907000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:43:37.949676 kernel: audit: type=1300 audit(1707767017.907:612): arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffabb590d0 a2=0 a3=7fffabb590bc items=0 ppid=1603 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:37.949930 kernel: audit: type=1327 audit(1707767017.907:612): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:43:37.902000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe35d20e20 a2=0 a3=7ffe35d20e0c items=0 ppid=1603 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:37.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:43:37.918000 audit[1647]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:37.918000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdef09a010 a2=0 a3=7ffdef099ffc items=0 ppid=1603 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:37.918000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:43:37.921000 audit[1648]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:37.921000 audit[1648]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa0327af0 a2=0 a3=7fffa0327adc items=0 ppid=1603 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:37.921000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:43:37.963235 kubelet[1452]: E0212 19:43:37.963153 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:38.013000 audit[1649]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.013000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe613f44c0 a2=0 a3=7ffe613f44ac items=0 ppid=1603 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:43:38.021000 audit[1651]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1651 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.021000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd8c2e32f0 a2=0 a3=7ffd8c2e32dc items=0 ppid=1603 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:43:38.035000 audit[1654]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1654 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.035000 audit[1654]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff70642290 a2=0 a3=7fff7064227c items=0 ppid=1603 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.035000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:43:38.038000 audit[1655]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1655 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.038000 audit[1655]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd3eabbf0 a2=0 a3=7fffd3eabbdc items=0 ppid=1603 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:43:38.044000 audit[1657]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.044000 audit[1657]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd75ffb920 a2=0 a3=7ffd75ffb90c items=0 ppid=1603 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:43:38.048000 audit[1658]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.048000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3d881010 a2=0 a3=7fff3d880ffc items=0 ppid=1603 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:43:38.053000 audit[1660]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1660 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.053000 audit[1660]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffdd41cc80 a2=0 a3=7fffdd41cc6c items=0 ppid=1603 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:43:38.063000 audit[1663]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1663 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.063000 audit[1663]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3254bea0 a2=0 a3=7fff3254be8c items=0 ppid=1603 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.063000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:43:38.065000 audit[1664]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1664 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.065000 audit[1664]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5371d100 a2=0 a3=7ffc5371d0ec items=0 ppid=1603 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:43:38.073000 audit[1666]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1666 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.073000 audit[1666]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc304f2fe0 a2=0 a3=7ffc304f2fcc items=0 ppid=1603 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:43:38.075000 audit[1667]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1667 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.075000 audit[1667]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd4ae6ff0 a2=0 a3=7ffdd4ae6fdc items=0 ppid=1603 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:43:38.081000 audit[1669]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1669 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.081000 audit[1669]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe29275790 a2=0 a3=7ffe2927577c items=0 ppid=1603 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:43:38.096000 audit[1672]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1672 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.096000 audit[1672]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc79b0a00 a2=0 a3=7ffcc79b09ec items=0 ppid=1603 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.096000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:43:38.108000 audit[1675]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1675 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.108000 audit[1675]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe137168e0 a2=0 a3=7ffe137168cc items=0 ppid=1603 pid=1675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:43:38.111000 audit[1676]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.111000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc246f1b40 a2=0 a3=7ffc246f1b2c items=0 ppid=1603 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:43:38.117000 audit[1678]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.117000 audit[1678]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeab45bc40 a2=0 a3=7ffeab45bc2c items=0 ppid=1603 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:43:38.167000 audit[1683]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.167000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffdc8ee5e90 a2=0 a3=7ffdc8ee5e7c items=0 ppid=1603 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:43:38.169000 audit[1684]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.169000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd79ad4e90 a2=0 a3=7ffd79ad4e7c items=0 ppid=1603 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.169000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:43:38.175000 audit[1686]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:43:38.175000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffec1709e90 a2=0 a3=7ffec1709e7c items=0 ppid=1603 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:43:38.205000 audit[1692]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:43:38.205000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc14104350 a2=0 a3=7ffc1410433c items=0 ppid=1603 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.205000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:43:38.213657 kubelet[1452]: E0212 19:43:38.212808 1452 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2h4rf" podUID="91c2c594-31ce-4082-9992-a9001ced4b19" Feb 12 19:43:38.244000 audit[1692]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:43:38.244000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffc14104350 a2=0 a3=7ffc1410433c items=0 ppid=1603 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:43:38.270000 audit[1701]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.270000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff0c35bfe0 a2=0 a3=7fff0c35bfcc items=0 ppid=1603 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:43:38.281514 kubelet[1452]: E0212 19:43:38.281466 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:43:38.280000 audit[1703]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.280000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcb14024d0 a2=0 a3=7ffcb14024bc items=0 ppid=1603 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.280000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:43:38.282753 kubelet[1452]: E0212 19:43:38.282574 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.282753 kubelet[1452]: W0212 19:43:38.282653 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.282753 kubelet[1452]: E0212 19:43:38.282685 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.283079 kubelet[1452]: E0212 19:43:38.282967 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.283079 kubelet[1452]: W0212 19:43:38.282980 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.283079 kubelet[1452]: E0212 19:43:38.282998 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.283342 kubelet[1452]: E0212 19:43:38.283228 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.283342 kubelet[1452]: W0212 19:43:38.283240 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.283342 kubelet[1452]: E0212 19:43:38.283257 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.283611 kubelet[1452]: E0212 19:43:38.283476 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.283611 kubelet[1452]: W0212 19:43:38.283487 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.283611 kubelet[1452]: E0212 19:43:38.283504 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.283852 kubelet[1452]: E0212 19:43:38.283792 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.283852 kubelet[1452]: W0212 19:43:38.283804 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.283852 kubelet[1452]: E0212 19:43:38.283823 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.284101 kubelet[1452]: E0212 19:43:38.284025 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.284101 kubelet[1452]: W0212 19:43:38.284039 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.284101 kubelet[1452]: E0212 19:43:38.284070 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.284433 kubelet[1452]: E0212 19:43:38.284320 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.284433 kubelet[1452]: W0212 19:43:38.284331 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.284433 kubelet[1452]: E0212 19:43:38.284348 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.284680 kubelet[1452]: E0212 19:43:38.284550 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.284680 kubelet[1452]: W0212 19:43:38.284561 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.284680 kubelet[1452]: E0212 19:43:38.284577 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.284864 kubelet[1452]: E0212 19:43:38.284789 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.284864 kubelet[1452]: W0212 19:43:38.284800 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.284864 kubelet[1452]: E0212 19:43:38.284815 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.285041 kubelet[1452]: E0212 19:43:38.285006 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.285041 kubelet[1452]: W0212 19:43:38.285016 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.285283 kubelet[1452]: E0212 19:43:38.285032 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.285283 kubelet[1452]: E0212 19:43:38.285274 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.285435 kubelet[1452]: W0212 19:43:38.285288 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.285435 kubelet[1452]: E0212 19:43:38.285306 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.285538 kubelet[1452]: E0212 19:43:38.285530 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.285585 kubelet[1452]: W0212 19:43:38.285541 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.285585 kubelet[1452]: E0212 19:43:38.285565 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.286142 kubelet[1452]: E0212 19:43:38.285814 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.286142 kubelet[1452]: W0212 19:43:38.285824 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.286142 kubelet[1452]: E0212 19:43:38.285841 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.286142 kubelet[1452]: E0212 19:43:38.286045 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.286142 kubelet[1452]: W0212 19:43:38.286056 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.286142 kubelet[1452]: E0212 19:43:38.286072 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.288319 kubelet[1452]: E0212 19:43:38.286601 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.288319 kubelet[1452]: W0212 19:43:38.286620 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.288319 kubelet[1452]: E0212 19:43:38.286651 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.288319 kubelet[1452]: E0212 19:43:38.287379 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.288319 kubelet[1452]: W0212 19:43:38.287393 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.288319 kubelet[1452]: E0212 19:43:38.287415 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.290257 kubelet[1452]: E0212 19:43:38.288958 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.290257 kubelet[1452]: W0212 19:43:38.288976 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.290257 kubelet[1452]: E0212 19:43:38.288999 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.290257 kubelet[1452]: E0212 19:43:38.289384 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.290257 kubelet[1452]: W0212 19:43:38.289398 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.290257 kubelet[1452]: E0212 19:43:38.289418 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.290257 kubelet[1452]: E0212 19:43:38.289820 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.290257 kubelet[1452]: W0212 19:43:38.289833 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.290257 kubelet[1452]: E0212 19:43:38.289855 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.290257 kubelet[1452]: E0212 19:43:38.290084 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.290888 kubelet[1452]: W0212 19:43:38.290095 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.290888 kubelet[1452]: E0212 19:43:38.290151 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.291000 audit[1726]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.291000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe07fad320 a2=0 a3=7ffe07fad30c items=0 ppid=1603 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:43:38.294000 audit[1727]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.294000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebf89f3c0 a2=0 a3=7ffebf89f3ac items=0 ppid=1603 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:43:38.300742 kubelet[1452]: I0212 19:43:38.300685 1452 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-2tmfq" podStartSLOduration=3.449278622 podCreationTimestamp="2024-02-12 19:43:32 +0000 UTC" firstStartedPulling="2024-02-12 19:43:34.65754823 +0000 UTC m=+5.449155034" lastFinishedPulling="2024-02-12 19:43:37.508892073 +0000 UTC m=+8.300498906" observedRunningTime="2024-02-12 19:43:38.299464586 +0000 UTC m=+9.091071399" watchObservedRunningTime="2024-02-12 19:43:38.300622494 +0000 UTC m=+9.092229303" Feb 12 19:43:38.302000 audit[1729]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.302000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe7697f6d0 a2=0 a3=7ffe7697f6bc items=0 ppid=1603 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:43:38.305000 audit[1730]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.305000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccd65f260 a2=0 a3=7ffccd65f24c items=0 ppid=1603 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:43:38.312000 audit[1732]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.312000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc54bdbb80 a2=0 a3=7ffc54bdbb6c items=0 ppid=1603 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:43:38.322000 audit[1735]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.322000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcb4150350 a2=0 a3=7ffcb415033c items=0 ppid=1603 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.322000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:43:38.325000 audit[1736]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.325000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe68423410 a2=0 a3=7ffe684233fc items=0 ppid=1603 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:43:38.335000 audit[1738]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.335000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffccf519890 a2=0 a3=7ffccf51987c items=0 ppid=1603 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:43:38.341000 audit[1739]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.341000 audit[1739]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8ffc2290 a2=0 a3=7fff8ffc227c items=0 ppid=1603 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:43:38.349000 audit[1741]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.349000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff22d17610 a2=0 a3=7fff22d175fc items=0 ppid=1603 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:43:38.358000 audit[1744]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.358000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcbc7181d0 a2=0 a3=7ffcbc7181bc items=0 ppid=1603 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:43:38.373000 audit[1747]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.373000 audit[1747]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed50e3e40 a2=0 a3=7ffed50e3e2c items=0 ppid=1603 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.373000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:43:38.376000 audit[1748]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.376000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd9b959170 a2=0 a3=7ffd9b95915c items=0 ppid=1603 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.376000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:43:38.382908 kubelet[1452]: E0212 19:43:38.382862 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.383414 kubelet[1452]: W0212 19:43:38.383139 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.383414 kubelet[1452]: E0212 19:43:38.383186 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.383960 kubelet[1452]: E0212 19:43:38.383935 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.382000 audit[1750]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.382000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc97992480 a2=0 a3=7ffc9799246c items=0 ppid=1603 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:43:38.384836 kubelet[1452]: W0212 19:43:38.384687 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.384836 kubelet[1452]: E0212 19:43:38.384743 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.385275 kubelet[1452]: E0212 19:43:38.385248 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.385369 kubelet[1452]: W0212 19:43:38.385278 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.385369 kubelet[1452]: E0212 19:43:38.385316 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.385596 kubelet[1452]: E0212 19:43:38.385575 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.385596 kubelet[1452]: W0212 19:43:38.385589 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.385740 kubelet[1452]: E0212 19:43:38.385611 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.385859 kubelet[1452]: E0212 19:43:38.385806 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.385859 kubelet[1452]: W0212 19:43:38.385822 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.385859 kubelet[1452]: E0212 19:43:38.385853 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.386190 kubelet[1452]: E0212 19:43:38.386169 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.386190 kubelet[1452]: W0212 19:43:38.386188 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.386324 kubelet[1452]: E0212 19:43:38.386222 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.387374 kubelet[1452]: E0212 19:43:38.387340 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.387374 kubelet[1452]: W0212 19:43:38.387363 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.387611 kubelet[1452]: E0212 19:43:38.387390 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.387661 kubelet[1452]: E0212 19:43:38.387653 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.387733 kubelet[1452]: W0212 19:43:38.387663 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.387733 kubelet[1452]: E0212 19:43:38.387683 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.388048 kubelet[1452]: E0212 19:43:38.388023 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.388441 kubelet[1452]: W0212 19:43:38.388397 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.388622 kubelet[1452]: E0212 19:43:38.388594 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.388868 kubelet[1452]: E0212 19:43:38.388848 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.388868 kubelet[1452]: W0212 19:43:38.388866 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.388987 kubelet[1452]: E0212 19:43:38.388895 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.389911 kubelet[1452]: E0212 19:43:38.389326 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.389911 kubelet[1452]: W0212 19:43:38.389342 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.389911 kubelet[1452]: E0212 19:43:38.389362 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.390167 kubelet[1452]: E0212 19:43:38.389983 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:38.390167 kubelet[1452]: W0212 19:43:38.389997 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:38.390167 kubelet[1452]: E0212 19:43:38.390017 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:38.395000 audit[1765]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.395000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff01f663d0 a2=0 a3=7fff01f663bc items=0 ppid=1603 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:43:38.398000 audit[1766]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.398000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4d9f0410 a2=0 a3=7ffd4d9f03fc items=0 ppid=1603 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:43:38.406000 audit[1768]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.406000 audit[1768]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd97c59b10 a2=0 a3=7ffd97c59afc items=0 ppid=1603 pid=1768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.406000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:43:38.409000 audit[1769]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.409000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3a6fbfb0 a2=0 a3=7ffc3a6fbf9c items=0 ppid=1603 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.409000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:43:38.416000 audit[1771]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.416000 audit[1771]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff0c5baa80 a2=0 a3=7fff0c5baa6c items=0 ppid=1603 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:43:38.426000 audit[1774]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:43:38.426000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe7cb8b150 a2=0 a3=7ffe7cb8b13c items=0 ppid=1603 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:43:38.434000 audit[1776]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:43:38.434000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcec2dcce0 a2=0 a3=7ffcec2dcccc items=0 ppid=1603 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.434000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:43:38.435000 audit[1776]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:43:38.435000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffcec2dcce0 a2=0 a3=7ffcec2dcccc items=0 ppid=1603 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:38.435000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:43:38.964417 kubelet[1452]: E0212 19:43:38.963993 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:39.283765 kubelet[1452]: E0212 19:43:39.283552 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:43:39.298632 kubelet[1452]: E0212 19:43:39.298558 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.298632 kubelet[1452]: W0212 19:43:39.298600 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.298632 kubelet[1452]: E0212 19:43:39.298635 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.299644 kubelet[1452]: E0212 19:43:39.299230 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.299644 kubelet[1452]: W0212 19:43:39.299255 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.299644 kubelet[1452]: E0212 19:43:39.299280 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.300492 kubelet[1452]: E0212 19:43:39.300443 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.300492 kubelet[1452]: W0212 19:43:39.300475 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.300670 kubelet[1452]: E0212 19:43:39.300507 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.300972 kubelet[1452]: E0212 19:43:39.300921 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.300972 kubelet[1452]: W0212 19:43:39.300948 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.300972 kubelet[1452]: E0212 19:43:39.300977 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.301617 kubelet[1452]: E0212 19:43:39.301415 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.301617 kubelet[1452]: W0212 19:43:39.301443 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.301617 kubelet[1452]: E0212 19:43:39.301465 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.302155 kubelet[1452]: E0212 19:43:39.302104 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.302155 kubelet[1452]: W0212 19:43:39.302128 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.302155 kubelet[1452]: E0212 19:43:39.302146 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.303006 kubelet[1452]: E0212 19:43:39.302956 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.303006 kubelet[1452]: W0212 19:43:39.302986 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.303006 kubelet[1452]: E0212 19:43:39.303014 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.303605 kubelet[1452]: E0212 19:43:39.303568 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.303605 kubelet[1452]: W0212 19:43:39.303592 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.303605 kubelet[1452]: E0212 19:43:39.303612 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.304708 kubelet[1452]: E0212 19:43:39.304015 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.304708 kubelet[1452]: W0212 19:43:39.304028 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.304708 kubelet[1452]: E0212 19:43:39.304045 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.304708 kubelet[1452]: E0212 19:43:39.304651 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.304708 kubelet[1452]: W0212 19:43:39.304667 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.304708 kubelet[1452]: E0212 19:43:39.304686 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.305264 kubelet[1452]: E0212 19:43:39.305242 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.305264 kubelet[1452]: W0212 19:43:39.305258 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.305406 kubelet[1452]: E0212 19:43:39.305277 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.305784 kubelet[1452]: E0212 19:43:39.305676 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.305784 kubelet[1452]: W0212 19:43:39.305760 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.305967 kubelet[1452]: E0212 19:43:39.305800 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.306247 kubelet[1452]: E0212 19:43:39.306190 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.306247 kubelet[1452]: W0212 19:43:39.306226 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.306409 kubelet[1452]: E0212 19:43:39.306258 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.306993 kubelet[1452]: E0212 19:43:39.306785 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.306993 kubelet[1452]: W0212 19:43:39.306809 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.306993 kubelet[1452]: E0212 19:43:39.306825 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.307593 kubelet[1452]: E0212 19:43:39.307444 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.307593 kubelet[1452]: W0212 19:43:39.307473 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.307593 kubelet[1452]: E0212 19:43:39.307494 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.308235 kubelet[1452]: E0212 19:43:39.308179 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.308235 kubelet[1452]: W0212 19:43:39.308216 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.308410 kubelet[1452]: E0212 19:43:39.308249 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.308992 kubelet[1452]: E0212 19:43:39.308933 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.308992 kubelet[1452]: W0212 19:43:39.308955 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.308992 kubelet[1452]: E0212 19:43:39.308974 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.310390 kubelet[1452]: E0212 19:43:39.310256 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.310390 kubelet[1452]: W0212 19:43:39.310299 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.310390 kubelet[1452]: E0212 19:43:39.310324 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.310671 kubelet[1452]: E0212 19:43:39.310653 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.310671 kubelet[1452]: W0212 19:43:39.310670 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.310763 kubelet[1452]: E0212 19:43:39.310691 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.311156 kubelet[1452]: E0212 19:43:39.310973 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.311156 kubelet[1452]: W0212 19:43:39.310990 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.311156 kubelet[1452]: E0212 19:43:39.311007 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.392975 kubelet[1452]: E0212 19:43:39.391719 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.392975 kubelet[1452]: W0212 19:43:39.391750 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.392975 kubelet[1452]: E0212 19:43:39.391792 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.392975 kubelet[1452]: E0212 19:43:39.392807 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.392975 kubelet[1452]: W0212 19:43:39.392834 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.392975 kubelet[1452]: E0212 19:43:39.392876 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.393511 kubelet[1452]: E0212 19:43:39.393476 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.393511 kubelet[1452]: W0212 19:43:39.393504 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.393681 kubelet[1452]: E0212 19:43:39.393540 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.394004 kubelet[1452]: E0212 19:43:39.393918 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.394004 kubelet[1452]: W0212 19:43:39.394003 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.394147 kubelet[1452]: E0212 19:43:39.394035 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.394259 kubelet[1452]: E0212 19:43:39.394246 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.394259 kubelet[1452]: W0212 19:43:39.394256 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.394431 kubelet[1452]: E0212 19:43:39.394382 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.394489 kubelet[1452]: E0212 19:43:39.394470 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.394536 kubelet[1452]: W0212 19:43:39.394489 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.394536 kubelet[1452]: E0212 19:43:39.394515 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.394793 kubelet[1452]: E0212 19:43:39.394769 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.394793 kubelet[1452]: W0212 19:43:39.394792 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.394894 kubelet[1452]: E0212 19:43:39.394812 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.395007 kubelet[1452]: E0212 19:43:39.394992 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.395007 kubelet[1452]: W0212 19:43:39.395005 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.395104 kubelet[1452]: E0212 19:43:39.395021 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.395227 kubelet[1452]: E0212 19:43:39.395214 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.395273 kubelet[1452]: W0212 19:43:39.395236 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.395273 kubelet[1452]: E0212 19:43:39.395247 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.396491 kubelet[1452]: E0212 19:43:39.395812 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.396491 kubelet[1452]: W0212 19:43:39.395830 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.396491 kubelet[1452]: E0212 19:43:39.395855 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.396962 kubelet[1452]: E0212 19:43:39.396818 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.396962 kubelet[1452]: W0212 19:43:39.396836 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.396962 kubelet[1452]: E0212 19:43:39.396876 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.397230 kubelet[1452]: E0212 19:43:39.397147 1452 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:43:39.397230 kubelet[1452]: W0212 19:43:39.397158 1452 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:43:39.397230 kubelet[1452]: E0212 19:43:39.397174 1452 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:43:39.966306 kubelet[1452]: E0212 19:43:39.966161 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:40.212743 kubelet[1452]: E0212 19:43:40.212634 1452 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2h4rf" podUID="91c2c594-31ce-4082-9992-a9001ced4b19" Feb 12 19:43:40.551985 env[1126]: time="2024-02-12T19:43:40.551911048Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:40.554987 env[1126]: time="2024-02-12T19:43:40.554927467Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:40.559681 env[1126]: time="2024-02-12T19:43:40.559598839Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:40.564836 env[1126]: time="2024-02-12T19:43:40.564611765Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:40.569260 env[1126]: time="2024-02-12T19:43:40.566713493Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 19:43:40.572412 env[1126]: time="2024-02-12T19:43:40.572343712Z" level=info msg="CreateContainer within sandbox \"be84673b28ead0e0783fde94146be150d98e67378e0f0a2c70f470b9e502ea5e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:43:40.591865 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3734633433.mount: Deactivated successfully. Feb 12 19:43:40.607150 env[1126]: time="2024-02-12T19:43:40.607008900Z" level=info msg="CreateContainer within sandbox \"be84673b28ead0e0783fde94146be150d98e67378e0f0a2c70f470b9e502ea5e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6e76d2de3d9c06b02d3c465973809a31e2ce6c949d60c9ce4d16179d4c90efbe\"" Feb 12 19:43:40.608724 env[1126]: time="2024-02-12T19:43:40.608672627Z" level=info msg="StartContainer for \"6e76d2de3d9c06b02d3c465973809a31e2ce6c949d60c9ce4d16179d4c90efbe\"" Feb 12 19:43:40.650107 systemd[1]: Started cri-containerd-6e76d2de3d9c06b02d3c465973809a31e2ce6c949d60c9ce4d16179d4c90efbe.scope. Feb 12 19:43:40.655506 systemd[1]: run-containerd-runc-k8s.io-6e76d2de3d9c06b02d3c465973809a31e2ce6c949d60c9ce4d16179d4c90efbe-runc.p3e0UK.mount: Deactivated successfully. Feb 12 19:43:40.691000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.691000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1517 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:40.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373664326465336439633036623032643363343635393733383039 Feb 12 19:43:40.691000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.691000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.691000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.691000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.691000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.691000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.691000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.691000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.691000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.691000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.691000 audit: BPF prog-id=75 op=LOAD Feb 12 19:43:40.691000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003865c0 items=0 ppid=1517 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:40.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373664326465336439633036623032643363343635393733383039 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit: BPF prog-id=76 op=LOAD Feb 12 19:43:40.692000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000386608 items=0 ppid=1517 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:40.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373664326465336439633036623032643363343635393733383039 Feb 12 19:43:40.692000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:43:40.692000 audit: BPF prog-id=75 op=UNLOAD Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:40.692000 audit: BPF prog-id=77 op=LOAD Feb 12 19:43:40.692000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000386698 items=0 ppid=1517 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:40.692000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373664326465336439633036623032643363343635393733383039 Feb 12 19:43:40.737129 env[1126]: time="2024-02-12T19:43:40.737071815Z" level=info msg="StartContainer for \"6e76d2de3d9c06b02d3c465973809a31e2ce6c949d60c9ce4d16179d4c90efbe\" returns successfully" Feb 12 19:43:40.739247 systemd[1]: cri-containerd-6e76d2de3d9c06b02d3c465973809a31e2ce6c949d60c9ce4d16179d4c90efbe.scope: Deactivated successfully. Feb 12 19:43:40.741000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:43:40.951683 env[1126]: time="2024-02-12T19:43:40.951621342Z" level=info msg="shim disconnected" id=6e76d2de3d9c06b02d3c465973809a31e2ce6c949d60c9ce4d16179d4c90efbe Feb 12 19:43:40.951683 env[1126]: time="2024-02-12T19:43:40.951671022Z" level=warning msg="cleaning up after shim disconnected" id=6e76d2de3d9c06b02d3c465973809a31e2ce6c949d60c9ce4d16179d4c90efbe namespace=k8s.io Feb 12 19:43:40.951683 env[1126]: time="2024-02-12T19:43:40.951680516Z" level=info msg="cleaning up dead shim" Feb 12 19:43:40.967317 kubelet[1452]: E0212 19:43:40.967229 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:40.967859 env[1126]: time="2024-02-12T19:43:40.967378060Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:43:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1858 runtime=io.containerd.runc.v2\n" Feb 12 19:43:41.291426 kubelet[1452]: E0212 19:43:41.291285 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:43:41.294146 env[1126]: time="2024-02-12T19:43:41.294080452Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:43:41.587846 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6e76d2de3d9c06b02d3c465973809a31e2ce6c949d60c9ce4d16179d4c90efbe-rootfs.mount: Deactivated successfully. Feb 12 19:43:41.968532 kubelet[1452]: E0212 19:43:41.968463 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:42.212625 kubelet[1452]: E0212 19:43:42.212563 1452 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2h4rf" podUID="91c2c594-31ce-4082-9992-a9001ced4b19" Feb 12 19:43:42.969455 kubelet[1452]: E0212 19:43:42.969381 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:42.996536 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount488012767.mount: Deactivated successfully. Feb 12 19:43:43.969967 kubelet[1452]: E0212 19:43:43.969915 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:44.213698 kubelet[1452]: E0212 19:43:44.213594 1452 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2h4rf" podUID="91c2c594-31ce-4082-9992-a9001ced4b19" Feb 12 19:43:44.971226 kubelet[1452]: E0212 19:43:44.970975 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:45.971491 kubelet[1452]: E0212 19:43:45.971347 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:46.213113 kubelet[1452]: E0212 19:43:46.212543 1452 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2h4rf" podUID="91c2c594-31ce-4082-9992-a9001ced4b19" Feb 12 19:43:46.972614 kubelet[1452]: E0212 19:43:46.972330 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:47.676851 env[1126]: time="2024-02-12T19:43:47.676744777Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:47.682495 env[1126]: time="2024-02-12T19:43:47.682375520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:47.691443 env[1126]: time="2024-02-12T19:43:47.691274782Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:47.695089 env[1126]: time="2024-02-12T19:43:47.694977123Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:43:47.698762 env[1126]: time="2024-02-12T19:43:47.698676993Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 19:43:47.710283 env[1126]: time="2024-02-12T19:43:47.710176034Z" level=info msg="CreateContainer within sandbox \"be84673b28ead0e0783fde94146be150d98e67378e0f0a2c70f470b9e502ea5e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:43:47.733856 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2462083905.mount: Deactivated successfully. Feb 12 19:43:47.756773 env[1126]: time="2024-02-12T19:43:47.756655555Z" level=info msg="CreateContainer within sandbox \"be84673b28ead0e0783fde94146be150d98e67378e0f0a2c70f470b9e502ea5e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"04c3005b953d58ed30702e601dbca7c83c0b1c760664e528cf57ed5e8d6e7dd3\"" Feb 12 19:43:47.758131 env[1126]: time="2024-02-12T19:43:47.758067547Z" level=info msg="StartContainer for \"04c3005b953d58ed30702e601dbca7c83c0b1c760664e528cf57ed5e8d6e7dd3\"" Feb 12 19:43:47.797557 systemd[1]: Started cri-containerd-04c3005b953d58ed30702e601dbca7c83c0b1c760664e528cf57ed5e8d6e7dd3.scope. Feb 12 19:43:47.863000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.865699 kernel: kauditd_printk_skb: 187 callbacks suppressed Feb 12 19:43:47.865913 kernel: audit: type=1400 audit(1707767027.863:667): avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.863000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1517 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:47.873081 kernel: audit: type=1300 audit(1707767027.863:667): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1517 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:47.863000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034633330303562393533643538656433303730326536303164626361 Feb 12 19:43:47.864000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.881949 kernel: audit: type=1327 audit(1707767027.863:667): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034633330303562393533643538656433303730326536303164626361 Feb 12 19:43:47.882121 kernel: audit: type=1400 audit(1707767027.864:668): avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.882168 kernel: audit: type=1400 audit(1707767027.864:668): avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.864000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.864000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.888387 kernel: audit: type=1400 audit(1707767027.864:668): avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.864000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.893237 kernel: audit: type=1400 audit(1707767027.864:668): avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.864000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.864000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.903657 kernel: audit: type=1400 audit(1707767027.864:668): avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.903897 kernel: audit: type=1400 audit(1707767027.864:668): avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.903941 kernel: audit: type=1400 audit(1707767027.864:668): avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.864000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.864000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.864000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.864000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.864000 audit: BPF prog-id=78 op=LOAD Feb 12 19:43:47.864000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000266bc0 items=0 ppid=1517 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:47.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034633330303562393533643538656433303730326536303164626361 Feb 12 19:43:47.868000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.868000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.868000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.868000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.868000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.868000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.868000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.868000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.868000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.868000 audit: BPF prog-id=79 op=LOAD Feb 12 19:43:47.868000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000266c08 items=0 ppid=1517 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:47.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034633330303562393533643538656433303730326536303164626361 Feb 12 19:43:47.872000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:43:47.872000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:43:47.872000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.872000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.872000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.872000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.872000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.872000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.872000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.872000 audit[1883]: AVC avc: denied { perfmon } for pid=1883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.872000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.872000 audit[1883]: AVC avc: denied { bpf } for pid=1883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:43:47.872000 audit: BPF prog-id=80 op=LOAD Feb 12 19:43:47.872000 audit[1883]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000266c98 items=0 ppid=1517 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:47.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034633330303562393533643538656433303730326536303164626361 Feb 12 19:43:47.924008 env[1126]: time="2024-02-12T19:43:47.923935685Z" level=info msg="StartContainer for \"04c3005b953d58ed30702e601dbca7c83c0b1c760664e528cf57ed5e8d6e7dd3\" returns successfully" Feb 12 19:43:47.975146 kubelet[1452]: E0212 19:43:47.972881 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:48.211998 kubelet[1452]: E0212 19:43:48.211918 1452 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2h4rf" podUID="91c2c594-31ce-4082-9992-a9001ced4b19" Feb 12 19:43:48.330544 kubelet[1452]: E0212 19:43:48.328847 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:43:48.964845 env[1126]: time="2024-02-12T19:43:48.964745163Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:43:48.969477 systemd[1]: cri-containerd-04c3005b953d58ed30702e601dbca7c83c0b1c760664e528cf57ed5e8d6e7dd3.scope: Deactivated successfully. Feb 12 19:43:48.972000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:43:48.973903 kubelet[1452]: E0212 19:43:48.973584 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:49.005573 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-04c3005b953d58ed30702e601dbca7c83c0b1c760664e528cf57ed5e8d6e7dd3-rootfs.mount: Deactivated successfully. Feb 12 19:43:49.033836 kubelet[1452]: I0212 19:43:49.033751 1452 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:43:49.159845 env[1126]: time="2024-02-12T19:43:49.159779516Z" level=info msg="shim disconnected" id=04c3005b953d58ed30702e601dbca7c83c0b1c760664e528cf57ed5e8d6e7dd3 Feb 12 19:43:49.160583 env[1126]: time="2024-02-12T19:43:49.160538888Z" level=warning msg="cleaning up after shim disconnected" id=04c3005b953d58ed30702e601dbca7c83c0b1c760664e528cf57ed5e8d6e7dd3 namespace=k8s.io Feb 12 19:43:49.160848 env[1126]: time="2024-02-12T19:43:49.160822536Z" level=info msg="cleaning up dead shim" Feb 12 19:43:49.184483 env[1126]: time="2024-02-12T19:43:49.184416952Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:43:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1931 runtime=io.containerd.runc.v2\n" Feb 12 19:43:49.333668 kubelet[1452]: E0212 19:43:49.333516 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:43:49.337172 env[1126]: time="2024-02-12T19:43:49.336564397Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:43:49.974940 kubelet[1452]: E0212 19:43:49.974721 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:50.218800 systemd[1]: Created slice kubepods-besteffort-pod91c2c594_31ce_4082_9992_a9001ced4b19.slice. Feb 12 19:43:50.224575 env[1126]: time="2024-02-12T19:43:50.223825257Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2h4rf,Uid:91c2c594-31ce-4082-9992-a9001ced4b19,Namespace:calico-system,Attempt:0,}" Feb 12 19:43:50.365705 env[1126]: time="2024-02-12T19:43:50.365501505Z" level=error msg="Failed to destroy network for sandbox \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:43:50.369613 env[1126]: time="2024-02-12T19:43:50.369372725Z" level=error msg="encountered an error cleaning up failed sandbox \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:43:50.369613 env[1126]: time="2024-02-12T19:43:50.369489287Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2h4rf,Uid:91c2c594-31ce-4082-9992-a9001ced4b19,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:43:50.368037 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47-shm.mount: Deactivated successfully. Feb 12 19:43:50.369938 kubelet[1452]: E0212 19:43:50.369901 1452 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:43:50.370495 kubelet[1452]: E0212 19:43:50.369997 1452 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2h4rf" Feb 12 19:43:50.370495 kubelet[1452]: E0212 19:43:50.370031 1452 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2h4rf" Feb 12 19:43:50.370495 kubelet[1452]: E0212 19:43:50.370113 1452 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2h4rf_calico-system(91c2c594-31ce-4082-9992-a9001ced4b19)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2h4rf_calico-system(91c2c594-31ce-4082-9992-a9001ced4b19)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2h4rf" podUID="91c2c594-31ce-4082-9992-a9001ced4b19" Feb 12 19:43:50.432496 kubelet[1452]: I0212 19:43:50.432425 1452 topology_manager.go:215] "Topology Admit Handler" podUID="cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c" podNamespace="default" podName="nginx-deployment-6d5f899847-5s97f" Feb 12 19:43:50.453302 systemd[1]: Created slice kubepods-besteffort-podcecef1c2_2d4d_494a_b4b4_a8fa5b9b579c.slice. Feb 12 19:43:50.528870 kubelet[1452]: I0212 19:43:50.528799 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j7zfj\" (UniqueName: \"kubernetes.io/projected/cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c-kube-api-access-j7zfj\") pod \"nginx-deployment-6d5f899847-5s97f\" (UID: \"cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c\") " pod="default/nginx-deployment-6d5f899847-5s97f" Feb 12 19:43:50.759236 env[1126]: time="2024-02-12T19:43:50.759010541Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-5s97f,Uid:cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c,Namespace:default,Attempt:0,}" Feb 12 19:43:50.927702 env[1126]: time="2024-02-12T19:43:50.927609684Z" level=error msg="Failed to destroy network for sandbox \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:43:50.928610 env[1126]: time="2024-02-12T19:43:50.928541929Z" level=error msg="encountered an error cleaning up failed sandbox \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:43:50.928810 env[1126]: time="2024-02-12T19:43:50.928633832Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-5s97f,Uid:cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:43:50.929085 kubelet[1452]: E0212 19:43:50.929032 1452 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:43:50.929217 kubelet[1452]: E0212 19:43:50.929129 1452 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-5s97f" Feb 12 19:43:50.929217 kubelet[1452]: E0212 19:43:50.929160 1452 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-5s97f" Feb 12 19:43:50.929339 kubelet[1452]: E0212 19:43:50.929274 1452 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-5s97f_default(cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-5s97f_default(cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-5s97f" podUID="cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c" Feb 12 19:43:50.949146 kubelet[1452]: E0212 19:43:50.948990 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:50.975457 kubelet[1452]: E0212 19:43:50.975388 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:51.244448 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec-shm.mount: Deactivated successfully. Feb 12 19:43:51.341411 kubelet[1452]: I0212 19:43:51.340407 1452 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:43:51.342206 env[1126]: time="2024-02-12T19:43:51.342139487Z" level=info msg="StopPodSandbox for \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\"" Feb 12 19:43:51.348044 kubelet[1452]: I0212 19:43:51.347320 1452 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:43:51.348529 env[1126]: time="2024-02-12T19:43:51.348484712Z" level=info msg="StopPodSandbox for \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\"" Feb 12 19:43:51.511363 env[1126]: time="2024-02-12T19:43:51.511191029Z" level=error msg="StopPodSandbox for \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\" failed" error="failed to destroy network for sandbox \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:43:51.513362 kubelet[1452]: E0212 19:43:51.513028 1452 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:43:51.513362 kubelet[1452]: E0212 19:43:51.513161 1452 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec"} Feb 12 19:43:51.513362 kubelet[1452]: E0212 19:43:51.513262 1452 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:43:51.513362 kubelet[1452]: E0212 19:43:51.513326 1452 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-5s97f" podUID="cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c" Feb 12 19:43:51.613418 env[1126]: time="2024-02-12T19:43:51.613325908Z" level=error msg="StopPodSandbox for \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\" failed" error="failed to destroy network for sandbox \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:43:51.614457 kubelet[1452]: E0212 19:43:51.614225 1452 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:43:51.614457 kubelet[1452]: E0212 19:43:51.614305 1452 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47"} Feb 12 19:43:51.614457 kubelet[1452]: E0212 19:43:51.614363 1452 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"91c2c594-31ce-4082-9992-a9001ced4b19\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:43:51.614457 kubelet[1452]: E0212 19:43:51.614394 1452 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"91c2c594-31ce-4082-9992-a9001ced4b19\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2h4rf" podUID="91c2c594-31ce-4082-9992-a9001ced4b19" Feb 12 19:43:51.976317 kubelet[1452]: E0212 19:43:51.975990 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:52.981159 kubelet[1452]: E0212 19:43:52.980910 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:53.981527 kubelet[1452]: E0212 19:43:53.981460 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:54.981983 kubelet[1452]: E0212 19:43:54.981872 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:55.578478 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:43:55.578748 kernel: audit: type=1325 audit(1707767035.561:674): table=filter:65 family=2 entries=9 op=nft_register_rule pid=2053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:43:55.578873 kernel: audit: type=1300 audit(1707767035.561:674): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff366681f0 a2=0 a3=7fff366681dc items=0 ppid=1603 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:55.578955 kernel: audit: type=1327 audit(1707767035.561:674): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:43:55.561000 audit[2053]: NETFILTER_CFG table=filter:65 family=2 entries=9 op=nft_register_rule pid=2053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:43:55.561000 audit[2053]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff366681f0 a2=0 a3=7fff366681dc items=0 ppid=1603 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:55.561000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:43:55.577000 audit[2053]: NETFILTER_CFG table=nat:66 family=2 entries=27 op=nft_register_chain pid=2053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:43:55.584316 kernel: audit: type=1325 audit(1707767035.577:675): table=nat:66 family=2 entries=27 op=nft_register_chain pid=2053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:43:55.577000 audit[2053]: SYSCALL arch=c000003e syscall=46 success=yes exit=8980 a0=3 a1=7fff366681f0 a2=0 a3=7fff366681dc items=0 ppid=1603 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:55.594569 kernel: audit: type=1300 audit(1707767035.577:675): arch=c000003e syscall=46 success=yes exit=8980 a0=3 a1=7fff366681f0 a2=0 a3=7fff366681dc items=0 ppid=1603 pid=2053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:55.577000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:43:55.598435 kernel: audit: type=1327 audit(1707767035.577:675): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:43:55.684000 audit[2055]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=2055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:43:55.689351 kernel: audit: type=1325 audit(1707767035.684:676): table=filter:67 family=2 entries=8 op=nft_register_rule pid=2055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:43:55.684000 audit[2055]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffedc0c98e0 a2=0 a3=7ffedc0c98cc items=0 ppid=1603 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:55.698351 kernel: audit: type=1300 audit(1707767035.684:676): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffedc0c98e0 a2=0 a3=7ffedc0c98cc items=0 ppid=1603 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:55.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:43:55.703243 kernel: audit: type=1327 audit(1707767035.684:676): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:43:55.702000 audit[2055]: NETFILTER_CFG table=nat:68 family=2 entries=34 op=nft_register_chain pid=2055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:43:55.702000 audit[2055]: SYSCALL arch=c000003e syscall=46 success=yes exit=10868 a0=3 a1=7ffedc0c98e0 a2=0 a3=7ffedc0c98cc items=0 ppid=1603 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:43:55.708371 kernel: audit: type=1325 audit(1707767035.702:677): table=nat:68 family=2 entries=34 op=nft_register_chain pid=2055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:43:55.702000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:43:55.984051 kubelet[1452]: E0212 19:43:55.983936 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:56.985411 kubelet[1452]: E0212 19:43:56.985295 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:58.012342 kubelet[1452]: E0212 19:43:58.012232 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:43:59.012900 kubelet[1452]: E0212 19:43:59.012771 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:00.013831 kubelet[1452]: E0212 19:44:00.013721 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:00.078170 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4158911709.mount: Deactivated successfully. Feb 12 19:44:00.240848 env[1126]: time="2024-02-12T19:44:00.240763944Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:00.253039 env[1126]: time="2024-02-12T19:44:00.252880280Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:00.257967 env[1126]: time="2024-02-12T19:44:00.257889708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:00.265407 env[1126]: time="2024-02-12T19:44:00.263704879Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:00.266267 env[1126]: time="2024-02-12T19:44:00.265395343Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 19:44:00.303807 env[1126]: time="2024-02-12T19:44:00.303506003Z" level=info msg="CreateContainer within sandbox \"be84673b28ead0e0783fde94146be150d98e67378e0f0a2c70f470b9e502ea5e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:44:00.342419 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3903111372.mount: Deactivated successfully. Feb 12 19:44:00.363010 env[1126]: time="2024-02-12T19:44:00.362890504Z" level=info msg="CreateContainer within sandbox \"be84673b28ead0e0783fde94146be150d98e67378e0f0a2c70f470b9e502ea5e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2856a6e08b59c159ae2b3789a0201709063049120c9909faf06a160cdbfde70c\"" Feb 12 19:44:00.366184 env[1126]: time="2024-02-12T19:44:00.365755369Z" level=info msg="StartContainer for \"2856a6e08b59c159ae2b3789a0201709063049120c9909faf06a160cdbfde70c\"" Feb 12 19:44:00.485362 systemd[1]: Started cri-containerd-2856a6e08b59c159ae2b3789a0201709063049120c9909faf06a160cdbfde70c.scope. Feb 12 19:44:00.554000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.554000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1517 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:00.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238353661366530386235396331353961653262333738396130323031 Feb 12 19:44:00.554000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.554000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.554000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.554000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.554000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.554000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.554000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.554000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.554000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.554000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.554000 audit: BPF prog-id=81 op=LOAD Feb 12 19:44:00.554000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002863f0 items=0 ppid=1517 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:00.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238353661366530386235396331353961653262333738396130323031 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit: BPF prog-id=82 op=LOAD Feb 12 19:44:00.559000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000286438 items=0 ppid=1517 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:00.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238353661366530386235396331353961653262333738396130323031 Feb 12 19:44:00.559000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:44:00.559000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:00.559000 audit: BPF prog-id=83 op=LOAD Feb 12 19:44:00.559000 audit[2067]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002864c8 items=0 ppid=1517 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:00.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238353661366530386235396331353961653262333738396130323031 Feb 12 19:44:00.627195 env[1126]: time="2024-02-12T19:44:00.627117761Z" level=info msg="StartContainer for \"2856a6e08b59c159ae2b3789a0201709063049120c9909faf06a160cdbfde70c\" returns successfully" Feb 12 19:44:00.784553 update_engine[1117]: I0212 19:44:00.778191 1117 update_attempter.cc:509] Updating boot flags... Feb 12 19:44:00.880761 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:44:00.881045 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:44:01.019394 kubelet[1452]: E0212 19:44:01.019320 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:01.474173 kubelet[1452]: E0212 19:44:01.474124 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:44:01.725120 systemd[1]: run-containerd-runc-k8s.io-2856a6e08b59c159ae2b3789a0201709063049120c9909faf06a160cdbfde70c-runc.DWR7iH.mount: Deactivated successfully. Feb 12 19:44:02.027838 kubelet[1452]: E0212 19:44:02.022568 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:02.085009 systemd[1]: run-containerd-runc-k8s.io-2856a6e08b59c159ae2b3789a0201709063049120c9909faf06a160cdbfde70c-runc.g3dHb4.mount: Deactivated successfully. Feb 12 19:44:02.215333 env[1126]: time="2024-02-12T19:44:02.215227736Z" level=info msg="StopPodSandbox for \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\"" Feb 12 19:44:02.477254 kubelet[1452]: E0212 19:44:02.475997 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:44:02.478433 kubelet[1452]: I0212 19:44:02.478387 1452 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-fggcf" podStartSLOduration=4.88214545 podCreationTimestamp="2024-02-12 19:43:32 +0000 UTC" firstStartedPulling="2024-02-12 19:43:34.671014134 +0000 UTC m=+5.462620939" lastFinishedPulling="2024-02-12 19:44:00.267187727 +0000 UTC m=+31.058794528" observedRunningTime="2024-02-12 19:44:01.550597765 +0000 UTC m=+32.342204589" watchObservedRunningTime="2024-02-12 19:44:02.478319039 +0000 UTC m=+33.269925850" Feb 12 19:44:02.535974 systemd[1]: run-containerd-runc-k8s.io-2856a6e08b59c159ae2b3789a0201709063049120c9909faf06a160cdbfde70c-runc.XWZtmX.mount: Deactivated successfully. Feb 12 19:44:02.589480 env[1126]: 2024-02-12 19:44:02.460 [INFO][2196] k8s.go 578: Cleaning up netns ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:44:02.589480 env[1126]: 2024-02-12 19:44:02.461 [INFO][2196] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" iface="eth0" netns="/var/run/netns/cni-710afece-1a99-51fd-5421-3d09226313bb" Feb 12 19:44:02.589480 env[1126]: 2024-02-12 19:44:02.467 [INFO][2196] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" iface="eth0" netns="/var/run/netns/cni-710afece-1a99-51fd-5421-3d09226313bb" Feb 12 19:44:02.589480 env[1126]: 2024-02-12 19:44:02.469 [INFO][2196] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" iface="eth0" netns="/var/run/netns/cni-710afece-1a99-51fd-5421-3d09226313bb" Feb 12 19:44:02.589480 env[1126]: 2024-02-12 19:44:02.470 [INFO][2196] k8s.go 585: Releasing IP address(es) ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:44:02.589480 env[1126]: 2024-02-12 19:44:02.470 [INFO][2196] utils.go 188: Calico CNI releasing IP address ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:44:02.589480 env[1126]: 2024-02-12 19:44:02.550 [INFO][2202] ipam_plugin.go 415: Releasing address using handleID ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" HandleID="k8s-pod-network.17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Workload="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:02.589480 env[1126]: 2024-02-12 19:44:02.551 [INFO][2202] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:44:02.589480 env[1126]: 2024-02-12 19:44:02.551 [INFO][2202] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:44:02.589480 env[1126]: 2024-02-12 19:44:02.572 [WARNING][2202] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" HandleID="k8s-pod-network.17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Workload="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:02.589480 env[1126]: 2024-02-12 19:44:02.572 [INFO][2202] ipam_plugin.go 443: Releasing address using workloadID ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" HandleID="k8s-pod-network.17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Workload="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:02.589480 env[1126]: 2024-02-12 19:44:02.577 [INFO][2202] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:44:02.589480 env[1126]: 2024-02-12 19:44:02.580 [INFO][2196] k8s.go 591: Teardown processing complete. ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:44:02.595709 systemd[1]: run-netns-cni\x2d710afece\x2d1a99\x2d51fd\x2d5421\x2d3d09226313bb.mount: Deactivated successfully. Feb 12 19:44:02.598392 env[1126]: time="2024-02-12T19:44:02.598300717Z" level=info msg="TearDown network for sandbox \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\" successfully" Feb 12 19:44:02.598920 env[1126]: time="2024-02-12T19:44:02.598866234Z" level=info msg="StopPodSandbox for \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\" returns successfully" Feb 12 19:44:02.600866 env[1126]: time="2024-02-12T19:44:02.600813674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2h4rf,Uid:91c2c594-31ce-4082-9992-a9001ced4b19,Namespace:calico-system,Attempt:1,}" Feb 12 19:44:03.022808 kubelet[1452]: E0212 19:44:03.022746 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:03.057563 kernel: Initializing XFRM netlink socket Feb 12 19:44:03.073425 systemd-networkd[1023]: cali25a97c6328a: Link UP Feb 12 19:44:03.078391 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:44:03.078556 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali25a97c6328a: link becomes ready Feb 12 19:44:03.078895 systemd-networkd[1023]: cali25a97c6328a: Gained carrier Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.736 [INFO][2230] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.781 [INFO][2230] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {147.182.245.110-k8s-csi--node--driver--2h4rf-eth0 csi-node-driver- calico-system 91c2c594-31ce-4082-9992-a9001ced4b19 1114 0 2024-02-12 19:43:32 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 147.182.245.110 csi-node-driver-2h4rf eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali25a97c6328a [] []}} ContainerID="f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" Namespace="calico-system" Pod="csi-node-driver-2h4rf" WorkloadEndpoint="147.182.245.110-k8s-csi--node--driver--2h4rf-" Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.782 [INFO][2230] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" Namespace="calico-system" Pod="csi-node-driver-2h4rf" WorkloadEndpoint="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.852 [INFO][2241] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" HandleID="k8s-pod-network.f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" Workload="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.889 [INFO][2241] ipam_plugin.go 268: Auto assigning IP ContainerID="f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" HandleID="k8s-pod-network.f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" Workload="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002a07b0), Attrs:map[string]string{"namespace":"calico-system", "node":"147.182.245.110", "pod":"csi-node-driver-2h4rf", "timestamp":"2024-02-12 19:44:02.852279955 +0000 UTC"}, Hostname:"147.182.245.110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.889 [INFO][2241] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.889 [INFO][2241] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.889 [INFO][2241] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '147.182.245.110' Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.899 [INFO][2241] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" host="147.182.245.110" Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.910 [INFO][2241] ipam.go 372: Looking up existing affinities for host host="147.182.245.110" Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.932 [INFO][2241] ipam.go 489: Trying affinity for 192.168.49.192/26 host="147.182.245.110" Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.945 [INFO][2241] ipam.go 155: Attempting to load block cidr=192.168.49.192/26 host="147.182.245.110" Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.964 [INFO][2241] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.49.192/26 host="147.182.245.110" Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.970 [INFO][2241] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.49.192/26 handle="k8s-pod-network.f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" host="147.182.245.110" Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.978 [INFO][2241] ipam.go 1682: Creating new handle: k8s-pod-network.f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:02.995 [INFO][2241] ipam.go 1203: Writing block in order to claim IPs block=192.168.49.192/26 handle="k8s-pod-network.f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" host="147.182.245.110" Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:03.017 [INFO][2241] ipam.go 1216: Successfully claimed IPs: [192.168.49.193/26] block=192.168.49.192/26 handle="k8s-pod-network.f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" host="147.182.245.110" Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:03.017 [INFO][2241] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.49.193/26] handle="k8s-pod-network.f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" host="147.182.245.110" Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:03.017 [INFO][2241] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:44:03.114331 env[1126]: 2024-02-12 19:44:03.017 [INFO][2241] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.49.193/26] IPv6=[] ContainerID="f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" HandleID="k8s-pod-network.f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" Workload="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:03.115271 env[1126]: 2024-02-12 19:44:03.021 [INFO][2230] k8s.go 385: Populated endpoint ContainerID="f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" Namespace="calico-system" Pod="csi-node-driver-2h4rf" WorkloadEndpoint="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110-k8s-csi--node--driver--2h4rf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"91c2c594-31ce-4082-9992-a9001ced4b19", ResourceVersion:"1114", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 43, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"147.182.245.110", ContainerID:"", Pod:"csi-node-driver-2h4rf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.49.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali25a97c6328a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:44:03.115271 env[1126]: 2024-02-12 19:44:03.022 [INFO][2230] k8s.go 386: Calico CNI using IPs: [192.168.49.193/32] ContainerID="f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" Namespace="calico-system" Pod="csi-node-driver-2h4rf" WorkloadEndpoint="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:03.115271 env[1126]: 2024-02-12 19:44:03.022 [INFO][2230] dataplane_linux.go 68: Setting the host side veth name to cali25a97c6328a ContainerID="f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" Namespace="calico-system" Pod="csi-node-driver-2h4rf" WorkloadEndpoint="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:03.115271 env[1126]: 2024-02-12 19:44:03.081 [INFO][2230] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" Namespace="calico-system" Pod="csi-node-driver-2h4rf" WorkloadEndpoint="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:03.115271 env[1126]: 2024-02-12 19:44:03.089 [INFO][2230] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" Namespace="calico-system" Pod="csi-node-driver-2h4rf" WorkloadEndpoint="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110-k8s-csi--node--driver--2h4rf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"91c2c594-31ce-4082-9992-a9001ced4b19", ResourceVersion:"1114", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 43, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"147.182.245.110", ContainerID:"f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c", Pod:"csi-node-driver-2h4rf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.49.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali25a97c6328a", MAC:"2e:d1:23:f2:5f:7d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:44:03.115271 env[1126]: 2024-02-12 19:44:03.110 [INFO][2230] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c" Namespace="calico-system" Pod="csi-node-driver-2h4rf" WorkloadEndpoint="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:03.141087 env[1126]: time="2024-02-12T19:44:03.139862363Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:44:03.141087 env[1126]: time="2024-02-12T19:44:03.139911896Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:44:03.141087 env[1126]: time="2024-02-12T19:44:03.139926683Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:44:03.141087 env[1126]: time="2024-02-12T19:44:03.140113038Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c pid=2297 runtime=io.containerd.runc.v2 Feb 12 19:44:03.172093 kernel: kauditd_printk_skb: 45 callbacks suppressed Feb 12 19:44:03.172335 kernel: audit: type=1400 audit(1707767043.158:684): avc: denied { write } for pid=2309 comm="tee" name="fd" dev="proc" ino=20309 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:44:03.158000 audit[2309]: AVC avc: denied { write } for pid=2309 comm="tee" name="fd" dev="proc" ino=20309 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:44:03.179966 systemd[1]: run-containerd-runc-k8s.io-f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c-runc.GD24pP.mount: Deactivated successfully. Feb 12 19:44:03.158000 audit[2309]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2d13b97b a2=241 a3=1b6 items=1 ppid=2259 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.193483 kernel: audit: type=1300 audit(1707767043.158:684): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2d13b97b a2=241 a3=1b6 items=1 ppid=2259 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.190378 systemd[1]: Started cri-containerd-f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c.scope. Feb 12 19:44:03.194000 audit[2317]: AVC avc: denied { write } for pid=2317 comm="tee" name="fd" dev="proc" ino=20318 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:44:03.200820 kernel: audit: type=1400 audit(1707767043.194:685): avc: denied { write } for pid=2317 comm="tee" name="fd" dev="proc" ino=20318 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:44:03.201009 kernel: audit: type=1307 audit(1707767043.158:684): cwd="/etc/service/enabled/bird6/log" Feb 12 19:44:03.158000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:44:03.158000 audit: PATH item=0 name="/dev/fd/63" inode=20303 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:03.205236 kernel: audit: type=1302 audit(1707767043.158:684): item=0 name="/dev/fd/63" inode=20303 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:03.158000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:44:03.209232 kernel: audit: type=1327 audit(1707767043.158:684): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:44:03.194000 audit[2317]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc42a0897b a2=241 a3=1b6 items=1 ppid=2261 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.218346 kernel: audit: type=1300 audit(1707767043.194:685): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc42a0897b a2=241 a3=1b6 items=1 ppid=2261 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.194000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:44:03.224985 kernel: audit: type=1307 audit(1707767043.194:685): cwd="/etc/service/enabled/felix/log" Feb 12 19:44:03.225152 kernel: audit: type=1302 audit(1707767043.194:685): item=0 name="/dev/fd/63" inode=20306 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:03.194000 audit: PATH item=0 name="/dev/fd/63" inode=20306 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:03.194000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:44:03.228301 kernel: audit: type=1327 audit(1707767043.194:685): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:44:03.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.247000 audit: BPF prog-id=84 op=LOAD Feb 12 19:44:03.248000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.248000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2297 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366332303039343734643462643835393431626365623134383239 Feb 12 19:44:03.248000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.248000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2297 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366332303039343734643462643835393431626365623134383239 Feb 12 19:44:03.248000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.248000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.248000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.248000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.248000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.248000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.248000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.248000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.248000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.248000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.248000 audit: BPF prog-id=85 op=LOAD Feb 12 19:44:03.248000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025310 items=0 ppid=2297 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366332303039343734643462643835393431626365623134383239 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit: BPF prog-id=86 op=LOAD Feb 12 19:44:03.249000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025358 items=0 ppid=2297 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366332303039343734643462643835393431626365623134383239 Feb 12 19:44:03.249000 audit: BPF prog-id=86 op=UNLOAD Feb 12 19:44:03.249000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.249000 audit: BPF prog-id=87 op=LOAD Feb 12 19:44:03.249000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025768 items=0 ppid=2297 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638366332303039343734643462643835393431626365623134383239 Feb 12 19:44:03.265000 audit[2332]: AVC avc: denied { write } for pid=2332 comm="tee" name="fd" dev="proc" ino=19410 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:44:03.265000 audit[2332]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2954a96c a2=241 a3=1b6 items=1 ppid=2262 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.265000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:44:03.265000 audit: PATH item=0 name="/dev/fd/63" inode=19354 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:03.265000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:44:03.299696 env[1126]: time="2024-02-12T19:44:03.299264513Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2h4rf,Uid:91c2c594-31ce-4082-9992-a9001ced4b19,Namespace:calico-system,Attempt:1,} returns sandbox id \"f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c\"" Feb 12 19:44:03.308591 env[1126]: time="2024-02-12T19:44:03.308511924Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:44:03.315000 audit[2363]: AVC avc: denied { write } for pid=2363 comm="tee" name="fd" dev="proc" ino=20338 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:44:03.317000 audit[2360]: AVC avc: denied { write } for pid=2360 comm="tee" name="fd" dev="proc" ino=19428 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:44:03.317000 audit[2360]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc930ad97b a2=241 a3=1b6 items=1 ppid=2273 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.317000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:44:03.317000 audit: PATH item=0 name="/dev/fd/63" inode=19417 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:03.317000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:44:03.321000 audit[2366]: AVC avc: denied { write } for pid=2366 comm="tee" name="fd" dev="proc" ino=19435 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:44:03.321000 audit[2366]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc698c696b a2=241 a3=1b6 items=1 ppid=2265 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.321000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:44:03.321000 audit: PATH item=0 name="/dev/fd/63" inode=19420 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:03.321000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:44:03.315000 audit[2363]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5679997c a2=241 a3=1b6 items=1 ppid=2266 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.315000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:44:03.315000 audit: PATH item=0 name="/dev/fd/63" inode=19419 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:03.315000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:44:03.333000 audit[2376]: AVC avc: denied { write } for pid=2376 comm="tee" name="fd" dev="proc" ino=20342 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:44:03.333000 audit[2376]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe29c3297d a2=241 a3=1b6 items=1 ppid=2270 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.333000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:44:03.333000 audit: PATH item=0 name="/dev/fd/63" inode=19432 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:03.333000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:44:03.480003 kubelet[1452]: E0212 19:44:03.479965 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:44:03.953000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.953000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.953000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.953000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.953000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.953000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.953000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.953000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.953000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.953000 audit: BPF prog-id=88 op=LOAD Feb 12 19:44:03.953000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2e8ee6b0 a2=70 a3=7f3e298fd000 items=0 ppid=2269 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.953000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:44:03.957000 audit: BPF prog-id=88 op=UNLOAD Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit: BPF prog-id=89 op=LOAD Feb 12 19:44:03.957000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2e8ee6b0 a2=70 a3=6e items=0 ppid=2269 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:44:03.957000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc2e8ee660 a2=70 a3=7ffc2e8ee6b0 items=0 ppid=2269 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit: BPF prog-id=90 op=LOAD Feb 12 19:44:03.957000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc2e8ee640 a2=70 a3=7ffc2e8ee6b0 items=0 ppid=2269 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:44:03.957000 audit: BPF prog-id=90 op=UNLOAD Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2e8ee720 a2=70 a3=0 items=0 ppid=2269 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2e8ee710 a2=70 a3=0 items=0 ppid=2269 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:44:03.957000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.957000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc2e8ee750 a2=70 a3=0 items=0 ppid=2269 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.957000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:44:03.958000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.958000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.958000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.958000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.958000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.958000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.958000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.958000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.958000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.958000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.958000 audit: BPF prog-id=91 op=LOAD Feb 12 19:44:03.958000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc2e8ee670 a2=70 a3=ffffffff items=0 ppid=2269 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.958000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:44:03.966000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.966000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff4b007740 a2=70 a3=fff80800 items=0 ppid=2269 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.966000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:44:03.967000 audit[2466]: AVC avc: denied { bpf } for pid=2466 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:03.967000 audit[2466]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff4b007610 a2=70 a3=3 items=0 ppid=2269 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:03.967000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:44:03.975000 audit: BPF prog-id=91 op=UNLOAD Feb 12 19:44:04.025543 kubelet[1452]: E0212 19:44:04.025449 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:04.105000 audit[2490]: NETFILTER_CFG table=mangle:69 family=2 entries=19 op=nft_register_chain pid=2490 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:44:04.105000 audit[2490]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe7c633260 a2=0 a3=7ffe7c63324c items=0 ppid=2269 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:04.105000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:44:04.108000 audit[2488]: NETFILTER_CFG table=raw:70 family=2 entries=19 op=nft_register_chain pid=2488 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:44:04.108000 audit[2488]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffe7c5bd3a0 a2=0 a3=560b51733000 items=0 ppid=2269 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:04.108000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:44:04.117000 audit[2489]: NETFILTER_CFG table=nat:71 family=2 entries=16 op=nft_register_chain pid=2489 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:44:04.117000 audit[2489]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fffbbcb7f00 a2=0 a3=557e80615000 items=0 ppid=2269 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:04.117000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:44:04.118000 audit[2494]: NETFILTER_CFG table=filter:72 family=2 entries=71 op=nft_register_chain pid=2494 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:44:04.118000 audit[2494]: SYSCALL arch=c000003e syscall=46 success=yes exit=36636 a0=3 a1=7fff185b4d50 a2=0 a3=5574c32a2000 items=0 ppid=2269 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:04.118000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:44:04.735074 systemd-networkd[1023]: vxlan.calico: Link UP Feb 12 19:44:04.735091 systemd-networkd[1023]: vxlan.calico: Gained carrier Feb 12 19:44:04.914438 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount86416195.mount: Deactivated successfully. Feb 12 19:44:05.025834 kubelet[1452]: E0212 19:44:05.025650 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:05.078539 systemd-networkd[1023]: cali25a97c6328a: Gained IPv6LL Feb 12 19:44:05.213468 env[1126]: time="2024-02-12T19:44:05.213403097Z" level=info msg="StopPodSandbox for \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\"" Feb 12 19:44:05.436554 env[1126]: 2024-02-12 19:44:05.322 [INFO][2520] k8s.go 578: Cleaning up netns ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:44:05.436554 env[1126]: 2024-02-12 19:44:05.322 [INFO][2520] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" iface="eth0" netns="/var/run/netns/cni-06939d4d-9188-ca3f-faf5-655d6d182708" Feb 12 19:44:05.436554 env[1126]: 2024-02-12 19:44:05.323 [INFO][2520] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" iface="eth0" netns="/var/run/netns/cni-06939d4d-9188-ca3f-faf5-655d6d182708" Feb 12 19:44:05.436554 env[1126]: 2024-02-12 19:44:05.323 [INFO][2520] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" iface="eth0" netns="/var/run/netns/cni-06939d4d-9188-ca3f-faf5-655d6d182708" Feb 12 19:44:05.436554 env[1126]: 2024-02-12 19:44:05.323 [INFO][2520] k8s.go 585: Releasing IP address(es) ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:44:05.436554 env[1126]: 2024-02-12 19:44:05.323 [INFO][2520] utils.go 188: Calico CNI releasing IP address ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:44:05.436554 env[1126]: 2024-02-12 19:44:05.412 [INFO][2526] ipam_plugin.go 415: Releasing address using handleID ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" HandleID="k8s-pod-network.8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Workload="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:05.436554 env[1126]: 2024-02-12 19:44:05.412 [INFO][2526] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:44:05.436554 env[1126]: 2024-02-12 19:44:05.413 [INFO][2526] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:44:05.436554 env[1126]: 2024-02-12 19:44:05.424 [WARNING][2526] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" HandleID="k8s-pod-network.8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Workload="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:05.436554 env[1126]: 2024-02-12 19:44:05.424 [INFO][2526] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" HandleID="k8s-pod-network.8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Workload="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:05.436554 env[1126]: 2024-02-12 19:44:05.432 [INFO][2526] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:44:05.436554 env[1126]: 2024-02-12 19:44:05.434 [INFO][2520] k8s.go 591: Teardown processing complete. ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:44:05.440667 env[1126]: time="2024-02-12T19:44:05.440030400Z" level=info msg="TearDown network for sandbox \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\" successfully" Feb 12 19:44:05.440667 env[1126]: time="2024-02-12T19:44:05.440092993Z" level=info msg="StopPodSandbox for \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\" returns successfully" Feb 12 19:44:05.439163 systemd[1]: run-netns-cni\x2d06939d4d\x2d9188\x2dca3f\x2dfaf5\x2d655d6d182708.mount: Deactivated successfully. Feb 12 19:44:05.441251 env[1126]: time="2024-02-12T19:44:05.441173267Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-5s97f,Uid:cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c,Namespace:default,Attempt:1,}" Feb 12 19:44:05.535161 env[1126]: time="2024-02-12T19:44:05.534925915Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:05.540903 env[1126]: time="2024-02-12T19:44:05.540734620Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:05.547311 env[1126]: time="2024-02-12T19:44:05.547192437Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:05.549723 env[1126]: time="2024-02-12T19:44:05.549659203Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:05.554112 env[1126]: time="2024-02-12T19:44:05.553931236Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 19:44:05.558667 env[1126]: time="2024-02-12T19:44:05.558571700Z" level=info msg="CreateContainer within sandbox \"f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:44:05.589789 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4279304730.mount: Deactivated successfully. Feb 12 19:44:05.620299 env[1126]: time="2024-02-12T19:44:05.619935296Z" level=info msg="CreateContainer within sandbox \"f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e4fcffc328c2b6ebfc5b7d0879d9d75ec9a723b20efb5e2b1c71834480d92dfa\"" Feb 12 19:44:05.621634 env[1126]: time="2024-02-12T19:44:05.621579708Z" level=info msg="StartContainer for \"e4fcffc328c2b6ebfc5b7d0879d9d75ec9a723b20efb5e2b1c71834480d92dfa\"" Feb 12 19:44:05.686595 systemd[1]: Started cri-containerd-e4fcffc328c2b6ebfc5b7d0879d9d75ec9a723b20efb5e2b1c71834480d92dfa.scope. Feb 12 19:44:05.721000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.721000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2297 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:05.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534666366666333323863326236656266633562376430383739643964 Feb 12 19:44:05.722000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.722000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.722000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.722000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.722000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.722000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.722000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.722000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.722000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.722000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.722000 audit: BPF prog-id=92 op=LOAD Feb 12 19:44:05.722000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001e6a90 items=0 ppid=2297 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:05.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534666366666333323863326236656266633562376430383739643964 Feb 12 19:44:05.724000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.724000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.724000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.724000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.724000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.724000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.724000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.724000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.724000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.724000 audit: BPF prog-id=93 op=LOAD Feb 12 19:44:05.724000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001e6ad8 items=0 ppid=2297 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:05.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534666366666333323863326236656266633562376430383739643964 Feb 12 19:44:05.725000 audit: BPF prog-id=93 op=UNLOAD Feb 12 19:44:05.725000 audit: BPF prog-id=92 op=UNLOAD Feb 12 19:44:05.725000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.725000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.725000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.725000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.725000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.725000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.725000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.725000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.725000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.725000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.725000 audit: BPF prog-id=94 op=LOAD Feb 12 19:44:05.725000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001e6b68 items=0 ppid=2297 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:05.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534666366666333323863326236656266633562376430383739643964 Feb 12 19:44:05.765576 env[1126]: time="2024-02-12T19:44:05.765462729Z" level=info msg="StartContainer for \"e4fcffc328c2b6ebfc5b7d0879d9d75ec9a723b20efb5e2b1c71834480d92dfa\" returns successfully" Feb 12 19:44:05.769017 env[1126]: time="2024-02-12T19:44:05.768927163Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:44:05.821152 systemd-networkd[1023]: cali3f0af9a5e52: Link UP Feb 12 19:44:05.826479 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:44:05.826641 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3f0af9a5e52: link becomes ready Feb 12 19:44:05.825739 systemd-networkd[1023]: cali3f0af9a5e52: Gained carrier Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.581 [INFO][2533] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0 nginx-deployment-6d5f899847- default cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c 1133 0 2024-02-12 19:43:50 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 147.182.245.110 nginx-deployment-6d5f899847-5s97f eth0 default [] [] [kns.default ksa.default.default] cali3f0af9a5e52 [] []}} ContainerID="15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" Namespace="default" Pod="nginx-deployment-6d5f899847-5s97f" WorkloadEndpoint="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-" Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.581 [INFO][2533] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" Namespace="default" Pod="nginx-deployment-6d5f899847-5s97f" WorkloadEndpoint="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.667 [INFO][2547] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" HandleID="k8s-pod-network.15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" Workload="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.706 [INFO][2547] ipam_plugin.go 268: Auto assigning IP ContainerID="15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" HandleID="k8s-pod-network.15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" Workload="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cbd0), Attrs:map[string]string{"namespace":"default", "node":"147.182.245.110", "pod":"nginx-deployment-6d5f899847-5s97f", "timestamp":"2024-02-12 19:44:05.667572883 +0000 UTC"}, Hostname:"147.182.245.110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.706 [INFO][2547] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.707 [INFO][2547] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.707 [INFO][2547] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '147.182.245.110' Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.714 [INFO][2547] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" host="147.182.245.110" Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.748 [INFO][2547] ipam.go 372: Looking up existing affinities for host host="147.182.245.110" Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.766 [INFO][2547] ipam.go 489: Trying affinity for 192.168.49.192/26 host="147.182.245.110" Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.776 [INFO][2547] ipam.go 155: Attempting to load block cidr=192.168.49.192/26 host="147.182.245.110" Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.784 [INFO][2547] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.49.192/26 host="147.182.245.110" Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.784 [INFO][2547] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.49.192/26 handle="k8s-pod-network.15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" host="147.182.245.110" Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.790 [INFO][2547] ipam.go 1682: Creating new handle: k8s-pod-network.15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.799 [INFO][2547] ipam.go 1203: Writing block in order to claim IPs block=192.168.49.192/26 handle="k8s-pod-network.15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" host="147.182.245.110" Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.813 [INFO][2547] ipam.go 1216: Successfully claimed IPs: [192.168.49.194/26] block=192.168.49.192/26 handle="k8s-pod-network.15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" host="147.182.245.110" Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.813 [INFO][2547] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.49.194/26] handle="k8s-pod-network.15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" host="147.182.245.110" Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.813 [INFO][2547] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:44:05.859245 env[1126]: 2024-02-12 19:44:05.813 [INFO][2547] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.49.194/26] IPv6=[] ContainerID="15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" HandleID="k8s-pod-network.15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" Workload="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:05.860363 env[1126]: 2024-02-12 19:44:05.816 [INFO][2533] k8s.go 385: Populated endpoint ContainerID="15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" Namespace="default" Pod="nginx-deployment-6d5f899847-5s97f" WorkloadEndpoint="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c", ResourceVersion:"1133", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 43, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"147.182.245.110", ContainerID:"", Pod:"nginx-deployment-6d5f899847-5s97f", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.49.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3f0af9a5e52", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:44:05.860363 env[1126]: 2024-02-12 19:44:05.816 [INFO][2533] k8s.go 386: Calico CNI using IPs: [192.168.49.194/32] ContainerID="15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" Namespace="default" Pod="nginx-deployment-6d5f899847-5s97f" WorkloadEndpoint="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:05.860363 env[1126]: 2024-02-12 19:44:05.817 [INFO][2533] dataplane_linux.go 68: Setting the host side veth name to cali3f0af9a5e52 ContainerID="15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" Namespace="default" Pod="nginx-deployment-6d5f899847-5s97f" WorkloadEndpoint="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:05.860363 env[1126]: 2024-02-12 19:44:05.827 [INFO][2533] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" Namespace="default" Pod="nginx-deployment-6d5f899847-5s97f" WorkloadEndpoint="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:05.860363 env[1126]: 2024-02-12 19:44:05.829 [INFO][2533] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" Namespace="default" Pod="nginx-deployment-6d5f899847-5s97f" WorkloadEndpoint="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c", ResourceVersion:"1133", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 43, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"147.182.245.110", ContainerID:"15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a", Pod:"nginx-deployment-6d5f899847-5s97f", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.49.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3f0af9a5e52", MAC:"7a:63:cf:b8:8c:f6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:44:05.860363 env[1126]: 2024-02-12 19:44:05.851 [INFO][2533] k8s.go 491: Wrote updated endpoint to datastore ContainerID="15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a" Namespace="default" Pod="nginx-deployment-6d5f899847-5s97f" WorkloadEndpoint="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:05.885065 env[1126]: time="2024-02-12T19:44:05.884928183Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:44:05.885330 env[1126]: time="2024-02-12T19:44:05.885091870Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:44:05.885330 env[1126]: time="2024-02-12T19:44:05.885125283Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:44:05.885462 env[1126]: time="2024-02-12T19:44:05.885409300Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a pid=2607 runtime=io.containerd.runc.v2 Feb 12 19:44:05.909517 systemd[1]: Started cri-containerd-15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a.scope. Feb 12 19:44:05.919000 audit[2630]: NETFILTER_CFG table=filter:73 family=2 entries=40 op=nft_register_chain pid=2630 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:44:05.919000 audit[2630]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffec38bc760 a2=0 a3=7ffec38bc74c items=0 ppid=2269 pid=2630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:05.919000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:44:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.937000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.938000 audit: BPF prog-id=95 op=LOAD Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2607 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:05.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135666431623832383730386630363363366365306163633136633330 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2607 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:05.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135666431623832383730386630363363366365306163633136633330 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit: BPF prog-id=96 op=LOAD Feb 12 19:44:05.939000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00028a860 items=0 ppid=2607 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:05.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135666431623832383730386630363363366365306163633136633330 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.939000 audit: BPF prog-id=97 op=LOAD Feb 12 19:44:05.939000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00028a8a8 items=0 ppid=2607 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:05.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135666431623832383730386630363363366365306163633136633330 Feb 12 19:44:05.939000 audit: BPF prog-id=97 op=UNLOAD Feb 12 19:44:05.940000 audit: BPF prog-id=96 op=UNLOAD Feb 12 19:44:05.940000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.940000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.940000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.940000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.940000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.940000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.940000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.940000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.940000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.940000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:05.940000 audit: BPF prog-id=98 op=LOAD Feb 12 19:44:05.940000 audit[2618]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00028acb8 items=0 ppid=2607 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:05.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135666431623832383730386630363363366365306163633136633330 Feb 12 19:44:05.987502 env[1126]: time="2024-02-12T19:44:05.987405406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-5s97f,Uid:cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c,Namespace:default,Attempt:1,} returns sandbox id \"15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a\"" Feb 12 19:44:06.026571 kubelet[1452]: E0212 19:44:06.026503 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:06.167603 systemd-networkd[1023]: vxlan.calico: Gained IPv6LL Feb 12 19:44:06.935998 systemd-networkd[1023]: cali3f0af9a5e52: Gained IPv6LL Feb 12 19:44:07.027739 kubelet[1452]: E0212 19:44:07.027668 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:07.647797 env[1126]: time="2024-02-12T19:44:07.647707617Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:07.651124 env[1126]: time="2024-02-12T19:44:07.651067434Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:07.655266 env[1126]: time="2024-02-12T19:44:07.655184619Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:07.659706 env[1126]: time="2024-02-12T19:44:07.659628858Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:07.662381 env[1126]: time="2024-02-12T19:44:07.661638695Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 19:44:07.665182 env[1126]: time="2024-02-12T19:44:07.665067020Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:44:07.666801 env[1126]: time="2024-02-12T19:44:07.666744595Z" level=info msg="CreateContainer within sandbox \"f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:44:07.690725 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount756815128.mount: Deactivated successfully. Feb 12 19:44:07.722894 env[1126]: time="2024-02-12T19:44:07.722813969Z" level=info msg="CreateContainer within sandbox \"f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"e7fbd59a257091a524f1114b70b181c56c5d5ab636edaed917f2d0bb98fa5e93\"" Feb 12 19:44:07.725248 env[1126]: time="2024-02-12T19:44:07.725110550Z" level=info msg="StartContainer for \"e7fbd59a257091a524f1114b70b181c56c5d5ab636edaed917f2d0bb98fa5e93\"" Feb 12 19:44:07.775717 systemd[1]: run-containerd-runc-k8s.io-e7fbd59a257091a524f1114b70b181c56c5d5ab636edaed917f2d0bb98fa5e93-runc.8WWrf5.mount: Deactivated successfully. Feb 12 19:44:07.783535 systemd[1]: Started cri-containerd-e7fbd59a257091a524f1114b70b181c56c5d5ab636edaed917f2d0bb98fa5e93.scope. Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2297 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:07.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537666264353961323537303931613532346631313134623730623138 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit: BPF prog-id=99 op=LOAD Feb 12 19:44:07.820000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00040e070 items=0 ppid=2297 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:07.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537666264353961323537303931613532346631313134623730623138 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit: BPF prog-id=100 op=LOAD Feb 12 19:44:07.820000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00040e0b8 items=0 ppid=2297 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:07.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537666264353961323537303931613532346631313134623730623138 Feb 12 19:44:07.820000 audit: BPF prog-id=100 op=UNLOAD Feb 12 19:44:07.820000 audit: BPF prog-id=99 op=UNLOAD Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:07.820000 audit: BPF prog-id=101 op=LOAD Feb 12 19:44:07.820000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00040e148 items=0 ppid=2297 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:07.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537666264353961323537303931613532346631313134623730623138 Feb 12 19:44:07.859894 env[1126]: time="2024-02-12T19:44:07.859813539Z" level=info msg="StartContainer for \"e7fbd59a257091a524f1114b70b181c56c5d5ab636edaed917f2d0bb98fa5e93\" returns successfully" Feb 12 19:44:08.028556 kubelet[1452]: E0212 19:44:08.028339 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:08.134240 kubelet[1452]: I0212 19:44:08.134147 1452 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:44:08.134964 kubelet[1452]: I0212 19:44:08.134873 1452 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:44:09.030024 kubelet[1452]: E0212 19:44:09.028677 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:10.029678 kubelet[1452]: E0212 19:44:10.029585 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:10.951240 kubelet[1452]: E0212 19:44:10.948709 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:11.030175 kubelet[1452]: E0212 19:44:11.030104 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:11.656759 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2136262386.mount: Deactivated successfully. Feb 12 19:44:12.031373 kubelet[1452]: E0212 19:44:12.031182 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:13.032577 kubelet[1452]: E0212 19:44:13.032478 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:13.160819 env[1126]: time="2024-02-12T19:44:13.160748658Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:13.165662 env[1126]: time="2024-02-12T19:44:13.165599135Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:13.169325 env[1126]: time="2024-02-12T19:44:13.169261599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:13.173831 env[1126]: time="2024-02-12T19:44:13.173771032Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:13.174944 env[1126]: time="2024-02-12T19:44:13.174881200Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 19:44:13.180388 env[1126]: time="2024-02-12T19:44:13.180011600Z" level=info msg="CreateContainer within sandbox \"15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 19:44:13.207455 env[1126]: time="2024-02-12T19:44:13.207325098Z" level=info msg="CreateContainer within sandbox \"15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"5129c443417eca02542fe0b2eb0de8bc3b07937c167be214a9ee4927163e283d\"" Feb 12 19:44:13.208845 env[1126]: time="2024-02-12T19:44:13.208702947Z" level=info msg="StartContainer for \"5129c443417eca02542fe0b2eb0de8bc3b07937c167be214a9ee4927163e283d\"" Feb 12 19:44:13.254913 systemd[1]: Started cri-containerd-5129c443417eca02542fe0b2eb0de8bc3b07937c167be214a9ee4927163e283d.scope. Feb 12 19:44:13.289404 kernel: kauditd_printk_skb: 311 callbacks suppressed Feb 12 19:44:13.289751 kernel: audit: type=1400 audit(1707767053.279:758): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.289830 kernel: audit: type=1400 audit(1707767053.279:759): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.294546 kernel: audit: type=1400 audit(1707767053.279:760): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.294754 kernel: audit: type=1400 audit(1707767053.279:761): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.300612 kernel: audit: type=1400 audit(1707767053.279:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.300798 kernel: audit: type=1400 audit(1707767053.279:763): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.303897 kernel: audit: type=1400 audit(1707767053.279:764): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.279000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.310048 kernel: audit: type=1400 audit(1707767053.279:765): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.310323 kernel: audit: type=1400 audit(1707767053.279:766): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.279000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.314685 kernel: audit: type=1400 audit(1707767053.280:767): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.280000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.280000 audit: BPF prog-id=102 op=LOAD Feb 12 19:44:13.285000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.285000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2607 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:13.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323963343433343137656361303235343266653062326562306465 Feb 12 19:44:13.285000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.285000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2607 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:13.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323963343433343137656361303235343266653062326562306465 Feb 12 19:44:13.285000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.285000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.285000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.285000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.285000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.285000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.285000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.285000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.285000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.285000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.285000 audit: BPF prog-id=103 op=LOAD Feb 12 19:44:13.285000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d80a0 items=0 ppid=2607 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:13.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323963343433343137656361303235343266653062326562306465 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit: BPF prog-id=104 op=LOAD Feb 12 19:44:13.288000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d80e8 items=0 ppid=2607 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:13.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323963343433343137656361303235343266653062326562306465 Feb 12 19:44:13.288000 audit: BPF prog-id=104 op=UNLOAD Feb 12 19:44:13.288000 audit: BPF prog-id=103 op=UNLOAD Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { perfmon } for pid=2704 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit[2704]: AVC avc: denied { bpf } for pid=2704 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:13.288000 audit: BPF prog-id=105 op=LOAD Feb 12 19:44:13.288000 audit[2704]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d84f8 items=0 ppid=2607 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:13.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531323963343433343137656361303235343266653062326562306465 Feb 12 19:44:13.345645 env[1126]: time="2024-02-12T19:44:13.345566559Z" level=info msg="StartContainer for \"5129c443417eca02542fe0b2eb0de8bc3b07937c167be214a9ee4927163e283d\" returns successfully" Feb 12 19:44:13.545251 kubelet[1452]: I0212 19:44:13.545007 1452 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-2h4rf" podStartSLOduration=37.189311113 podCreationTimestamp="2024-02-12 19:43:32 +0000 UTC" firstStartedPulling="2024-02-12 19:44:03.307287815 +0000 UTC m=+34.098894673" lastFinishedPulling="2024-02-12 19:44:07.662926276 +0000 UTC m=+38.454533074" observedRunningTime="2024-02-12 19:44:08.532872721 +0000 UTC m=+39.324479532" watchObservedRunningTime="2024-02-12 19:44:13.544949514 +0000 UTC m=+44.336556324" Feb 12 19:44:14.033638 kubelet[1452]: E0212 19:44:14.033520 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:15.034248 kubelet[1452]: E0212 19:44:15.034178 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:16.035358 kubelet[1452]: E0212 19:44:16.035307 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:17.036706 kubelet[1452]: E0212 19:44:17.036624 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:18.038186 kubelet[1452]: E0212 19:44:18.038109 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:19.040337 kubelet[1452]: E0212 19:44:19.039986 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:20.040988 kubelet[1452]: E0212 19:44:20.040900 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:21.042815 kubelet[1452]: E0212 19:44:21.042676 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:22.039000 audit[2762]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:44:22.042859 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 12 19:44:22.043028 kernel: audit: type=1325 audit(1707767062.039:776): table=filter:74 family=2 entries=20 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:44:22.044738 kubelet[1452]: E0212 19:44:22.044685 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:22.039000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc8c846de0 a2=0 a3=7ffc8c846dcc items=0 ppid=1603 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:22.055268 kernel: audit: type=1300 audit(1707767062.039:776): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc8c846de0 a2=0 a3=7ffc8c846dcc items=0 ppid=1603 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:22.055746 kernel: audit: type=1327 audit(1707767062.039:776): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:44:22.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:44:22.042000 audit[2762]: NETFILTER_CFG table=nat:75 family=2 entries=22 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:44:22.064342 kernel: audit: type=1325 audit(1707767062.042:777): table=nat:75 family=2 entries=22 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:44:22.042000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffc8c846de0 a2=0 a3=31030 items=0 ppid=1603 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:22.042000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:44:22.074916 kernel: audit: type=1300 audit(1707767062.042:777): arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffc8c846de0 a2=0 a3=31030 items=0 ppid=1603 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:22.075563 kernel: audit: type=1327 audit(1707767062.042:777): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:44:22.082000 audit[2764]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:44:22.082000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc92fb2d50 a2=0 a3=7ffc92fb2d3c items=0 ppid=1603 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:22.099233 kernel: audit: type=1325 audit(1707767062.082:778): table=filter:76 family=2 entries=32 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:44:22.099516 kernel: audit: type=1300 audit(1707767062.082:778): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc92fb2d50 a2=0 a3=7ffc92fb2d3c items=0 ppid=1603 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:22.099608 kernel: audit: type=1327 audit(1707767062.082:778): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:44:22.082000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:44:22.085000 audit[2764]: NETFILTER_CFG table=nat:77 family=2 entries=22 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:44:22.105939 kernel: audit: type=1325 audit(1707767062.085:779): table=nat:77 family=2 entries=22 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:44:22.085000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffc92fb2d50 a2=0 a3=31030 items=0 ppid=1603 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:22.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:44:22.218455 kubelet[1452]: I0212 19:44:22.218322 1452 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-5s97f" podStartSLOduration=25.033057657 podCreationTimestamp="2024-02-12 19:43:50 +0000 UTC" firstStartedPulling="2024-02-12 19:44:05.990451711 +0000 UTC m=+36.782058513" lastFinishedPulling="2024-02-12 19:44:13.175526675 +0000 UTC m=+43.967133478" observedRunningTime="2024-02-12 19:44:13.548245198 +0000 UTC m=+44.339852012" watchObservedRunningTime="2024-02-12 19:44:22.218132622 +0000 UTC m=+53.009739436" Feb 12 19:44:22.218825 kubelet[1452]: I0212 19:44:22.218616 1452 topology_manager.go:215] "Topology Admit Handler" podUID="7af98359-25a6-443d-a4c9-bc762c0b7ecc" podNamespace="default" podName="nfs-server-provisioner-0" Feb 12 19:44:22.228448 systemd[1]: Created slice kubepods-besteffort-pod7af98359_25a6_443d_a4c9_bc762c0b7ecc.slice. Feb 12 19:44:22.352859 kubelet[1452]: I0212 19:44:22.352493 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/7af98359-25a6-443d-a4c9-bc762c0b7ecc-data\") pod \"nfs-server-provisioner-0\" (UID: \"7af98359-25a6-443d-a4c9-bc762c0b7ecc\") " pod="default/nfs-server-provisioner-0" Feb 12 19:44:22.352859 kubelet[1452]: I0212 19:44:22.352672 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gs4pp\" (UniqueName: \"kubernetes.io/projected/7af98359-25a6-443d-a4c9-bc762c0b7ecc-kube-api-access-gs4pp\") pod \"nfs-server-provisioner-0\" (UID: \"7af98359-25a6-443d-a4c9-bc762c0b7ecc\") " pod="default/nfs-server-provisioner-0" Feb 12 19:44:22.534461 env[1126]: time="2024-02-12T19:44:22.533848330Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:7af98359-25a6-443d-a4c9-bc762c0b7ecc,Namespace:default,Attempt:0,}" Feb 12 19:44:22.869671 systemd-networkd[1023]: cali60e51b789ff: Link UP Feb 12 19:44:22.873049 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:44:22.873237 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 19:44:22.873464 systemd-networkd[1023]: cali60e51b789ff: Gained carrier Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.665 [INFO][2767] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {147.182.245.110-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 7af98359-25a6-443d-a4c9-bc762c0b7ecc 1204 0 2024-02-12 19:44:22 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 147.182.245.110 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="147.182.245.110-k8s-nfs--server--provisioner--0-" Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.665 [INFO][2767] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="147.182.245.110-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.741 [INFO][2777] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" HandleID="k8s-pod-network.aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" Workload="147.182.245.110-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.765 [INFO][2777] ipam_plugin.go 268: Auto assigning IP ContainerID="aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" HandleID="k8s-pod-network.aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" Workload="147.182.245.110-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00024e9c0), Attrs:map[string]string{"namespace":"default", "node":"147.182.245.110", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 19:44:22.741452747 +0000 UTC"}, Hostname:"147.182.245.110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.765 [INFO][2777] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.765 [INFO][2777] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.765 [INFO][2777] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '147.182.245.110' Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.770 [INFO][2777] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" host="147.182.245.110" Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.789 [INFO][2777] ipam.go 372: Looking up existing affinities for host host="147.182.245.110" Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.800 [INFO][2777] ipam.go 489: Trying affinity for 192.168.49.192/26 host="147.182.245.110" Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.806 [INFO][2777] ipam.go 155: Attempting to load block cidr=192.168.49.192/26 host="147.182.245.110" Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.811 [INFO][2777] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.49.192/26 host="147.182.245.110" Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.812 [INFO][2777] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.49.192/26 handle="k8s-pod-network.aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" host="147.182.245.110" Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.817 [INFO][2777] ipam.go 1682: Creating new handle: k8s-pod-network.aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.829 [INFO][2777] ipam.go 1203: Writing block in order to claim IPs block=192.168.49.192/26 handle="k8s-pod-network.aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" host="147.182.245.110" Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.843 [INFO][2777] ipam.go 1216: Successfully claimed IPs: [192.168.49.195/26] block=192.168.49.192/26 handle="k8s-pod-network.aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" host="147.182.245.110" Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.844 [INFO][2777] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.49.195/26] handle="k8s-pod-network.aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" host="147.182.245.110" Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.844 [INFO][2777] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:44:22.909393 env[1126]: 2024-02-12 19:44:22.845 [INFO][2777] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.49.195/26] IPv6=[] ContainerID="aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" HandleID="k8s-pod-network.aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" Workload="147.182.245.110-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:44:22.910601 env[1126]: 2024-02-12 19:44:22.857 [INFO][2767] k8s.go 385: Populated endpoint ContainerID="aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="147.182.245.110-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"7af98359-25a6-443d-a4c9-bc762c0b7ecc", ResourceVersion:"1204", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 44, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"147.182.245.110", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.49.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:44:22.910601 env[1126]: 2024-02-12 19:44:22.858 [INFO][2767] k8s.go 386: Calico CNI using IPs: [192.168.49.195/32] ContainerID="aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="147.182.245.110-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:44:22.910601 env[1126]: 2024-02-12 19:44:22.858 [INFO][2767] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="147.182.245.110-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:44:22.910601 env[1126]: 2024-02-12 19:44:22.873 [INFO][2767] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="147.182.245.110-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:44:22.910947 env[1126]: 2024-02-12 19:44:22.881 [INFO][2767] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="147.182.245.110-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"7af98359-25a6-443d-a4c9-bc762c0b7ecc", ResourceVersion:"1204", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 44, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"147.182.245.110", ContainerID:"aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.49.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"e2:b7:f9:93:ad:ff", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:44:22.910947 env[1126]: 2024-02-12 19:44:22.905 [INFO][2767] k8s.go 491: Wrote updated endpoint to datastore ContainerID="aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="147.182.245.110-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:44:22.948902 env[1126]: time="2024-02-12T19:44:22.948754669Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:44:22.948902 env[1126]: time="2024-02-12T19:44:22.948879345Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:44:22.949181 env[1126]: time="2024-02-12T19:44:22.948917963Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:44:22.949275 env[1126]: time="2024-02-12T19:44:22.949188335Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d pid=2808 runtime=io.containerd.runc.v2 Feb 12 19:44:22.961000 audit[2817]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=2817 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:44:22.961000 audit[2817]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffea057ff60 a2=0 a3=7ffea057ff4c items=0 ppid=2269 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:22.961000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:44:23.045305 systemd[1]: Started cri-containerd-aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d.scope. Feb 12 19:44:23.046697 kubelet[1452]: E0212 19:44:23.046007 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:23.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.070000 audit: BPF prog-id=106 op=LOAD Feb 12 19:44:23.072000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.072000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2808 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:23.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393530653235356265306238366430646637636663363436373765 Feb 12 19:44:23.072000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.072000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2808 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:23.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393530653235356265306238366430646637636663363436373765 Feb 12 19:44:23.073000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.073000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.073000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.073000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.073000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.073000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.073000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.073000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.073000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.073000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.073000 audit: BPF prog-id=107 op=LOAD Feb 12 19:44:23.073000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030a510 items=0 ppid=2808 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:23.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393530653235356265306238366430646637636663363436373765 Feb 12 19:44:23.074000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.074000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.074000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.074000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.074000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.074000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.074000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.074000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.074000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.074000 audit: BPF prog-id=108 op=LOAD Feb 12 19:44:23.074000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030a558 items=0 ppid=2808 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:23.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393530653235356265306238366430646637636663363436373765 Feb 12 19:44:23.075000 audit: BPF prog-id=108 op=UNLOAD Feb 12 19:44:23.075000 audit: BPF prog-id=107 op=UNLOAD Feb 12 19:44:23.075000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.075000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.075000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.075000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.075000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.075000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.075000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.075000 audit[2818]: AVC avc: denied { perfmon } for pid=2818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.075000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.075000 audit[2818]: AVC avc: denied { bpf } for pid=2818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:23.075000 audit: BPF prog-id=109 op=LOAD Feb 12 19:44:23.075000 audit[2818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030a968 items=0 ppid=2808 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:23.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161393530653235356265306238366430646637636663363436373765 Feb 12 19:44:23.148419 env[1126]: time="2024-02-12T19:44:23.148342395Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:7af98359-25a6-443d-a4c9-bc762c0b7ecc,Namespace:default,Attempt:0,} returns sandbox id \"aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d\"" Feb 12 19:44:23.151541 env[1126]: time="2024-02-12T19:44:23.151492803Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 19:44:23.475295 systemd[1]: run-containerd-runc-k8s.io-aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d-runc.0NpevY.mount: Deactivated successfully. Feb 12 19:44:24.047158 kubelet[1452]: E0212 19:44:24.047095 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:24.214669 systemd-networkd[1023]: cali60e51b789ff: Gained IPv6LL Feb 12 19:44:25.047593 kubelet[1452]: E0212 19:44:25.047462 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:26.048618 kubelet[1452]: E0212 19:44:26.048555 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:26.951272 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2644576547.mount: Deactivated successfully. Feb 12 19:44:27.049246 kubelet[1452]: E0212 19:44:27.049134 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:28.049759 kubelet[1452]: E0212 19:44:28.049670 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:29.049976 kubelet[1452]: E0212 19:44:29.049868 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:30.050769 kubelet[1452]: E0212 19:44:30.050607 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:30.523569 env[1126]: time="2024-02-12T19:44:30.523484768Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:30.532569 env[1126]: time="2024-02-12T19:44:30.532004409Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:30.536470 env[1126]: time="2024-02-12T19:44:30.536412975Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:30.538942 env[1126]: time="2024-02-12T19:44:30.538895316Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:30.540302 env[1126]: time="2024-02-12T19:44:30.540220751Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 12 19:44:30.545107 env[1126]: time="2024-02-12T19:44:30.545030888Z" level=info msg="CreateContainer within sandbox \"aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 19:44:30.563806 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3654288740.mount: Deactivated successfully. Feb 12 19:44:30.573540 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2823801939.mount: Deactivated successfully. Feb 12 19:44:30.587901 env[1126]: time="2024-02-12T19:44:30.587829294Z" level=info msg="CreateContainer within sandbox \"aa950e255be0b86d0df7cfc64677eb3cceb84e0bb32f86550ba768a754631d6d\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"df879dc2f75d26dd93e1634ae91b2a0f5b3062540a1375454f670b2f78ca3a30\"" Feb 12 19:44:30.589614 env[1126]: time="2024-02-12T19:44:30.589508631Z" level=info msg="StartContainer for \"df879dc2f75d26dd93e1634ae91b2a0f5b3062540a1375454f670b2f78ca3a30\"" Feb 12 19:44:30.626994 systemd[1]: Started cri-containerd-df879dc2f75d26dd93e1634ae91b2a0f5b3062540a1375454f670b2f78ca3a30.scope. Feb 12 19:44:30.665930 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 12 19:44:30.666109 kernel: audit: type=1400 audit(1707767070.654:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.666142 kernel: audit: type=1400 audit(1707767070.654:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.666164 kernel: audit: type=1400 audit(1707767070.654:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.672698 kernel: audit: type=1400 audit(1707767070.654:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.672873 kernel: audit: type=1400 audit(1707767070.654:803): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.675918 kernel: audit: type=1400 audit(1707767070.654:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.681996 kernel: audit: type=1400 audit(1707767070.654:805): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.682180 kernel: audit: type=1400 audit(1707767070.654:806): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.688612 kernel: audit: type=1400 audit(1707767070.654:807): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.688799 kernel: audit: type=1400 audit(1707767070.655:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.655000 audit: BPF prog-id=110 op=LOAD Feb 12 19:44:30.665000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.665000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2808 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:30.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383739646332663735643236646439336531363334616539316232 Feb 12 19:44:30.665000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.665000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2808 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:30.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383739646332663735643236646439336531363334616539316232 Feb 12 19:44:30.665000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.665000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.665000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.665000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.665000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.665000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.665000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.665000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.665000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.665000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.665000 audit: BPF prog-id=111 op=LOAD Feb 12 19:44:30.665000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d2a90 items=0 ppid=2808 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:30.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383739646332663735643236646439336531363334616539316232 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit: BPF prog-id=112 op=LOAD Feb 12 19:44:30.668000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d2ad8 items=0 ppid=2808 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:30.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383739646332663735643236646439336531363334616539316232 Feb 12 19:44:30.668000 audit: BPF prog-id=112 op=UNLOAD Feb 12 19:44:30.668000 audit: BPF prog-id=111 op=UNLOAD Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:30.668000 audit: BPF prog-id=113 op=LOAD Feb 12 19:44:30.668000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d2ee8 items=0 ppid=2808 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:30.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466383739646332663735643236646439336531363334616539316232 Feb 12 19:44:30.723594 env[1126]: time="2024-02-12T19:44:30.723536909Z" level=info msg="StartContainer for \"df879dc2f75d26dd93e1634ae91b2a0f5b3062540a1375454f670b2f78ca3a30\" returns successfully" Feb 12 19:44:30.790000 audit[2889]: AVC avc: denied { search } for pid=2889 comm="rpcbind" name="crypto" dev="proc" ino=23823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c984 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:44:30.790000 audit[2889]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f75ab58c0c0 a2=0 a3=0 items=0 ppid=2871 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c984 key=(null) Feb 12 19:44:30.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 19:44:30.848000 audit[2894]: AVC avc: denied { search } for pid=2894 comm="dbus-daemon" name="crypto" dev="proc" ino=23823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c984 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:44:30.848000 audit[2894]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff76f5e70c0 a2=0 a3=0 items=0 ppid=2871 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c984 key=(null) Feb 12 19:44:30.848000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:44:30.853000 audit[2895]: AVC avc: denied { watch } for pid=2895 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538086 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c984 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c272,c984 tclass=dir permissive=0 Feb 12 19:44:30.853000 audit[2895]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=561155f95d30 a2=2c8 a3=7ffcf0613f9c items=0 ppid=2871 pid=2895 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c984 key=(null) Feb 12 19:44:30.853000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:44:30.860000 audit[2896]: AVC avc: denied { read } for pid=2896 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22929 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c984 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 19:44:30.860000 audit[2896]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fb21e908320 a1=80000 a2=d a3=7ffcdb1049e0 items=0 ppid=2871 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c984 key=(null) Feb 12 19:44:30.860000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:44:30.863000 audit[2896]: AVC avc: denied { search } for pid=2896 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c272,c984 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:44:30.863000 audit[2896]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb21de5c0c0 a2=0 a3=0 items=0 ppid=2871 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c272,c984 key=(null) Feb 12 19:44:30.863000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:44:30.948544 kubelet[1452]: E0212 19:44:30.948474 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:30.989188 env[1126]: time="2024-02-12T19:44:30.989134714Z" level=info msg="StopPodSandbox for \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\"" Feb 12 19:44:31.053882 kubelet[1452]: E0212 19:44:31.052864 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:31.141808 env[1126]: 2024-02-12 19:44:31.067 [WARNING][2928] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 43, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"147.182.245.110", ContainerID:"15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a", Pod:"nginx-deployment-6d5f899847-5s97f", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.49.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3f0af9a5e52", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:44:31.141808 env[1126]: 2024-02-12 19:44:31.068 [INFO][2928] k8s.go 578: Cleaning up netns ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:44:31.141808 env[1126]: 2024-02-12 19:44:31.068 [INFO][2928] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" iface="eth0" netns="" Feb 12 19:44:31.141808 env[1126]: 2024-02-12 19:44:31.068 [INFO][2928] k8s.go 585: Releasing IP address(es) ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:44:31.141808 env[1126]: 2024-02-12 19:44:31.068 [INFO][2928] utils.go 188: Calico CNI releasing IP address ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:44:31.141808 env[1126]: 2024-02-12 19:44:31.114 [INFO][2934] ipam_plugin.go 415: Releasing address using handleID ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" HandleID="k8s-pod-network.8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Workload="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:31.141808 env[1126]: 2024-02-12 19:44:31.115 [INFO][2934] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:44:31.141808 env[1126]: 2024-02-12 19:44:31.115 [INFO][2934] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:44:31.141808 env[1126]: 2024-02-12 19:44:31.132 [WARNING][2934] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" HandleID="k8s-pod-network.8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Workload="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:31.141808 env[1126]: 2024-02-12 19:44:31.132 [INFO][2934] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" HandleID="k8s-pod-network.8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Workload="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:31.141808 env[1126]: 2024-02-12 19:44:31.136 [INFO][2934] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:44:31.141808 env[1126]: 2024-02-12 19:44:31.139 [INFO][2928] k8s.go 591: Teardown processing complete. ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:44:31.143622 env[1126]: time="2024-02-12T19:44:31.141857001Z" level=info msg="TearDown network for sandbox \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\" successfully" Feb 12 19:44:31.143622 env[1126]: time="2024-02-12T19:44:31.141904840Z" level=info msg="StopPodSandbox for \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\" returns successfully" Feb 12 19:44:31.145327 env[1126]: time="2024-02-12T19:44:31.144806713Z" level=info msg="RemovePodSandbox for \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\"" Feb 12 19:44:31.145327 env[1126]: time="2024-02-12T19:44:31.144881449Z" level=info msg="Forcibly stopping sandbox \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\"" Feb 12 19:44:31.301263 env[1126]: 2024-02-12 19:44:31.216 [WARNING][2953] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"cecef1c2-2d4d-494a-b4b4-a8fa5b9b579c", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 43, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"147.182.245.110", ContainerID:"15fd1b828708f063c6ce0acc16c30fc9767822dd78fd82379918a182f715b44a", Pod:"nginx-deployment-6d5f899847-5s97f", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.49.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3f0af9a5e52", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:44:31.301263 env[1126]: 2024-02-12 19:44:31.217 [INFO][2953] k8s.go 578: Cleaning up netns ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:44:31.301263 env[1126]: 2024-02-12 19:44:31.217 [INFO][2953] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" iface="eth0" netns="" Feb 12 19:44:31.301263 env[1126]: 2024-02-12 19:44:31.217 [INFO][2953] k8s.go 585: Releasing IP address(es) ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:44:31.301263 env[1126]: 2024-02-12 19:44:31.217 [INFO][2953] utils.go 188: Calico CNI releasing IP address ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:44:31.301263 env[1126]: 2024-02-12 19:44:31.272 [INFO][2959] ipam_plugin.go 415: Releasing address using handleID ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" HandleID="k8s-pod-network.8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Workload="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:31.301263 env[1126]: 2024-02-12 19:44:31.272 [INFO][2959] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:44:31.301263 env[1126]: 2024-02-12 19:44:31.272 [INFO][2959] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:44:31.301263 env[1126]: 2024-02-12 19:44:31.292 [WARNING][2959] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" HandleID="k8s-pod-network.8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Workload="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:31.301263 env[1126]: 2024-02-12 19:44:31.292 [INFO][2959] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" HandleID="k8s-pod-network.8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Workload="147.182.245.110-k8s-nginx--deployment--6d5f899847--5s97f-eth0" Feb 12 19:44:31.301263 env[1126]: 2024-02-12 19:44:31.297 [INFO][2959] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:44:31.301263 env[1126]: 2024-02-12 19:44:31.298 [INFO][2953] k8s.go 591: Teardown processing complete. ContainerID="8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec" Feb 12 19:44:31.302585 env[1126]: time="2024-02-12T19:44:31.302520330Z" level=info msg="TearDown network for sandbox \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\" successfully" Feb 12 19:44:31.313260 env[1126]: time="2024-02-12T19:44:31.311472284Z" level=info msg="RemovePodSandbox \"8151526ec3ef32af431b6f5965ea5d3eef56f74d3d5e122bc2b41658931b7bec\" returns successfully" Feb 12 19:44:31.314496 env[1126]: time="2024-02-12T19:44:31.314397326Z" level=info msg="StopPodSandbox for \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\"" Feb 12 19:44:31.460927 env[1126]: 2024-02-12 19:44:31.397 [WARNING][2982] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110-k8s-csi--node--driver--2h4rf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"91c2c594-31ce-4082-9992-a9001ced4b19", ResourceVersion:"1152", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 43, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"147.182.245.110", ContainerID:"f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c", Pod:"csi-node-driver-2h4rf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.49.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali25a97c6328a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:44:31.460927 env[1126]: 2024-02-12 19:44:31.397 [INFO][2982] k8s.go 578: Cleaning up netns ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:44:31.460927 env[1126]: 2024-02-12 19:44:31.397 [INFO][2982] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" iface="eth0" netns="" Feb 12 19:44:31.460927 env[1126]: 2024-02-12 19:44:31.397 [INFO][2982] k8s.go 585: Releasing IP address(es) ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:44:31.460927 env[1126]: 2024-02-12 19:44:31.397 [INFO][2982] utils.go 188: Calico CNI releasing IP address ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:44:31.460927 env[1126]: 2024-02-12 19:44:31.436 [INFO][2989] ipam_plugin.go 415: Releasing address using handleID ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" HandleID="k8s-pod-network.17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Workload="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:31.460927 env[1126]: 2024-02-12 19:44:31.436 [INFO][2989] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:44:31.460927 env[1126]: 2024-02-12 19:44:31.436 [INFO][2989] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:44:31.460927 env[1126]: 2024-02-12 19:44:31.451 [WARNING][2989] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" HandleID="k8s-pod-network.17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Workload="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:31.460927 env[1126]: 2024-02-12 19:44:31.451 [INFO][2989] ipam_plugin.go 443: Releasing address using workloadID ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" HandleID="k8s-pod-network.17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Workload="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:31.460927 env[1126]: 2024-02-12 19:44:31.456 [INFO][2989] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:44:31.460927 env[1126]: 2024-02-12 19:44:31.458 [INFO][2982] k8s.go 591: Teardown processing complete. ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:44:31.461890 env[1126]: time="2024-02-12T19:44:31.460985060Z" level=info msg="TearDown network for sandbox \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\" successfully" Feb 12 19:44:31.461890 env[1126]: time="2024-02-12T19:44:31.461066865Z" level=info msg="StopPodSandbox for \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\" returns successfully" Feb 12 19:44:31.462433 env[1126]: time="2024-02-12T19:44:31.462385990Z" level=info msg="RemovePodSandbox for \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\"" Feb 12 19:44:31.462673 env[1126]: time="2024-02-12T19:44:31.462597394Z" level=info msg="Forcibly stopping sandbox \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\"" Feb 12 19:44:31.591023 env[1126]: 2024-02-12 19:44:31.533 [WARNING][3008] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110-k8s-csi--node--driver--2h4rf-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"91c2c594-31ce-4082-9992-a9001ced4b19", ResourceVersion:"1152", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 43, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"147.182.245.110", ContainerID:"f86c2009474d4bd85941bceb148291e1b356b5215ddf5666aa029938fe8b702c", Pod:"csi-node-driver-2h4rf", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.49.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali25a97c6328a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:44:31.591023 env[1126]: 2024-02-12 19:44:31.533 [INFO][3008] k8s.go 578: Cleaning up netns ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:44:31.591023 env[1126]: 2024-02-12 19:44:31.533 [INFO][3008] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" iface="eth0" netns="" Feb 12 19:44:31.591023 env[1126]: 2024-02-12 19:44:31.533 [INFO][3008] k8s.go 585: Releasing IP address(es) ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:44:31.591023 env[1126]: 2024-02-12 19:44:31.534 [INFO][3008] utils.go 188: Calico CNI releasing IP address ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:44:31.591023 env[1126]: 2024-02-12 19:44:31.567 [INFO][3014] ipam_plugin.go 415: Releasing address using handleID ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" HandleID="k8s-pod-network.17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Workload="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:31.591023 env[1126]: 2024-02-12 19:44:31.567 [INFO][3014] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:44:31.591023 env[1126]: 2024-02-12 19:44:31.567 [INFO][3014] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:44:31.591023 env[1126]: 2024-02-12 19:44:31.582 [WARNING][3014] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" HandleID="k8s-pod-network.17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Workload="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:31.591023 env[1126]: 2024-02-12 19:44:31.582 [INFO][3014] ipam_plugin.go 443: Releasing address using workloadID ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" HandleID="k8s-pod-network.17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Workload="147.182.245.110-k8s-csi--node--driver--2h4rf-eth0" Feb 12 19:44:31.591023 env[1126]: 2024-02-12 19:44:31.586 [INFO][3014] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:44:31.591023 env[1126]: 2024-02-12 19:44:31.588 [INFO][3008] k8s.go 591: Teardown processing complete. ContainerID="17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47" Feb 12 19:44:31.592366 env[1126]: time="2024-02-12T19:44:31.591309322Z" level=info msg="TearDown network for sandbox \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\" successfully" Feb 12 19:44:31.595890 env[1126]: time="2024-02-12T19:44:31.595812223Z" level=info msg="RemovePodSandbox \"17382c2cb8b637ac3780f47f5ce7862d97e198110e03d5d5c0238e8a9d3a8b47\" returns successfully" Feb 12 19:44:31.647390 kubelet[1452]: I0212 19:44:31.647338 1452 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.257532825 podCreationTimestamp="2024-02-12 19:44:22 +0000 UTC" firstStartedPulling="2024-02-12 19:44:23.150947614 +0000 UTC m=+53.942554417" lastFinishedPulling="2024-02-12 19:44:30.540700542 +0000 UTC m=+61.332307341" observedRunningTime="2024-02-12 19:44:31.641152892 +0000 UTC m=+62.432759702" watchObservedRunningTime="2024-02-12 19:44:31.647285749 +0000 UTC m=+62.438892559" Feb 12 19:44:31.657089 systemd[1]: run-containerd-runc-k8s.io-2856a6e08b59c159ae2b3789a0201709063049120c9909faf06a160cdbfde70c-runc.VCrar4.mount: Deactivated successfully. Feb 12 19:44:31.675000 audit[3031]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:44:31.675000 audit[3031]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe575ca130 a2=0 a3=7ffe575ca11c items=0 ppid=1603 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:31.675000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:44:31.681000 audit[3031]: NETFILTER_CFG table=nat:80 family=2 entries=106 op=nft_register_chain pid=3031 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:44:31.681000 audit[3031]: SYSCALL arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffe575ca130 a2=0 a3=7ffe575ca11c items=0 ppid=1603 pid=3031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:31.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:44:31.761659 kubelet[1452]: E0212 19:44:31.761625 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:44:32.053702 kubelet[1452]: E0212 19:44:32.053627 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:33.054430 kubelet[1452]: E0212 19:44:33.054372 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:34.055427 kubelet[1452]: E0212 19:44:34.055295 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:35.056433 kubelet[1452]: E0212 19:44:35.056365 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:36.057656 kubelet[1452]: E0212 19:44:36.057534 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:37.058430 kubelet[1452]: E0212 19:44:37.058368 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:38.059527 kubelet[1452]: E0212 19:44:38.059463 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:39.078584 kubelet[1452]: E0212 19:44:39.060807 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:40.080851 kubelet[1452]: E0212 19:44:40.079541 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:40.327765 kubelet[1452]: I0212 19:44:40.327675 1452 topology_manager.go:215] "Topology Admit Handler" podUID="6fc33bec-8ef2-4820-b20d-81d9f4794d2b" podNamespace="default" podName="test-pod-1" Feb 12 19:44:40.338927 systemd[1]: Created slice kubepods-besteffort-pod6fc33bec_8ef2_4820_b20d_81d9f4794d2b.slice. Feb 12 19:44:40.519839 kubelet[1452]: I0212 19:44:40.519766 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-1486ab1b-cde0-43d7-9360-4304d0989edc\" (UniqueName: \"kubernetes.io/nfs/6fc33bec-8ef2-4820-b20d-81d9f4794d2b-pvc-1486ab1b-cde0-43d7-9360-4304d0989edc\") pod \"test-pod-1\" (UID: \"6fc33bec-8ef2-4820-b20d-81d9f4794d2b\") " pod="default/test-pod-1" Feb 12 19:44:40.519839 kubelet[1452]: I0212 19:44:40.519836 1452 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sg7t4\" (UniqueName: \"kubernetes.io/projected/6fc33bec-8ef2-4820-b20d-81d9f4794d2b-kube-api-access-sg7t4\") pod \"test-pod-1\" (UID: \"6fc33bec-8ef2-4820-b20d-81d9f4794d2b\") " pod="default/test-pod-1" Feb 12 19:44:40.708590 kernel: Failed to create system directory netfs Feb 12 19:44:40.708823 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 12 19:44:40.708884 kernel: audit: type=1400 audit(1707767080.702:824): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.702000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.714530 kernel: Failed to create system directory netfs Feb 12 19:44:40.714694 kernel: audit: type=1400 audit(1707767080.702:824): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.702000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.718905 kernel: Failed to create system directory netfs Feb 12 19:44:40.719127 kernel: audit: type=1400 audit(1707767080.702:824): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.702000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.723504 kernel: Failed to create system directory netfs Feb 12 19:44:40.723664 kernel: audit: type=1400 audit(1707767080.702:824): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.702000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.754458 kernel: audit: type=1300 audit(1707767080.702:824): arch=c000003e syscall=175 success=yes exit=0 a0=55a8c82ac5e0 a1=153bc a2=55a8c68272b0 a3=5 items=0 ppid=58 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:40.754715 kernel: audit: type=1327 audit(1707767080.702:824): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:44:40.702000 audit[3054]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a8c82ac5e0 a1=153bc a2=55a8c68272b0 a3=5 items=0 ppid=58 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:40.702000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.775914 kernel: Failed to create system directory fscache Feb 12 19:44:40.776126 kernel: audit: type=1400 audit(1707767080.762:825): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.776260 kernel: Failed to create system directory fscache Feb 12 19:44:40.776308 kernel: audit: type=1400 audit(1707767080.762:825): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.779921 kernel: Failed to create system directory fscache Feb 12 19:44:40.780285 kernel: audit: type=1400 audit(1707767080.762:825): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.785060 kernel: Failed to create system directory fscache Feb 12 19:44:40.785252 kernel: audit: type=1400 audit(1707767080.762:825): avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.790069 kernel: Failed to create system directory fscache Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.793019 kernel: Failed to create system directory fscache Feb 12 19:44:40.793192 kernel: Failed to create system directory fscache Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.797713 kernel: Failed to create system directory fscache Feb 12 19:44:40.797914 kernel: Failed to create system directory fscache Feb 12 19:44:40.799133 kernel: Failed to create system directory fscache Feb 12 19:44:40.801279 kernel: Failed to create system directory fscache Feb 12 19:44:40.801419 kernel: Failed to create system directory fscache Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.803165 kernel: Failed to create system directory fscache Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.762000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.805280 kernel: Failed to create system directory fscache Feb 12 19:44:40.808526 kernel: FS-Cache: Loaded Feb 12 19:44:40.762000 audit[3054]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a8c84c19c0 a1=4c0fc a2=55a8c68272b0 a3=5 items=0 ppid=58 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:40.762000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.868759 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.869008 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.870645 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.872318 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.873769 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.875262 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.876840 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.877960 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.879156 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.881446 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.899613 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.899786 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.901129 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.915125 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.915352 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.917232 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.920306 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.920432 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.922262 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.923255 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.925758 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.925901 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.927082 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.929764 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.929904 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.931111 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.933748 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.933863 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.933894 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.935996 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.936443 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.937180 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.938576 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.939254 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.940987 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.941136 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.942038 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.942962 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.944583 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.946073 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.947659 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.947761 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.950010 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.950229 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.951960 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.952385 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.954219 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.954364 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.956645 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.956780 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.958102 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.958254 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.960300 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.966812 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.966953 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.966983 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.968981 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.969089 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.969968 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.971297 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.973413 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.973540 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.974450 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.975582 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.976934 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.978457 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.978559 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.980975 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.981097 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.981185 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.982341 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.983573 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.984745 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.986857 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.987007 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.987735 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.989776 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.989931 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.990693 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.991906 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.997759 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.998005 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.008720 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.008888 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.008962 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.009074 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.009117 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.009158 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.009186 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.009238 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.009277 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.011085 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.013195 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.013329 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.014277 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.016855 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.017032 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.018859 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.019248 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.021265 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.022008 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.022169 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.022880 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.023830 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.027405 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.027585 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.027626 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.036303 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.036509 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.036573 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.036688 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.036729 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.038930 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.039083 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.040009 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.041286 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.043165 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.043525 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.044428 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.046366 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.046562 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.049151 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.049347 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.057473 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.057662 kernel: Failed to create system directory sunrpc Feb 12 19:44:41.057744 kernel: Failed to create system directory sunrpc Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:40.842000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.075611 kernel: RPC: Registered named UNIX socket transport module. Feb 12 19:44:41.075816 kernel: RPC: Registered udp transport module. Feb 12 19:44:41.077405 kernel: RPC: Registered tcp transport module. Feb 12 19:44:41.077638 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 19:44:40.842000 audit[3054]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a8c850dad0 a1=1588c4 a2=55a8c68272b0 a3=5 items=6 ppid=58 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:40.842000 audit: CWD cwd="/" Feb 12 19:44:40.842000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:40.842000 audit: PATH item=1 name=(null) inode=24155 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:40.842000 audit: PATH item=2 name=(null) inode=24155 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:40.842000 audit: PATH item=3 name=(null) inode=24156 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:40.842000 audit: PATH item=4 name=(null) inode=24155 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:40.842000 audit: PATH item=5 name=(null) inode=24157 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:44:40.842000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:44:41.080378 kubelet[1452]: E0212 19:44:41.079765 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.133466 kernel: Failed to create system directory nfs Feb 12 19:44:41.133639 kernel: Failed to create system directory nfs Feb 12 19:44:41.139616 kernel: Failed to create system directory nfs Feb 12 19:44:41.140052 kernel: Failed to create system directory nfs Feb 12 19:44:41.143019 kernel: Failed to create system directory nfs Feb 12 19:44:41.143172 kernel: Failed to create system directory nfs Feb 12 19:44:41.143690 kernel: Failed to create system directory nfs Feb 12 19:44:41.143817 kernel: Failed to create system directory nfs Feb 12 19:44:41.145744 kernel: Failed to create system directory nfs Feb 12 19:44:41.145869 kernel: Failed to create system directory nfs Feb 12 19:44:41.146045 kernel: Failed to create system directory nfs Feb 12 19:44:41.146189 kernel: Failed to create system directory nfs Feb 12 19:44:41.146240 kernel: Failed to create system directory nfs Feb 12 19:44:41.146262 kernel: Failed to create system directory nfs Feb 12 19:44:41.146327 kernel: Failed to create system directory nfs Feb 12 19:44:41.146363 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.146767 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.148613 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.149974 kernel: Failed to create system directory nfs Feb 12 19:44:41.150068 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.150901 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.151937 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.160512 kernel: Failed to create system directory nfs Feb 12 19:44:41.160797 kernel: Failed to create system directory nfs Feb 12 19:44:41.160841 kernel: Failed to create system directory nfs Feb 12 19:44:41.160869 kernel: Failed to create system directory nfs Feb 12 19:44:41.160910 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.170464 kernel: Failed to create system directory nfs Feb 12 19:44:41.170624 kernel: Failed to create system directory nfs Feb 12 19:44:41.170654 kernel: Failed to create system directory nfs Feb 12 19:44:41.170681 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.180704 kernel: Failed to create system directory nfs Feb 12 19:44:41.180897 kernel: Failed to create system directory nfs Feb 12 19:44:41.181055 kernel: Failed to create system directory nfs Feb 12 19:44:41.181108 kernel: Failed to create system directory nfs Feb 12 19:44:41.181168 kernel: Failed to create system directory nfs Feb 12 19:44:41.181234 kernel: Failed to create system directory nfs Feb 12 19:44:41.181265 kernel: Failed to create system directory nfs Feb 12 19:44:41.181330 kernel: Failed to create system directory nfs Feb 12 19:44:41.181361 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.183357 kernel: Failed to create system directory nfs Feb 12 19:44:41.183531 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.184741 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.186557 kernel: Failed to create system directory nfs Feb 12 19:44:41.186643 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.188832 kernel: Failed to create system directory nfs Feb 12 19:44:41.189003 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.190106 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.191355 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.192494 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.193551 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.195221 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.195429 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.196577 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.198510 kernel: Failed to create system directory nfs Feb 12 19:44:41.198695 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.201114 kernel: Failed to create system directory nfs Feb 12 19:44:41.201272 kernel: Failed to create system directory nfs Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.114000 audit[3054]: AVC avc: denied { confidentiality } for pid=3054 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.202658 kernel: Failed to create system directory nfs Feb 12 19:44:41.224823 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 19:44:41.114000 audit[3054]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a8c86b0680 a1=e29dc a2=55a8c68272b0 a3=5 items=0 ppid=58 pid=3054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:41.114000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.315104 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.315285 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.315322 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.316374 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.329268 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.330637 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.330845 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.332812 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.332986 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.333980 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.342406 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.342644 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.342691 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.342738 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.342771 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.342807 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.342837 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.342864 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.344939 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.346707 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.346889 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.349631 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.349785 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.349829 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.350616 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.351419 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.352524 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.354706 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.354840 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.355732 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.372016 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.372573 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.372663 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.372698 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.372729 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.372765 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.372792 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.372818 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.372844 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.372887 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.372915 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.372939 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.372966 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.378268 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.378763 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.378887 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.378930 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.380023 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.380699 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.382038 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.382147 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.382842 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.383765 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.393992 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.394277 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.394359 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.394392 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.394416 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.396441 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.397258 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.399217 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.399349 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.420448 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.420641 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.420685 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.420715 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.420760 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.420790 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.420817 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.420910 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.420985 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.421013 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.422912 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.423069 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.424816 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.424948 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.428891 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.429138 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.429241 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.429304 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.430873 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.430986 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.431694 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.434306 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.434438 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.435521 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.435697 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.437525 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.437696 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.438290 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.439813 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.439918 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.441635 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.441809 kernel: Failed to create system directory nfs4 Feb 12 19:44:41.287000 audit[3059]: AVC avc: denied { confidentiality } for pid=3059 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.673843 kernel: NFS: Registering the id_resolver key type Feb 12 19:44:41.674014 kernel: Key type id_resolver registered Feb 12 19:44:41.674062 kernel: Key type id_legacy registered Feb 12 19:44:41.287000 audit[3059]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7efd43f6d010 a1=1d3cc4 a2=55fd45eda2b0 a3=5 items=0 ppid=58 pid=3059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:41.287000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.698432 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.698652 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.698719 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.700575 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.700742 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.702883 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.703014 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.704353 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.706436 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.707564 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.708867 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.710163 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.711431 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.711556 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.713563 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.713654 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.715596 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.715721 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.717371 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.717459 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.719260 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.719353 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.726695 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.726890 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.727070 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.690000 audit[3060]: AVC avc: denied { confidentiality } for pid=3060 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:44:41.728982 kernel: Failed to create system directory rpcgss Feb 12 19:44:41.690000 audit[3060]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f86bb0ff010 a1=4f524 a2=562cd81c12b0 a3=5 items=0 ppid=58 pid=3060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:41.690000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 19:44:42.081505 kubelet[1452]: E0212 19:44:42.080507 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:43.092047 kubelet[1452]: E0212 19:44:43.091443 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:44.095009 kubelet[1452]: E0212 19:44:44.094904 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:45.095914 kubelet[1452]: E0212 19:44:45.095859 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:46.097637 kubelet[1452]: E0212 19:44:46.097578 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:47.099684 kubelet[1452]: E0212 19:44:47.099583 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:47.964999 nfsidmap[3069]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-0-21133d5f73' Feb 12 19:44:48.100173 kubelet[1452]: E0212 19:44:48.100114 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:49.104654 kubelet[1452]: E0212 19:44:49.104588 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:50.105928 kubelet[1452]: E0212 19:44:50.105818 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:50.948563 kubelet[1452]: E0212 19:44:50.948461 1452 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:51.106733 kubelet[1452]: E0212 19:44:51.106665 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:52.107674 kubelet[1452]: E0212 19:44:52.107601 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:53.108548 kubelet[1452]: E0212 19:44:53.108485 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:54.106701 nfsidmap[3079]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-0-21133d5f73' Feb 12 19:44:54.109481 kubelet[1452]: E0212 19:44:54.109412 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:54.133000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2455 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:44:54.135898 kernel: kauditd_printk_skb: 332 callbacks suppressed Feb 12 19:44:54.136358 kernel: audit: type=1400 audit(1707767094.133:830): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2455 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:44:54.133000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2455 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:44:54.143969 kernel: audit: type=1400 audit(1707767094.133:831): avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2455 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:44:54.144417 kernel: audit: type=1400 audit(1707767094.137:832): avc: denied { watch_reads } for pid=1198 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2455 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:44:54.137000 audit[1198]: AVC avc: denied { watch_reads } for pid=1198 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2455 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:44:54.137000 audit[1198]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d2910e5780 a2=10 a3=512a24097193db6f items=0 ppid=1 pid=1198 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:54.150969 env[1126]: time="2024-02-12T19:44:54.149892095Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:6fc33bec-8ef2-4820-b20d-81d9f4794d2b,Namespace:default,Attempt:0,}" Feb 12 19:44:54.155367 kernel: audit: type=1300 audit(1707767094.137:832): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d2910e5780 a2=10 a3=512a24097193db6f items=0 ppid=1 pid=1198 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:54.155651 kernel: audit: type=1327 audit(1707767094.137:832): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:44:54.137000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:44:54.137000 audit[1198]: AVC avc: denied { watch_reads } for pid=1198 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2455 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:44:54.161441 kernel: audit: type=1400 audit(1707767094.137:833): avc: denied { watch_reads } for pid=1198 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2455 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:44:54.161756 kernel: audit: type=1300 audit(1707767094.137:833): arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d2910e5780 a2=10 a3=512a24097193db6f items=0 ppid=1 pid=1198 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:54.137000 audit[1198]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55d2910e5780 a2=10 a3=512a24097193db6f items=0 ppid=1 pid=1198 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:54.137000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:44:54.171246 kernel: audit: type=1327 audit(1707767094.137:833): proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:44:54.444435 systemd-networkd[1023]: cali5ec59c6bf6e: Link UP Feb 12 19:44:54.447927 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:44:54.450536 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 19:44:54.448558 systemd-networkd[1023]: cali5ec59c6bf6e: Gained carrier Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.274 [INFO][3086] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {147.182.245.110-k8s-test--pod--1-eth0 default 6fc33bec-8ef2-4820-b20d-81d9f4794d2b 1282 0 2024-02-12 19:44:23 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 147.182.245.110 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="147.182.245.110-k8s-test--pod--1-" Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.274 [INFO][3086] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="147.182.245.110-k8s-test--pod--1-eth0" Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.345 [INFO][3098] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" HandleID="k8s-pod-network.915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" Workload="147.182.245.110-k8s-test--pod--1-eth0" Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.367 [INFO][3098] ipam_plugin.go 268: Auto assigning IP ContainerID="915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" HandleID="k8s-pod-network.915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" Workload="147.182.245.110-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00024ed60), Attrs:map[string]string{"namespace":"default", "node":"147.182.245.110", "pod":"test-pod-1", "timestamp":"2024-02-12 19:44:54.345773577 +0000 UTC"}, Hostname:"147.182.245.110", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.368 [INFO][3098] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.368 [INFO][3098] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.368 [INFO][3098] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '147.182.245.110' Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.373 [INFO][3098] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" host="147.182.245.110" Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.383 [INFO][3098] ipam.go 372: Looking up existing affinities for host host="147.182.245.110" Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.395 [INFO][3098] ipam.go 489: Trying affinity for 192.168.49.192/26 host="147.182.245.110" Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.400 [INFO][3098] ipam.go 155: Attempting to load block cidr=192.168.49.192/26 host="147.182.245.110" Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.405 [INFO][3098] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.49.192/26 host="147.182.245.110" Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.405 [INFO][3098] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.49.192/26 handle="k8s-pod-network.915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" host="147.182.245.110" Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.416 [INFO][3098] ipam.go 1682: Creating new handle: k8s-pod-network.915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578 Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.424 [INFO][3098] ipam.go 1203: Writing block in order to claim IPs block=192.168.49.192/26 handle="k8s-pod-network.915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" host="147.182.245.110" Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.433 [INFO][3098] ipam.go 1216: Successfully claimed IPs: [192.168.49.196/26] block=192.168.49.192/26 handle="k8s-pod-network.915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" host="147.182.245.110" Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.434 [INFO][3098] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.49.196/26] handle="k8s-pod-network.915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" host="147.182.245.110" Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.434 [INFO][3098] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.434 [INFO][3098] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.49.196/26] IPv6=[] ContainerID="915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" HandleID="k8s-pod-network.915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" Workload="147.182.245.110-k8s-test--pod--1-eth0" Feb 12 19:44:54.487887 env[1126]: 2024-02-12 19:44:54.438 [INFO][3086] k8s.go 385: Populated endpoint ContainerID="915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="147.182.245.110-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"6fc33bec-8ef2-4820-b20d-81d9f4794d2b", ResourceVersion:"1282", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 44, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"147.182.245.110", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.49.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:44:54.489062 env[1126]: 2024-02-12 19:44:54.439 [INFO][3086] k8s.go 386: Calico CNI using IPs: [192.168.49.196/32] ContainerID="915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="147.182.245.110-k8s-test--pod--1-eth0" Feb 12 19:44:54.489062 env[1126]: 2024-02-12 19:44:54.439 [INFO][3086] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="147.182.245.110-k8s-test--pod--1-eth0" Feb 12 19:44:54.489062 env[1126]: 2024-02-12 19:44:54.456 [INFO][3086] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="147.182.245.110-k8s-test--pod--1-eth0" Feb 12 19:44:54.489062 env[1126]: 2024-02-12 19:44:54.457 [INFO][3086] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="147.182.245.110-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"147.182.245.110-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"6fc33bec-8ef2-4820-b20d-81d9f4794d2b", ResourceVersion:"1282", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 44, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"147.182.245.110", ContainerID:"915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.49.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"de:40:15:02:e6:65", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:44:54.489062 env[1126]: 2024-02-12 19:44:54.478 [INFO][3086] k8s.go 491: Wrote updated endpoint to datastore ContainerID="915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="147.182.245.110-k8s-test--pod--1-eth0" Feb 12 19:44:54.501000 audit[3113]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:44:54.501000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=19080 a0=3 a1=7fff8c4842d0 a2=0 a3=7fff8c4842bc items=0 ppid=2269 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:54.511857 kernel: audit: type=1325 audit(1707767094.501:834): table=filter:81 family=2 entries=38 op=nft_register_chain pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:44:54.512135 kernel: audit: type=1300 audit(1707767094.501:834): arch=c000003e syscall=46 success=yes exit=19080 a0=3 a1=7fff8c4842d0 a2=0 a3=7fff8c4842bc items=0 ppid=2269 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:54.501000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:44:54.522593 env[1126]: time="2024-02-12T19:44:54.521971869Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:44:54.522593 env[1126]: time="2024-02-12T19:44:54.522173777Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:44:54.522593 env[1126]: time="2024-02-12T19:44:54.522253741Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:44:54.523299 env[1126]: time="2024-02-12T19:44:54.523219436Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578 pid=3125 runtime=io.containerd.runc.v2 Feb 12 19:44:54.556541 systemd[1]: Started cri-containerd-915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578.scope. Feb 12 19:44:54.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.584000 audit: BPF prog-id=114 op=LOAD Feb 12 19:44:54.586000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.586000 audit[3137]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3125 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:54.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356162613563663434373335306363316161373263386336643330 Feb 12 19:44:54.587000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.587000 audit[3137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3125 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:54.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356162613563663434373335306363316161373263386336643330 Feb 12 19:44:54.587000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.587000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.587000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.587000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.587000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.587000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.587000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.587000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.587000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.587000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.587000 audit: BPF prog-id=115 op=LOAD Feb 12 19:44:54.587000 audit[3137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024510 items=0 ppid=3125 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:54.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356162613563663434373335306363316161373263386336643330 Feb 12 19:44:54.589000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.589000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.589000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.589000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.589000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.589000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.589000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.589000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.589000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.589000 audit: BPF prog-id=116 op=LOAD Feb 12 19:44:54.589000 audit[3137]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024558 items=0 ppid=3125 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:54.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356162613563663434373335306363316161373263386336643330 Feb 12 19:44:54.591000 audit: BPF prog-id=116 op=UNLOAD Feb 12 19:44:54.591000 audit: BPF prog-id=115 op=UNLOAD Feb 12 19:44:54.591000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.591000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.591000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.591000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.591000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.591000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.591000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.591000 audit[3137]: AVC avc: denied { perfmon } for pid=3137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.591000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.591000 audit[3137]: AVC avc: denied { bpf } for pid=3137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:54.591000 audit: BPF prog-id=117 op=LOAD Feb 12 19:44:54.591000 audit[3137]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024968 items=0 ppid=3125 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:54.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931356162613563663434373335306363316161373263386336643330 Feb 12 19:44:54.640376 env[1126]: time="2024-02-12T19:44:54.640303669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:6fc33bec-8ef2-4820-b20d-81d9f4794d2b,Namespace:default,Attempt:0,} returns sandbox id \"915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578\"" Feb 12 19:44:54.644603 env[1126]: time="2024-02-12T19:44:54.644075611Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:44:55.055297 env[1126]: time="2024-02-12T19:44:55.055216623Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:55.060752 env[1126]: time="2024-02-12T19:44:55.060668384Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:55.064488 env[1126]: time="2024-02-12T19:44:55.064045522Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:55.067876 env[1126]: time="2024-02-12T19:44:55.067811275Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:44:55.069970 env[1126]: time="2024-02-12T19:44:55.069874967Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 19:44:55.077894 env[1126]: time="2024-02-12T19:44:55.077819779Z" level=info msg="CreateContainer within sandbox \"915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 19:44:55.111749 kubelet[1452]: E0212 19:44:55.111681 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:55.130656 env[1126]: time="2024-02-12T19:44:55.130552260Z" level=info msg="CreateContainer within sandbox \"915aba5cf447350cc1aa72c8c6d3099a0793bcb1bc5c68411b28c5acdac6a578\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"9e590d3cc7c1cb46f222b2fcc5673f3a85a178f9d5852e85d621092d251c5273\"" Feb 12 19:44:55.132787 env[1126]: time="2024-02-12T19:44:55.132710669Z" level=info msg="StartContainer for \"9e590d3cc7c1cb46f222b2fcc5673f3a85a178f9d5852e85d621092d251c5273\"" Feb 12 19:44:55.187034 systemd[1]: Started cri-containerd-9e590d3cc7c1cb46f222b2fcc5673f3a85a178f9d5852e85d621092d251c5273.scope. Feb 12 19:44:55.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.222000 audit: BPF prog-id=118 op=LOAD Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3125 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:55.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353930643363633763316362343666323232623266636335363733 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3125 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:55.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353930643363633763316362343666323232623266636335363733 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit: BPF prog-id=119 op=LOAD Feb 12 19:44:55.224000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000290800 items=0 ppid=3125 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:55.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353930643363633763316362343666323232623266636335363733 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.224000 audit: BPF prog-id=120 op=LOAD Feb 12 19:44:55.224000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000290848 items=0 ppid=3125 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:55.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353930643363633763316362343666323232623266636335363733 Feb 12 19:44:55.225000 audit: BPF prog-id=120 op=UNLOAD Feb 12 19:44:55.225000 audit: BPF prog-id=119 op=UNLOAD Feb 12 19:44:55.225000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.225000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.225000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.225000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.225000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.225000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.225000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.225000 audit[3170]: AVC avc: denied { perfmon } for pid=3170 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.225000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.225000 audit[3170]: AVC avc: denied { bpf } for pid=3170 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:44:55.225000 audit: BPF prog-id=121 op=LOAD Feb 12 19:44:55.225000 audit[3170]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000290c58 items=0 ppid=3125 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:44:55.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965353930643363633763316362343666323232623266636335363733 Feb 12 19:44:55.270174 env[1126]: time="2024-02-12T19:44:55.270107088Z" level=info msg="StartContainer for \"9e590d3cc7c1cb46f222b2fcc5673f3a85a178f9d5852e85d621092d251c5273\" returns successfully" Feb 12 19:44:56.022560 systemd-networkd[1023]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 19:44:56.112695 kubelet[1452]: E0212 19:44:56.112621 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:57.113677 kubelet[1452]: E0212 19:44:57.113609 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:58.114551 kubelet[1452]: E0212 19:44:58.114494 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:44:58.217106 kubelet[1452]: E0212 19:44:58.217006 1452 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:44:59.116425 kubelet[1452]: E0212 19:44:59.116362 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:45:00.118230 kubelet[1452]: E0212 19:45:00.118156 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:45:01.119235 kubelet[1452]: E0212 19:45:01.119104 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:45:02.120358 kubelet[1452]: E0212 19:45:02.120306 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:45:03.122141 kubelet[1452]: E0212 19:45:03.122047 1452 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"