Feb 9 06:48:59.564962 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 9 06:48:59.564975 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 06:48:59.564982 kernel: BIOS-provided physical RAM map: Feb 9 06:48:59.564986 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 06:48:59.564990 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 06:48:59.564994 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 06:48:59.564998 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 06:48:59.565002 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 06:48:59.565006 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000820e1fff] usable Feb 9 06:48:59.565010 kernel: BIOS-e820: [mem 0x00000000820e2000-0x00000000820e2fff] ACPI NVS Feb 9 06:48:59.565014 kernel: BIOS-e820: [mem 0x00000000820e3000-0x00000000820e3fff] reserved Feb 9 06:48:59.565018 kernel: BIOS-e820: [mem 0x00000000820e4000-0x000000008afccfff] usable Feb 9 06:48:59.565022 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 9 06:48:59.565026 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 9 06:48:59.565031 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 9 06:48:59.565036 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 9 06:48:59.565041 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 9 06:48:59.565045 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 9 06:48:59.565049 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 06:48:59.565053 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 06:48:59.565058 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 06:48:59.565062 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 06:48:59.565066 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 06:48:59.565070 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 9 06:48:59.565074 kernel: NX (Execute Disable) protection: active Feb 9 06:48:59.565079 kernel: SMBIOS 3.2.1 present. Feb 9 06:48:59.565084 kernel: DMI: Supermicro X11SCM-F/X11SCM-F, BIOS 1.9 09/16/2022 Feb 9 06:48:59.565088 kernel: tsc: Detected 3400.000 MHz processor Feb 9 06:48:59.565092 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 06:48:59.565097 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 06:48:59.565101 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 06:48:59.565106 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 9 06:48:59.565110 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 06:48:59.565115 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 9 06:48:59.565119 kernel: Using GB pages for direct mapping Feb 9 06:48:59.565124 kernel: ACPI: Early table checksum verification disabled Feb 9 06:48:59.565129 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 06:48:59.565133 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 06:48:59.565137 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 9 06:48:59.565142 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 06:48:59.565148 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 9 06:48:59.565153 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 9 06:48:59.565158 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 9 06:48:59.565163 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 06:48:59.565168 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 06:48:59.565173 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 06:48:59.565178 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 06:48:59.565182 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 06:48:59.565187 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 06:48:59.565192 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:48:59.565197 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 06:48:59.565202 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 06:48:59.565207 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:48:59.565212 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:48:59.565216 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 06:48:59.565221 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 06:48:59.565226 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:48:59.565230 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 06:48:59.565236 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 06:48:59.565241 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 9 06:48:59.565246 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 06:48:59.565250 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 06:48:59.565255 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 06:48:59.565260 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 9 06:48:59.565264 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 06:48:59.565269 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 06:48:59.565274 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 06:48:59.565279 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 06:48:59.565284 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 06:48:59.565289 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 9 06:48:59.565294 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 9 06:48:59.565298 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 9 06:48:59.565303 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 9 06:48:59.565308 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 9 06:48:59.565312 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 9 06:48:59.565318 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 9 06:48:59.565323 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 9 06:48:59.565327 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 9 06:48:59.565332 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 9 06:48:59.565337 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 9 06:48:59.565341 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 9 06:48:59.565346 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 9 06:48:59.565351 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 9 06:48:59.565355 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 9 06:48:59.565361 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 9 06:48:59.565366 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 9 06:48:59.565370 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 9 06:48:59.565375 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 9 06:48:59.565380 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 9 06:48:59.565385 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 9 06:48:59.565389 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 9 06:48:59.565394 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 9 06:48:59.565399 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 9 06:48:59.565404 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 9 06:48:59.565409 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 9 06:48:59.565413 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 9 06:48:59.565418 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 9 06:48:59.565423 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 9 06:48:59.565428 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 9 06:48:59.565432 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 9 06:48:59.565437 kernel: No NUMA configuration found Feb 9 06:48:59.565442 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 9 06:48:59.565447 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Feb 9 06:48:59.565452 kernel: Zone ranges: Feb 9 06:48:59.565457 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 06:48:59.565462 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 06:48:59.565467 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 9 06:48:59.565471 kernel: Movable zone start for each node Feb 9 06:48:59.565476 kernel: Early memory node ranges Feb 9 06:48:59.565481 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 06:48:59.565488 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 06:48:59.565493 kernel: node 0: [mem 0x0000000040400000-0x00000000820e1fff] Feb 9 06:48:59.565499 kernel: node 0: [mem 0x00000000820e4000-0x000000008afccfff] Feb 9 06:48:59.565504 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 9 06:48:59.565508 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 9 06:48:59.565513 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 9 06:48:59.565518 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 9 06:48:59.565523 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 06:48:59.565531 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 06:48:59.565536 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 06:48:59.565541 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 06:48:59.565547 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 9 06:48:59.565552 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 9 06:48:59.565558 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 9 06:48:59.565563 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 9 06:48:59.565568 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 06:48:59.565573 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 06:48:59.565578 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 06:48:59.565583 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 06:48:59.565589 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 06:48:59.565594 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 06:48:59.565599 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 06:48:59.565604 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 06:48:59.565609 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 06:48:59.565614 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 06:48:59.565619 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 06:48:59.565624 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 06:48:59.565629 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 06:48:59.565635 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 06:48:59.565640 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 06:48:59.565645 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 06:48:59.565650 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 06:48:59.565656 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 06:48:59.565661 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 06:48:59.565666 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 06:48:59.565671 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 06:48:59.565676 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 06:48:59.565682 kernel: TSC deadline timer available Feb 9 06:48:59.565687 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 06:48:59.565692 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 9 06:48:59.565697 kernel: Booting paravirtualized kernel on bare hardware Feb 9 06:48:59.565702 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 06:48:59.565707 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 06:48:59.565713 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 06:48:59.565718 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 06:48:59.565723 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 06:48:59.565728 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 9 06:48:59.565734 kernel: Policy zone: Normal Feb 9 06:48:59.565739 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 06:48:59.565745 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 06:48:59.565750 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 06:48:59.565755 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 06:48:59.565760 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 06:48:59.565765 kernel: Memory: 32724720K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 9 06:48:59.565771 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 06:48:59.565776 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 06:48:59.565781 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 06:48:59.565786 kernel: rcu: Hierarchical RCU implementation. Feb 9 06:48:59.565792 kernel: rcu: RCU event tracing is enabled. Feb 9 06:48:59.565797 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 06:48:59.565802 kernel: Rude variant of Tasks RCU enabled. Feb 9 06:48:59.565808 kernel: Tracing variant of Tasks RCU enabled. Feb 9 06:48:59.565813 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 06:48:59.565819 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 06:48:59.565824 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 06:48:59.565829 kernel: random: crng init done Feb 9 06:48:59.565834 kernel: Console: colour dummy device 80x25 Feb 9 06:48:59.565839 kernel: printk: console [tty0] enabled Feb 9 06:48:59.565844 kernel: printk: console [ttyS1] enabled Feb 9 06:48:59.565849 kernel: ACPI: Core revision 20210730 Feb 9 06:48:59.565854 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 9 06:48:59.565859 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 06:48:59.565865 kernel: DMAR: Host address width 39 Feb 9 06:48:59.565870 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 06:48:59.565875 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 06:48:59.565880 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 9 06:48:59.565886 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 9 06:48:59.565891 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 06:48:59.565896 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 06:48:59.565901 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 06:48:59.565906 kernel: x2apic enabled Feb 9 06:48:59.565912 kernel: Switched APIC routing to cluster x2apic. Feb 9 06:48:59.565917 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 06:48:59.565922 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 06:48:59.565927 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 06:48:59.565932 kernel: process: using mwait in idle threads Feb 9 06:48:59.565938 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 06:48:59.565942 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 06:48:59.565947 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 06:48:59.565952 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 06:48:59.565958 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 06:48:59.565964 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 06:48:59.565969 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 06:48:59.565974 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 06:48:59.565979 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 06:48:59.565984 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 06:48:59.565988 kernel: TAA: Mitigation: TSX disabled Feb 9 06:48:59.565993 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 06:48:59.565999 kernel: SRBDS: Mitigation: Microcode Feb 9 06:48:59.566004 kernel: GDS: Vulnerable: No microcode Feb 9 06:48:59.566009 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 06:48:59.566014 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 06:48:59.566019 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 06:48:59.566025 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 06:48:59.566030 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 06:48:59.566035 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 06:48:59.566040 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 06:48:59.566045 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 06:48:59.566050 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 06:48:59.566055 kernel: Freeing SMP alternatives memory: 32K Feb 9 06:48:59.566060 kernel: pid_max: default: 32768 minimum: 301 Feb 9 06:48:59.566065 kernel: LSM: Security Framework initializing Feb 9 06:48:59.566070 kernel: SELinux: Initializing. Feb 9 06:48:59.566075 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 06:48:59.566081 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 06:48:59.566086 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 06:48:59.566091 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 06:48:59.566096 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 06:48:59.566101 kernel: ... version: 4 Feb 9 06:48:59.566106 kernel: ... bit width: 48 Feb 9 06:48:59.566111 kernel: ... generic registers: 4 Feb 9 06:48:59.566116 kernel: ... value mask: 0000ffffffffffff Feb 9 06:48:59.566121 kernel: ... max period: 00007fffffffffff Feb 9 06:48:59.566127 kernel: ... fixed-purpose events: 3 Feb 9 06:48:59.566132 kernel: ... event mask: 000000070000000f Feb 9 06:48:59.566137 kernel: signal: max sigframe size: 2032 Feb 9 06:48:59.566142 kernel: rcu: Hierarchical SRCU implementation. Feb 9 06:48:59.566147 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 06:48:59.566152 kernel: smp: Bringing up secondary CPUs ... Feb 9 06:48:59.566158 kernel: x86: Booting SMP configuration: Feb 9 06:48:59.566163 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 06:48:59.566168 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 06:48:59.566174 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 06:48:59.566179 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 06:48:59.566184 kernel: smpboot: Max logical packages: 1 Feb 9 06:48:59.566189 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 06:48:59.566194 kernel: devtmpfs: initialized Feb 9 06:48:59.566199 kernel: x86/mm: Memory block size: 128MB Feb 9 06:48:59.566204 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x820e2000-0x820e2fff] (4096 bytes) Feb 9 06:48:59.566209 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 9 06:48:59.566215 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 06:48:59.566220 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 06:48:59.566226 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 06:48:59.566231 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 06:48:59.566236 kernel: audit: initializing netlink subsys (disabled) Feb 9 06:48:59.566241 kernel: audit: type=2000 audit(1707461334.040:1): state=initialized audit_enabled=0 res=1 Feb 9 06:48:59.566246 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 06:48:59.566251 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 06:48:59.566256 kernel: cpuidle: using governor menu Feb 9 06:48:59.566262 kernel: ACPI: bus type PCI registered Feb 9 06:48:59.566267 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 06:48:59.566272 kernel: dca service started, version 1.12.1 Feb 9 06:48:59.566277 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 06:48:59.566282 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 06:48:59.566288 kernel: PCI: Using configuration type 1 for base access Feb 9 06:48:59.566293 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 06:48:59.566298 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 06:48:59.566303 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 06:48:59.566309 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 06:48:59.566314 kernel: ACPI: Added _OSI(Module Device) Feb 9 06:48:59.566319 kernel: ACPI: Added _OSI(Processor Device) Feb 9 06:48:59.566324 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 06:48:59.566329 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 06:48:59.566334 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 06:48:59.566339 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 06:48:59.566344 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 06:48:59.566349 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 06:48:59.566355 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:48:59.566360 kernel: ACPI: SSDT 0xFFFF98A400212500 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 06:48:59.566366 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 06:48:59.566371 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:48:59.566376 kernel: ACPI: SSDT 0xFFFF98A401AE2C00 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 06:48:59.566381 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:48:59.566386 kernel: ACPI: SSDT 0xFFFF98A401A5A000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 06:48:59.566391 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:48:59.566396 kernel: ACPI: SSDT 0xFFFF98A401A58800 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 06:48:59.566401 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:48:59.566406 kernel: ACPI: SSDT 0xFFFF98A40014D000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 06:48:59.566412 kernel: ACPI: Dynamic OEM Table Load: Feb 9 06:48:59.566417 kernel: ACPI: SSDT 0xFFFF98A401AE5800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 06:48:59.566422 kernel: ACPI: Interpreter enabled Feb 9 06:48:59.566427 kernel: ACPI: PM: (supports S0 S5) Feb 9 06:48:59.566432 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 06:48:59.566437 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 06:48:59.566442 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 06:48:59.566447 kernel: HEST: Table parsing has been initialized. Feb 9 06:48:59.566453 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 06:48:59.566458 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 06:48:59.566463 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 06:48:59.566468 kernel: ACPI: PM: Power Resource [USBC] Feb 9 06:48:59.566473 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 06:48:59.566478 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 06:48:59.566483 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 06:48:59.566491 kernel: ACPI: PM: Power Resource [WRST] Feb 9 06:48:59.566496 kernel: ACPI: PM: Power Resource [FN00] Feb 9 06:48:59.566502 kernel: ACPI: PM: Power Resource [FN01] Feb 9 06:48:59.566507 kernel: ACPI: PM: Power Resource [FN02] Feb 9 06:48:59.566512 kernel: ACPI: PM: Power Resource [FN03] Feb 9 06:48:59.566517 kernel: ACPI: PM: Power Resource [FN04] Feb 9 06:48:59.566522 kernel: ACPI: PM: Power Resource [PIN] Feb 9 06:48:59.566527 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 06:48:59.566591 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 06:48:59.566636 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 06:48:59.566678 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 06:48:59.566685 kernel: PCI host bridge to bus 0000:00 Feb 9 06:48:59.566728 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 06:48:59.566764 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 06:48:59.566801 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 06:48:59.566837 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 9 06:48:59.566872 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 06:48:59.566910 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 06:48:59.566961 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 06:48:59.567011 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 06:48:59.567054 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 06:48:59.567100 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 06:48:59.567142 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 9 06:48:59.567190 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 06:48:59.567233 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 9 06:48:59.567278 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 06:48:59.567320 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 9 06:48:59.567363 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 06:48:59.567408 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 06:48:59.567450 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 9 06:48:59.567493 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 9 06:48:59.567541 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 06:48:59.567583 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 06:48:59.567631 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 06:48:59.567672 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 06:48:59.567717 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 06:48:59.567759 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 9 06:48:59.567800 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 06:48:59.567844 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 06:48:59.567885 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 9 06:48:59.567926 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 06:48:59.567971 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 06:48:59.568014 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 9 06:48:59.568054 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 06:48:59.568099 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 06:48:59.568140 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 9 06:48:59.568180 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 9 06:48:59.568221 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 9 06:48:59.568261 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 9 06:48:59.568310 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 9 06:48:59.568353 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 9 06:48:59.568393 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 06:48:59.568439 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 06:48:59.568482 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 06:48:59.568532 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 06:48:59.568574 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 06:48:59.568622 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 06:48:59.568663 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 06:48:59.568709 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 06:48:59.568751 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 06:48:59.568797 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 9 06:48:59.568840 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 9 06:48:59.568885 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 06:48:59.568927 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 06:48:59.568973 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 06:48:59.569022 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 06:48:59.569063 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 9 06:48:59.569104 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 06:48:59.569151 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 06:48:59.569193 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 06:48:59.569241 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 06:48:59.569287 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 06:48:59.569330 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 9 06:48:59.569372 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 9 06:48:59.569415 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 06:48:59.569458 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 06:48:59.569508 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 06:48:59.569551 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 06:48:59.569596 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 9 06:48:59.569638 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 9 06:48:59.569680 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 06:48:59.569742 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 06:48:59.569784 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 06:48:59.569824 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 06:48:59.569864 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 06:48:59.569905 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 06:48:59.569952 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 9 06:48:59.569995 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 9 06:48:59.570036 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 06:48:59.570079 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 9 06:48:59.570120 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 9 06:48:59.570162 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 06:48:59.570277 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 06:48:59.570320 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 06:48:59.570365 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 06:48:59.570408 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 9 06:48:59.570452 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 06:48:59.570517 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 9 06:48:59.570582 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 06:48:59.570623 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 06:48:59.570663 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 06:48:59.570705 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 06:48:59.570747 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 06:48:59.570792 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 06:48:59.570834 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 9 06:48:59.570876 kernel: pci 0000:06:00.0: supports D1 D2 Feb 9 06:48:59.570918 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 06:48:59.570959 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 06:48:59.570999 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 06:48:59.571043 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 06:48:59.571088 kernel: pci_bus 0000:07: extended config space not accessible Feb 9 06:48:59.571137 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 06:48:59.571181 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 9 06:48:59.571226 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 9 06:48:59.571270 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 06:48:59.571314 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 06:48:59.571359 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 06:48:59.571404 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 06:48:59.571446 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 06:48:59.571490 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 06:48:59.571574 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 06:48:59.571581 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 06:48:59.571587 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 06:48:59.571594 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 06:48:59.571599 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 06:48:59.571605 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 06:48:59.571610 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 06:48:59.571616 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 06:48:59.571621 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 06:48:59.571626 kernel: iommu: Default domain type: Translated Feb 9 06:48:59.571632 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 06:48:59.571675 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 9 06:48:59.571720 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 06:48:59.571764 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 9 06:48:59.571772 kernel: vgaarb: loaded Feb 9 06:48:59.571778 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 06:48:59.571783 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 06:48:59.571788 kernel: PTP clock support registered Feb 9 06:48:59.571794 kernel: PCI: Using ACPI for IRQ routing Feb 9 06:48:59.571799 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 06:48:59.571804 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 06:48:59.571811 kernel: e820: reserve RAM buffer [mem 0x820e2000-0x83ffffff] Feb 9 06:48:59.571816 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 9 06:48:59.571821 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 9 06:48:59.571826 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 9 06:48:59.571831 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 9 06:48:59.571837 kernel: clocksource: Switched to clocksource tsc-early Feb 9 06:48:59.571842 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 06:48:59.571847 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 06:48:59.571853 kernel: pnp: PnP ACPI init Feb 9 06:48:59.571895 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 06:48:59.571937 kernel: pnp 00:02: [dma 0 disabled] Feb 9 06:48:59.571977 kernel: pnp 00:03: [dma 0 disabled] Feb 9 06:48:59.572018 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 06:48:59.572055 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 06:48:59.572095 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 06:48:59.572137 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 06:48:59.572174 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 06:48:59.572210 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 06:48:59.572246 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 06:48:59.572282 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 06:48:59.572317 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 06:48:59.572353 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 06:48:59.572392 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 06:48:59.572430 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 06:48:59.572467 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 06:48:59.572528 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 06:48:59.572586 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 06:48:59.572621 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 06:48:59.572657 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 06:48:59.572695 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 06:48:59.572734 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 06:48:59.572742 kernel: pnp: PnP ACPI: found 10 devices Feb 9 06:48:59.572748 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 06:48:59.572753 kernel: NET: Registered PF_INET protocol family Feb 9 06:48:59.572759 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 06:48:59.572764 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 06:48:59.572769 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 06:48:59.572776 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 06:48:59.572781 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 06:48:59.572787 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 06:48:59.572792 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 06:48:59.572797 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 06:48:59.572803 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 06:48:59.572808 kernel: NET: Registered PF_XDP protocol family Feb 9 06:48:59.572849 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 9 06:48:59.572892 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 9 06:48:59.572933 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 9 06:48:59.572976 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 06:48:59.573019 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 06:48:59.573060 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 06:48:59.573102 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 06:48:59.573143 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 06:48:59.573184 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 06:48:59.573227 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 06:48:59.573266 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 06:48:59.573307 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 06:48:59.573348 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 06:48:59.573390 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 06:48:59.573432 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 06:48:59.573472 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 06:48:59.573539 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 06:48:59.573581 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 06:48:59.573624 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 06:48:59.573666 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 06:48:59.573710 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 06:48:59.573751 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 06:48:59.573795 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 06:48:59.573836 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 06:48:59.573873 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 06:48:59.573910 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 06:48:59.573946 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 06:48:59.573982 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 06:48:59.574017 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 9 06:48:59.574052 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 06:48:59.574094 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 9 06:48:59.574134 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 06:48:59.574178 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 9 06:48:59.574217 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 9 06:48:59.574259 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 9 06:48:59.574297 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 9 06:48:59.574338 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 9 06:48:59.574379 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 9 06:48:59.574418 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 06:48:59.574459 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 9 06:48:59.574467 kernel: PCI: CLS 64 bytes, default 64 Feb 9 06:48:59.574473 kernel: DMAR: No ATSR found Feb 9 06:48:59.574478 kernel: DMAR: No SATC found Feb 9 06:48:59.574484 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 06:48:59.574527 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 06:48:59.574572 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 06:48:59.574614 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 9 06:48:59.574655 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 9 06:48:59.574696 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 9 06:48:59.574757 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 9 06:48:59.574798 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 9 06:48:59.574837 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 9 06:48:59.574878 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 9 06:48:59.574920 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 9 06:48:59.574961 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 9 06:48:59.575000 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 9 06:48:59.575041 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 9 06:48:59.575081 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 9 06:48:59.575122 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 9 06:48:59.575162 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 9 06:48:59.575203 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 9 06:48:59.575245 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 9 06:48:59.575285 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 9 06:48:59.575326 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 9 06:48:59.575366 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 9 06:48:59.575408 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 9 06:48:59.575450 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 9 06:48:59.575516 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 9 06:48:59.575574 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 06:48:59.575617 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 9 06:48:59.575662 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 9 06:48:59.575669 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 06:48:59.575675 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 06:48:59.575680 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 9 06:48:59.575686 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 9 06:48:59.575691 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 06:48:59.575696 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 06:48:59.575703 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 06:48:59.575745 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 06:48:59.575753 kernel: Initialise system trusted keyrings Feb 9 06:48:59.575759 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 06:48:59.575764 kernel: Key type asymmetric registered Feb 9 06:48:59.575769 kernel: Asymmetric key parser 'x509' registered Feb 9 06:48:59.575774 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 06:48:59.575780 kernel: io scheduler mq-deadline registered Feb 9 06:48:59.575786 kernel: io scheduler kyber registered Feb 9 06:48:59.575792 kernel: io scheduler bfq registered Feb 9 06:48:59.575832 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 9 06:48:59.575873 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 9 06:48:59.575914 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 9 06:48:59.575953 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 9 06:48:59.575995 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 9 06:48:59.576034 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 9 06:48:59.576082 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 06:48:59.576090 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 06:48:59.576095 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 06:48:59.576101 kernel: pstore: Registered erst as persistent store backend Feb 9 06:48:59.576106 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 06:48:59.576112 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 06:48:59.576117 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 06:48:59.576122 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 06:48:59.576129 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 9 06:48:59.576173 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 06:48:59.576180 kernel: i8042: PNP: No PS/2 controller found. Feb 9 06:48:59.576216 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 06:48:59.576254 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 06:48:59.576291 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T06:48:58 UTC (1707461338) Feb 9 06:48:59.576327 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 06:48:59.576335 kernel: fail to initialize ptp_kvm Feb 9 06:48:59.576341 kernel: intel_pstate: Intel P-state driver initializing Feb 9 06:48:59.576347 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 06:48:59.576352 kernel: intel_pstate: HWP enabled Feb 9 06:48:59.576357 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 06:48:59.576363 kernel: vesafb: scrolling: redraw Feb 9 06:48:59.576368 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 06:48:59.576373 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x000000007821a6ff, using 768k, total 768k Feb 9 06:48:59.576379 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 06:48:59.576384 kernel: fb0: VESA VGA frame buffer device Feb 9 06:48:59.576390 kernel: NET: Registered PF_INET6 protocol family Feb 9 06:48:59.576396 kernel: Segment Routing with IPv6 Feb 9 06:48:59.576401 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 06:48:59.576406 kernel: NET: Registered PF_PACKET protocol family Feb 9 06:48:59.576412 kernel: Key type dns_resolver registered Feb 9 06:48:59.576417 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 06:48:59.576422 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 06:48:59.576427 kernel: IPI shorthand broadcast: enabled Feb 9 06:48:59.576433 kernel: sched_clock: Marking stable (1681593073, 1338961477)->(4439020937, -1418466387) Feb 9 06:48:59.576439 kernel: registered taskstats version 1 Feb 9 06:48:59.576444 kernel: Loading compiled-in X.509 certificates Feb 9 06:48:59.576449 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 9 06:48:59.576455 kernel: Key type .fscrypt registered Feb 9 06:48:59.576460 kernel: Key type fscrypt-provisioning registered Feb 9 06:48:59.576465 kernel: pstore: Using crash dump compression: deflate Feb 9 06:48:59.576470 kernel: ima: Allocated hash algorithm: sha1 Feb 9 06:48:59.576476 kernel: ima: No architecture policies found Feb 9 06:48:59.576481 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 06:48:59.576511 kernel: Write protecting the kernel read-only data: 28672k Feb 9 06:48:59.576517 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 06:48:59.576522 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 06:48:59.576528 kernel: Run /init as init process Feb 9 06:48:59.576553 kernel: with arguments: Feb 9 06:48:59.576558 kernel: /init Feb 9 06:48:59.576564 kernel: with environment: Feb 9 06:48:59.576569 kernel: HOME=/ Feb 9 06:48:59.576575 kernel: TERM=linux Feb 9 06:48:59.576580 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 06:48:59.576586 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 06:48:59.576593 systemd[1]: Detected architecture x86-64. Feb 9 06:48:59.576599 systemd[1]: Running in initrd. Feb 9 06:48:59.576604 systemd[1]: No hostname configured, using default hostname. Feb 9 06:48:59.576609 systemd[1]: Hostname set to . Feb 9 06:48:59.576614 systemd[1]: Initializing machine ID from random generator. Feb 9 06:48:59.576621 systemd[1]: Queued start job for default target initrd.target. Feb 9 06:48:59.576626 systemd[1]: Started systemd-ask-password-console.path. Feb 9 06:48:59.576631 systemd[1]: Reached target cryptsetup.target. Feb 9 06:48:59.576636 systemd[1]: Reached target paths.target. Feb 9 06:48:59.576642 systemd[1]: Reached target slices.target. Feb 9 06:48:59.576647 systemd[1]: Reached target swap.target. Feb 9 06:48:59.576652 systemd[1]: Reached target timers.target. Feb 9 06:48:59.576657 systemd[1]: Listening on iscsid.socket. Feb 9 06:48:59.576664 systemd[1]: Listening on iscsiuio.socket. Feb 9 06:48:59.576670 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 06:48:59.576675 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 06:48:59.576680 systemd[1]: Listening on systemd-journald.socket. Feb 9 06:48:59.576686 kernel: tsc: Refined TSC clocksource calibration: 3408.049 MHz Feb 9 06:48:59.576691 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x31200258a15, max_idle_ns: 440795258321 ns Feb 9 06:48:59.576697 kernel: clocksource: Switched to clocksource tsc Feb 9 06:48:59.576702 systemd[1]: Listening on systemd-networkd.socket. Feb 9 06:48:59.576708 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 06:48:59.576714 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 06:48:59.576719 systemd[1]: Reached target sockets.target. Feb 9 06:48:59.576725 systemd[1]: Starting kmod-static-nodes.service... Feb 9 06:48:59.576730 systemd[1]: Finished network-cleanup.service. Feb 9 06:48:59.576736 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 06:48:59.576741 systemd[1]: Starting systemd-journald.service... Feb 9 06:48:59.576746 systemd[1]: Starting systemd-modules-load.service... Feb 9 06:48:59.576753 systemd-journald[269]: Journal started Feb 9 06:48:59.576779 systemd-journald[269]: Runtime Journal (/run/log/journal/579c0c734c26426aa13360d682cd2acf) is 8.0M, max 640.1M, 632.1M free. Feb 9 06:48:59.579062 systemd-modules-load[270]: Inserted module 'overlay' Feb 9 06:48:59.608757 kernel: audit: type=1334 audit(1707461339.584:2): prog-id=6 op=LOAD Feb 9 06:48:59.608767 systemd[1]: Starting systemd-resolved.service... Feb 9 06:48:59.584000 audit: BPF prog-id=6 op=LOAD Feb 9 06:48:59.652536 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 06:48:59.652553 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 06:48:59.683522 kernel: Bridge firewalling registered Feb 9 06:48:59.683540 systemd[1]: Started systemd-journald.service. Feb 9 06:48:59.698022 systemd-modules-load[270]: Inserted module 'br_netfilter' Feb 9 06:48:59.747857 kernel: audit: type=1130 audit(1707461339.705:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:59.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:59.703572 systemd-resolved[272]: Positive Trust Anchors: Feb 9 06:48:59.823289 kernel: SCSI subsystem initialized Feb 9 06:48:59.823302 kernel: audit: type=1130 audit(1707461339.759:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:59.823312 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 06:48:59.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:59.703578 systemd-resolved[272]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 06:48:59.923170 kernel: device-mapper: uevent: version 1.0.3 Feb 9 06:48:59.923181 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 06:48:59.923189 kernel: audit: type=1130 audit(1707461339.879:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:59.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:59.703599 systemd-resolved[272]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 06:48:59.997678 kernel: audit: type=1130 audit(1707461339.930:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:59.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:59.705141 systemd-resolved[272]: Defaulting to hostname 'linux'. Feb 9 06:49:00.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:59.706793 systemd[1]: Started systemd-resolved.service. Feb 9 06:49:00.105318 kernel: audit: type=1130 audit(1707461340.005:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:00.105329 kernel: audit: type=1130 audit(1707461340.058:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:00.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:48:59.760679 systemd[1]: Finished kmod-static-nodes.service. Feb 9 06:48:59.901011 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 06:48:59.923453 systemd-modules-load[270]: Inserted module 'dm_multipath' Feb 9 06:48:59.931769 systemd[1]: Finished systemd-modules-load.service. Feb 9 06:49:00.006771 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 06:49:00.059756 systemd[1]: Reached target nss-lookup.target. Feb 9 06:49:00.114064 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 06:49:00.135065 systemd[1]: Starting systemd-sysctl.service... Feb 9 06:49:00.135359 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 06:49:00.138106 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 06:49:00.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:00.138868 systemd[1]: Finished systemd-sysctl.service. Feb 9 06:49:00.187693 kernel: audit: type=1130 audit(1707461340.136:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:00.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:00.199818 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 06:49:00.265579 kernel: audit: type=1130 audit(1707461340.198:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:00.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:00.257149 systemd[1]: Starting dracut-cmdline.service... Feb 9 06:49:00.279599 dracut-cmdline[296]: dracut-dracut-053 Feb 9 06:49:00.279599 dracut-cmdline[296]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 06:49:00.279599 dracut-cmdline[296]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 9 06:49:00.346573 kernel: Loading iSCSI transport class v2.0-870. Feb 9 06:49:00.346585 kernel: iscsi: registered transport (tcp) Feb 9 06:49:00.397552 kernel: iscsi: registered transport (qla4xxx) Feb 9 06:49:00.397572 kernel: QLogic iSCSI HBA Driver Feb 9 06:49:00.413501 systemd[1]: Finished dracut-cmdline.service. Feb 9 06:49:00.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:00.422239 systemd[1]: Starting dracut-pre-udev.service... Feb 9 06:49:00.478563 kernel: raid6: avx2x4 gen() 48859 MB/s Feb 9 06:49:00.513570 kernel: raid6: avx2x4 xor() 21394 MB/s Feb 9 06:49:00.548564 kernel: raid6: avx2x2 gen() 52369 MB/s Feb 9 06:49:00.583519 kernel: raid6: avx2x2 xor() 32113 MB/s Feb 9 06:49:00.618517 kernel: raid6: avx2x1 gen() 45114 MB/s Feb 9 06:49:00.651520 kernel: raid6: avx2x1 xor() 27888 MB/s Feb 9 06:49:00.685572 kernel: raid6: sse2x4 gen() 21355 MB/s Feb 9 06:49:00.719525 kernel: raid6: sse2x4 xor() 11978 MB/s Feb 9 06:49:00.753526 kernel: raid6: sse2x2 gen() 21660 MB/s Feb 9 06:49:00.787569 kernel: raid6: sse2x2 xor() 13424 MB/s Feb 9 06:49:00.821571 kernel: raid6: sse2x1 gen() 18295 MB/s Feb 9 06:49:00.873180 kernel: raid6: sse2x1 xor() 8926 MB/s Feb 9 06:49:00.873195 kernel: raid6: using algorithm avx2x2 gen() 52369 MB/s Feb 9 06:49:00.873203 kernel: raid6: .... xor() 32113 MB/s, rmw enabled Feb 9 06:49:00.891272 kernel: raid6: using avx2x2 recovery algorithm Feb 9 06:49:00.937555 kernel: xor: automatically using best checksumming function avx Feb 9 06:49:01.016494 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 06:49:01.021059 systemd[1]: Finished dracut-pre-udev.service. Feb 9 06:49:01.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:01.029000 audit: BPF prog-id=7 op=LOAD Feb 9 06:49:01.029000 audit: BPF prog-id=8 op=LOAD Feb 9 06:49:01.031412 systemd[1]: Starting systemd-udevd.service... Feb 9 06:49:01.039625 systemd-udevd[477]: Using default interface naming scheme 'v252'. Feb 9 06:49:01.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:01.044637 systemd[1]: Started systemd-udevd.service. Feb 9 06:49:01.087618 dracut-pre-trigger[490]: rd.md=0: removing MD RAID activation Feb 9 06:49:01.062141 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 06:49:01.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:01.090879 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 06:49:01.105846 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 06:49:01.189176 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 06:49:01.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:01.215517 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 06:49:01.251824 kernel: ACPI: bus type USB registered Feb 9 06:49:01.251855 kernel: usbcore: registered new interface driver usbfs Feb 9 06:49:01.251863 kernel: usbcore: registered new interface driver hub Feb 9 06:49:01.269500 kernel: usbcore: registered new device driver usb Feb 9 06:49:01.288493 kernel: libata version 3.00 loaded. Feb 9 06:49:01.312501 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 06:49:01.312533 kernel: AES CTR mode by8 optimization enabled Feb 9 06:49:01.312541 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 06:49:01.312621 kernel: mlx5_core 0000:01:00.0: firmware version: 14.28.2006 Feb 9 06:49:01.312679 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 06:49:01.408496 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 06:49:01.408521 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 9 06:49:01.408614 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 06:49:01.408631 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 06:49:01.440494 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 06:49:01.461541 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 06:49:01.461611 kernel: scsi host0: ahci Feb 9 06:49:01.461628 kernel: pps pps0: new PPS source ptp0 Feb 9 06:49:01.461685 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 9 06:49:01.461740 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 06:49:01.461792 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d8:82 Feb 9 06:49:01.461843 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 9 06:49:01.461892 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 06:49:01.488490 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 06:49:01.488559 kernel: scsi host1: ahci Feb 9 06:49:01.498533 kernel: pps pps1: new PPS source ptp1 Feb 9 06:49:01.498602 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 9 06:49:01.498673 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 06:49:01.498743 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d8:83 Feb 9 06:49:01.498819 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 9 06:49:01.498871 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 06:49:01.518556 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 06:49:01.518624 kernel: scsi host2: ahci Feb 9 06:49:01.518639 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 9 06:49:01.533383 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 06:49:01.533453 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 06:49:01.563966 kernel: scsi host3: ahci Feb 9 06:49:01.571536 kernel: hub 1-0:1.0: USB hub found Feb 9 06:49:01.571626 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 06:49:01.580489 kernel: scsi host4: ahci Feb 9 06:49:01.609378 kernel: hub 1-0:1.0: 16 ports detected Feb 9 06:49:01.609451 kernel: scsi host5: ahci Feb 9 06:49:01.639533 kernel: hub 2-0:1.0: USB hub found Feb 9 06:49:01.639611 kernel: scsi host6: ahci Feb 9 06:49:01.639626 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 9 06:49:01.662724 kernel: hub 2-0:1.0: 10 ports detected Feb 9 06:49:01.662798 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Feb 9 06:49:01.703784 kernel: usb: port power management may be unreliable Feb 9 06:49:01.703799 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Feb 9 06:49:01.889282 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 06:49:01.889309 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Feb 9 06:49:01.987951 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Feb 9 06:49:01.987966 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Feb 9 06:49:02.004994 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Feb 9 06:49:02.021926 kernel: hub 1-14:1.0: USB hub found Feb 9 06:49:02.022003 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Feb 9 06:49:02.052225 kernel: hub 1-14:1.0: 4 ports detected Feb 9 06:49:02.066515 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 06:49:02.306590 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 06:49:02.352105 kernel: mlx5_core 0000:01:00.1: firmware version: 14.28.2006 Feb 9 06:49:02.352234 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 06:49:02.352300 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 06:49:02.368500 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 06:49:02.385488 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 06:49:02.401512 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 06:49:02.416488 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 06:49:02.431527 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 06:49:02.446524 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 06:49:02.460495 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 06:49:02.476488 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 9 06:49:02.492547 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 9 06:49:02.492563 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 06:49:02.522578 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 06:49:02.550083 kernel: ata1.00: Features: NCQ-prio Feb 9 06:49:02.550100 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 06:49:02.578552 kernel: ata2.00: Features: NCQ-prio Feb 9 06:49:02.596506 kernel: ata1.00: configured for UDMA/133 Feb 9 06:49:02.596523 kernel: ata2.00: configured for UDMA/133 Feb 9 06:49:02.596532 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 9 06:49:02.626550 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 9 06:49:02.643557 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 06:49:02.692390 kernel: usbcore: registered new interface driver usbhid Feb 9 06:49:02.692439 kernel: port_module: 9 callbacks suppressed Feb 9 06:49:02.692447 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Feb 9 06:49:02.692540 kernel: usbhid: USB HID core driver Feb 9 06:49:02.709490 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 06:49:02.770490 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 06:49:02.770505 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 06:49:02.784023 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 06:49:02.798039 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 06:49:02.798119 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 06:49:02.823546 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 9 06:49:02.823621 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 06:49:02.823687 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 06:49:02.823695 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 06:49:02.832009 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 06:49:02.847528 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 9 06:49:02.909257 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 06:49:02.909333 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 06:49:02.919544 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 06:49:02.941683 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 06:49:02.957719 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 06:49:02.973388 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 06:49:03.064826 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 06:49:03.080140 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 06:49:03.080189 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 06:49:03.095166 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 9 06:49:03.110545 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 06:49:03.140867 kernel: GPT:9289727 != 937703087 Feb 9 06:49:03.140881 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 06:49:03.157093 kernel: GPT:9289727 != 937703087 Feb 9 06:49:03.170964 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 06:49:03.186605 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 06:49:03.217769 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 06:49:03.217783 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 06:49:03.252587 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Feb 9 06:49:03.278284 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 06:49:03.324769 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (532) Feb 9 06:49:03.324783 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Feb 9 06:49:03.311557 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 06:49:03.337707 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 06:49:03.353085 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 06:49:03.381725 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 06:49:03.392483 systemd[1]: Starting disk-uuid.service... Feb 9 06:49:03.452590 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 06:49:03.452607 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 06:49:03.452618 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 06:49:03.452686 disk-uuid[691]: Primary Header is updated. Feb 9 06:49:03.452686 disk-uuid[691]: Secondary Entries is updated. Feb 9 06:49:03.452686 disk-uuid[691]: Secondary Header is updated. Feb 9 06:49:03.510569 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 06:49:03.510579 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 06:49:03.510586 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 06:49:04.496157 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 06:49:04.515135 disk-uuid[692]: The operation has completed successfully. Feb 9 06:49:04.523726 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 06:49:04.555081 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 06:49:04.649164 kernel: audit: type=1130 audit(1707461344.562:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:04.649178 kernel: audit: type=1131 audit(1707461344.562:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:04.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:04.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:04.555124 systemd[1]: Finished disk-uuid.service. Feb 9 06:49:04.677585 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 06:49:04.564178 systemd[1]: Starting verity-setup.service... Feb 9 06:49:04.710216 systemd[1]: Found device dev-mapper-usr.device. Feb 9 06:49:04.719450 systemd[1]: Mounting sysusr-usr.mount... Feb 9 06:49:04.734697 systemd[1]: Finished verity-setup.service. Feb 9 06:49:04.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:04.793491 kernel: audit: type=1130 audit(1707461344.748:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:04.820489 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 06:49:04.820860 systemd[1]: Mounted sysusr-usr.mount. Feb 9 06:49:04.827772 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 06:49:04.912572 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 06:49:04.912590 kernel: BTRFS info (device sda6): using free space tree Feb 9 06:49:04.912598 kernel: BTRFS info (device sda6): has skinny extents Feb 9 06:49:04.912605 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 06:49:04.828164 systemd[1]: Starting ignition-setup.service... Feb 9 06:49:04.850924 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 06:49:04.983538 kernel: audit: type=1130 audit(1707461344.937:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:04.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:04.921851 systemd[1]: Finished ignition-setup.service. Feb 9 06:49:04.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:04.938828 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 06:49:05.067155 kernel: audit: type=1130 audit(1707461344.991:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:05.067171 kernel: audit: type=1334 audit(1707461345.045:24): prog-id=9 op=LOAD Feb 9 06:49:05.045000 audit: BPF prog-id=9 op=LOAD Feb 9 06:49:04.993133 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 06:49:05.047375 systemd[1]: Starting systemd-networkd.service... Feb 9 06:49:05.082762 systemd-networkd[881]: lo: Link UP Feb 9 06:49:05.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:05.115120 ignition[869]: Ignition 2.14.0 Feb 9 06:49:05.144596 kernel: audit: type=1130 audit(1707461345.096:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:05.082765 systemd-networkd[881]: lo: Gained carrier Feb 9 06:49:05.115124 ignition[869]: Stage: fetch-offline Feb 9 06:49:05.083049 systemd-networkd[881]: Enumeration completed Feb 9 06:49:05.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:05.231566 kernel: audit: type=1130 audit(1707461345.184:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:05.115151 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 06:49:05.307985 kernel: audit: type=1130 audit(1707461345.238:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:05.308000 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 06:49:05.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:05.083121 systemd[1]: Started systemd-networkd.service. Feb 9 06:49:05.330569 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Feb 9 06:49:05.115164 ignition[869]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 06:49:05.083835 systemd-networkd[881]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 06:49:05.122942 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 06:49:05.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:05.097608 systemd[1]: Reached target network.target. Feb 9 06:49:05.383578 iscsid[907]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 06:49:05.383578 iscsid[907]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 06:49:05.383578 iscsid[907]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 06:49:05.383578 iscsid[907]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 06:49:05.383578 iscsid[907]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 06:49:05.383578 iscsid[907]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 06:49:05.383578 iscsid[907]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 06:49:05.547650 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 9 06:49:05.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:05.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:05.123008 ignition[869]: parsed url from cmdline: "" Feb 9 06:49:05.133501 unknown[869]: fetched base config from "system" Feb 9 06:49:05.123010 ignition[869]: no config URL provided Feb 9 06:49:05.133524 unknown[869]: fetched user config from "system" Feb 9 06:49:05.123013 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 06:49:05.156160 systemd[1]: Starting iscsiuio.service... Feb 9 06:49:05.123033 ignition[869]: parsing config with SHA512: c8c94469583bc8c029ff9d3b7da78b426fbf491363f7b91bfaf55407eb1b86ac1af02e7cc8ebbabc0ba66945ede64ef3719c28504103ba99c53c5ac4102a4428 Feb 9 06:49:05.170765 systemd[1]: Started iscsiuio.service. Feb 9 06:49:05.133800 ignition[869]: fetch-offline: fetch-offline passed Feb 9 06:49:05.185818 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 06:49:05.133803 ignition[869]: POST message to Packet Timeline Feb 9 06:49:05.239797 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 9 06:49:05.133808 ignition[869]: POST Status error: resource requires networking Feb 9 06:49:05.240317 systemd[1]: Starting ignition-kargs.service... Feb 9 06:49:05.133837 ignition[869]: Ignition finished successfully Feb 9 06:49:05.309243 systemd-networkd[881]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 06:49:05.312188 ignition[897]: Ignition 2.14.0 Feb 9 06:49:05.322088 systemd[1]: Starting iscsid.service... Feb 9 06:49:05.312191 ignition[897]: Stage: kargs Feb 9 06:49:05.341631 systemd[1]: Started iscsid.service. Feb 9 06:49:05.312247 ignition[897]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 06:49:05.361044 systemd[1]: Starting dracut-initqueue.service... Feb 9 06:49:05.312256 ignition[897]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 06:49:05.370738 systemd[1]: Finished dracut-initqueue.service. Feb 9 06:49:05.313615 ignition[897]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 06:49:05.391608 systemd[1]: Reached target remote-fs-pre.target. Feb 9 06:49:05.315273 ignition[897]: kargs: kargs passed Feb 9 06:49:05.411639 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 06:49:05.315276 ignition[897]: POST message to Packet Timeline Feb 9 06:49:05.411676 systemd[1]: Reached target remote-fs.target. Feb 9 06:49:05.315287 ignition[897]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 06:49:05.454836 systemd[1]: Starting dracut-pre-mount.service... Feb 9 06:49:05.332281 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:50403->[::1]:53: read: connection refused Feb 9 06:49:05.481768 systemd[1]: Finished dracut-pre-mount.service. Feb 9 06:49:05.532600 ignition[897]: GET https://metadata.packet.net/metadata: attempt #2 Feb 9 06:49:05.524316 systemd-networkd[881]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 06:49:05.532940 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:40580->[::1]:53: read: connection refused Feb 9 06:49:05.552570 systemd-networkd[881]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 06:49:05.580841 systemd-networkd[881]: enp1s0f1np1: Link UP Feb 9 06:49:05.580981 systemd-networkd[881]: enp1s0f1np1: Gained carrier Feb 9 06:49:05.595757 systemd-networkd[881]: enp1s0f0np0: Link UP Feb 9 06:49:05.595940 systemd-networkd[881]: eno2: Link UP Feb 9 06:49:05.596118 systemd-networkd[881]: eno1: Link UP Feb 9 06:49:05.933178 ignition[897]: GET https://metadata.packet.net/metadata: attempt #3 Feb 9 06:49:05.934251 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:49155->[::1]:53: read: connection refused Feb 9 06:49:06.374376 systemd-networkd[881]: enp1s0f0np0: Gained carrier Feb 9 06:49:06.382709 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Feb 9 06:49:06.411692 systemd-networkd[881]: enp1s0f0np0: DHCPv4 address 139.178.90.101/31, gateway 139.178.90.100 acquired from 145.40.83.140 Feb 9 06:49:06.734773 ignition[897]: GET https://metadata.packet.net/metadata: attempt #4 Feb 9 06:49:06.736115 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:50797->[::1]:53: read: connection refused Feb 9 06:49:07.056893 systemd-networkd[881]: enp1s0f1np1: Gained IPv6LL Feb 9 06:49:07.504907 systemd-networkd[881]: enp1s0f0np0: Gained IPv6LL Feb 9 06:49:08.337867 ignition[897]: GET https://metadata.packet.net/metadata: attempt #5 Feb 9 06:49:08.339517 ignition[897]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43180->[::1]:53: read: connection refused Feb 9 06:49:11.542478 ignition[897]: GET https://metadata.packet.net/metadata: attempt #6 Feb 9 06:49:11.580663 ignition[897]: GET result: OK Feb 9 06:49:11.814028 ignition[897]: Ignition finished successfully Feb 9 06:49:11.818360 systemd[1]: Finished ignition-kargs.service. Feb 9 06:49:11.901140 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 9 06:49:11.901164 kernel: audit: type=1130 audit(1707461351.828:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:11.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:11.838654 ignition[924]: Ignition 2.14.0 Feb 9 06:49:11.831809 systemd[1]: Starting ignition-disks.service... Feb 9 06:49:11.838658 ignition[924]: Stage: disks Feb 9 06:49:11.838731 ignition[924]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 06:49:11.838740 ignition[924]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 06:49:11.840120 ignition[924]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 06:49:11.841626 ignition[924]: disks: disks passed Feb 9 06:49:11.841629 ignition[924]: POST message to Packet Timeline Feb 9 06:49:11.841640 ignition[924]: GET https://metadata.packet.net/metadata: attempt #1 Feb 9 06:49:11.921974 ignition[924]: GET result: OK Feb 9 06:49:12.138057 ignition[924]: Ignition finished successfully Feb 9 06:49:12.141410 systemd[1]: Finished ignition-disks.service. Feb 9 06:49:12.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.155218 systemd[1]: Reached target initrd-root-device.target. Feb 9 06:49:12.237660 kernel: audit: type=1130 audit(1707461352.153:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.223645 systemd[1]: Reached target local-fs-pre.target. Feb 9 06:49:12.223759 systemd[1]: Reached target local-fs.target. Feb 9 06:49:12.245661 systemd[1]: Reached target sysinit.target. Feb 9 06:49:12.245774 systemd[1]: Reached target basic.target. Feb 9 06:49:12.267463 systemd[1]: Starting systemd-fsck-root.service... Feb 9 06:49:12.286146 systemd-fsck[939]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 9 06:49:12.307051 systemd[1]: Finished systemd-fsck-root.service. Feb 9 06:49:12.394251 kernel: audit: type=1130 audit(1707461352.315:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.394269 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 06:49:12.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.317074 systemd[1]: Mounting sysroot.mount... Feb 9 06:49:12.403183 systemd[1]: Mounted sysroot.mount. Feb 9 06:49:12.417820 systemd[1]: Reached target initrd-root-fs.target. Feb 9 06:49:12.439214 systemd[1]: Mounting sysroot-usr.mount... Feb 9 06:49:12.447308 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 06:49:12.464364 systemd[1]: Starting flatcar-static-network.service... Feb 9 06:49:12.478738 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 06:49:12.478822 systemd[1]: Reached target ignition-diskful.target. Feb 9 06:49:12.497391 systemd[1]: Mounted sysroot-usr.mount. Feb 9 06:49:12.522663 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 06:49:12.722776 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (950) Feb 9 06:49:12.722794 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 06:49:12.722804 kernel: BTRFS info (device sda6): using free space tree Feb 9 06:49:12.722815 kernel: BTRFS info (device sda6): has skinny extents Feb 9 06:49:12.722824 kernel: audit: type=1130 audit(1707461352.644:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.722832 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 06:49:12.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.722915 coreos-metadata[947]: Feb 09 06:49:12.645 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 06:49:12.722915 coreos-metadata[947]: Feb 09 06:49:12.717 INFO Fetch successful Feb 9 06:49:12.757697 coreos-metadata[946]: Feb 09 06:49:12.645 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 06:49:12.757697 coreos-metadata[946]: Feb 09 06:49:12.689 INFO Fetch successful Feb 9 06:49:12.757697 coreos-metadata[946]: Feb 09 06:49:12.706 INFO wrote hostname ci-3510.3.2-a-5a64198dec to /sysroot/etc/hostname Feb 9 06:49:12.965639 kernel: audit: type=1130 audit(1707461352.764:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.965656 kernel: audit: type=1130 audit(1707461352.828:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.965667 kernel: audit: type=1131 audit(1707461352.828:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.535193 systemd[1]: Starting initrd-setup-root.service... Feb 9 06:49:12.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:13.002623 initrd-setup-root[957]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 06:49:13.041717 kernel: audit: type=1130 audit(1707461352.973:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.625030 systemd[1]: Finished initrd-setup-root.service. Feb 9 06:49:13.048720 initrd-setup-root[965]: cut: /sysroot/etc/group: No such file or directory Feb 9 06:49:13.058689 bash[1013]: umount: /sysroot/usr/share/oem: not mounted. Feb 9 06:49:12.646126 systemd[1]: Starting ignition-mount.service... Feb 9 06:49:13.074659 initrd-setup-root[973]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 06:49:13.084646 ignition[1023]: INFO : Ignition 2.14.0 Feb 9 06:49:13.084646 ignition[1023]: INFO : Stage: mount Feb 9 06:49:13.084646 ignition[1023]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 06:49:13.084646 ignition[1023]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 06:49:13.084646 ignition[1023]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 06:49:13.084646 ignition[1023]: INFO : mount: mount passed Feb 9 06:49:13.084646 ignition[1023]: INFO : POST message to Packet Timeline Feb 9 06:49:13.084646 ignition[1023]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 06:49:13.084646 ignition[1023]: INFO : GET result: OK Feb 9 06:49:12.729975 systemd[1]: Starting sysroot-boot.service... Feb 9 06:49:13.179767 initrd-setup-root[981]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 06:49:12.751051 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 06:49:12.765785 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 9 06:49:12.765829 systemd[1]: Finished flatcar-static-network.service. Feb 9 06:49:12.829746 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 06:49:13.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:13.284882 ignition[1023]: INFO : Ignition finished successfully Feb 9 06:49:13.300591 kernel: audit: type=1130 audit(1707461353.225:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:12.952038 systemd[1]: Finished sysroot-boot.service. Feb 9 06:49:13.217313 systemd[1]: Finished ignition-mount.service. Feb 9 06:49:13.229158 systemd[1]: Starting ignition-files.service... Feb 9 06:49:13.321758 ignition[1037]: INFO : Ignition 2.14.0 Feb 9 06:49:13.321758 ignition[1037]: INFO : Stage: files Feb 9 06:49:13.321758 ignition[1037]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 06:49:13.321758 ignition[1037]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 06:49:13.321758 ignition[1037]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 06:49:13.321758 ignition[1037]: DEBUG : files: compiled without relabeling support, skipping Feb 9 06:49:13.321758 ignition[1037]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 06:49:13.321758 ignition[1037]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 06:49:13.321758 ignition[1037]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 06:49:13.321758 ignition[1037]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 06:49:13.321758 ignition[1037]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 06:49:13.321758 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 06:49:13.321758 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 06:49:13.305242 unknown[1037]: wrote ssh authorized keys file for user: core Feb 9 06:49:13.821886 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 06:49:13.917808 ignition[1037]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 06:49:13.942577 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 06:49:13.942577 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 06:49:13.942577 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 06:49:14.320727 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 06:49:14.420812 ignition[1037]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 06:49:14.420812 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 06:49:14.462681 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 06:49:14.462681 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 9 06:49:14.883139 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 06:49:15.052553 ignition[1037]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 9 06:49:15.052553 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 06:49:15.094694 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 06:49:15.094694 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 9 06:49:15.126661 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 06:49:15.506724 ignition[1037]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 9 06:49:15.506724 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 06:49:15.556602 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1043) Feb 9 06:49:15.556619 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 06:49:15.556619 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 06:49:15.556619 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 06:49:15.556619 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 06:49:15.556619 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 06:49:15.556619 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 06:49:15.556619 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 06:49:15.556619 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 06:49:15.556619 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem840684669" Feb 9 06:49:15.556619 ignition[1037]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem840684669": device or resource busy Feb 9 06:49:15.556619 ignition[1037]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem840684669", trying btrfs: device or resource busy Feb 9 06:49:15.556619 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem840684669" Feb 9 06:49:15.556619 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem840684669" Feb 9 06:49:15.556619 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem840684669" Feb 9 06:49:15.556619 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem840684669" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(e): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(e): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(f): [started] processing unit "packet-phone-home.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(f): [finished] processing unit "packet-phone-home.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(10): [started] processing unit "prepare-cni-plugins.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(10): op(11): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(10): op(11): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(10): [finished] processing unit "prepare-cni-plugins.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(12): [started] processing unit "prepare-critools.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(12): op(13): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(12): op(13): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(12): [finished] processing unit "prepare-critools.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(14): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(14): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(15): [started] setting preset to enabled for "packet-phone-home.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(15): [finished] setting preset to enabled for "packet-phone-home.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(16): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 06:49:15.808843 ignition[1037]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 06:49:16.234815 kernel: audit: type=1130 audit(1707461355.832:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:15.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:15.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:15.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:15.960000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.235616 ignition[1037]: INFO : files: op(17): [started] setting preset to enabled for "prepare-critools.service" Feb 9 06:49:16.235616 ignition[1037]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 06:49:16.235616 ignition[1037]: INFO : files: createResultFile: createFiles: op(18): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 06:49:16.235616 ignition[1037]: INFO : files: createResultFile: createFiles: op(18): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 06:49:16.235616 ignition[1037]: INFO : files: files passed Feb 9 06:49:16.235616 ignition[1037]: INFO : POST message to Packet Timeline Feb 9 06:49:16.235616 ignition[1037]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 06:49:16.235616 ignition[1037]: INFO : GET result: OK Feb 9 06:49:16.235616 ignition[1037]: INFO : Ignition finished successfully Feb 9 06:49:16.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:15.809977 systemd[1]: Finished ignition-files.service. Feb 9 06:49:15.840588 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 06:49:16.443821 initrd-setup-root-after-ignition[1071]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 06:49:15.901742 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 06:49:16.472000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:15.902121 systemd[1]: Starting ignition-quench.service... Feb 9 06:49:15.931846 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 06:49:16.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:15.943007 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 06:49:16.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:15.943066 systemd[1]: Finished ignition-quench.service. Feb 9 06:49:15.961894 systemd[1]: Reached target ignition-complete.target. Feb 9 06:49:15.995547 systemd[1]: Starting initrd-parse-etc.service... Feb 9 06:49:16.018126 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 06:49:16.018183 systemd[1]: Finished initrd-parse-etc.service. Feb 9 06:49:16.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.028857 systemd[1]: Reached target initrd-fs.target. Feb 9 06:49:16.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.047787 systemd[1]: Reached target initrd.target. Feb 9 06:49:16.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.078950 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 06:49:16.667683 ignition[1086]: INFO : Ignition 2.14.0 Feb 9 06:49:16.667683 ignition[1086]: INFO : Stage: umount Feb 9 06:49:16.667683 ignition[1086]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 06:49:16.667683 ignition[1086]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 9 06:49:16.667683 ignition[1086]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 9 06:49:16.667683 ignition[1086]: INFO : umount: umount passed Feb 9 06:49:16.667683 ignition[1086]: INFO : POST message to Packet Timeline Feb 9 06:49:16.667683 ignition[1086]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 9 06:49:16.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.081079 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 06:49:16.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.825956 iscsid[907]: iscsid shutting down. Feb 9 06:49:16.978313 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 9 06:49:16.978328 kernel: audit: type=1130 audit(1707461356.832:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.978336 kernel: audit: type=1131 audit(1707461356.832:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.978383 ignition[1086]: INFO : GET result: OK Feb 9 06:49:16.978383 ignition[1086]: INFO : Ignition finished successfully Feb 9 06:49:16.111910 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 06:49:16.124377 systemd[1]: Starting initrd-cleanup.service... Feb 9 06:49:16.160427 systemd[1]: Stopped target nss-lookup.target. Feb 9 06:49:17.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.177963 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 06:49:17.173324 kernel: audit: type=1131 audit(1707461357.043:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:17.173338 kernel: audit: type=1131 audit(1707461357.112:62): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:17.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.200131 systemd[1]: Stopped target timers.target. Feb 9 06:49:17.241266 kernel: audit: type=1131 audit(1707461357.180:63): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:17.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.221084 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 06:49:17.334536 kernel: audit: type=1131 audit(1707461357.247:64): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:17.334622 kernel: audit: type=1334 audit(1707461357.247:65): prog-id=6 op=UNLOAD Feb 9 06:49:17.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:17.247000 audit: BPF prog-id=6 op=UNLOAD Feb 9 06:49:16.221454 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 06:49:16.244514 systemd[1]: Stopped target initrd.target. Feb 9 06:49:17.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.264198 systemd[1]: Stopped target basic.target. Feb 9 06:49:17.485645 kernel: audit: type=1131 audit(1707461357.355:66): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:17.485656 kernel: audit: type=1131 audit(1707461357.424:67): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:17.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.284084 systemd[1]: Stopped target ignition-complete.target. Feb 9 06:49:17.554447 kernel: audit: type=1131 audit(1707461357.492:68): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:17.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.308069 systemd[1]: Stopped target ignition-diskful.target. Feb 9 06:49:17.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.333069 systemd[1]: Stopped target initrd-root-device.target. Feb 9 06:49:16.349211 systemd[1]: Stopped target remote-fs.target. Feb 9 06:49:17.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.367078 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 06:49:17.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.385100 systemd[1]: Stopped target sysinit.target. Feb 9 06:49:17.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.401231 systemd[1]: Stopped target local-fs.target. Feb 9 06:49:16.419077 systemd[1]: Stopped target local-fs-pre.target. Feb 9 06:49:17.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.434206 systemd[1]: Stopped target swap.target. Feb 9 06:49:16.450965 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 06:49:16.451326 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 06:49:17.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.474426 systemd[1]: Stopped target cryptsetup.target. Feb 9 06:49:17.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.498972 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 06:49:17.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.499329 systemd[1]: Stopped dracut-initqueue.service. Feb 9 06:49:16.515234 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 06:49:17.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.515606 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 06:49:17.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:17.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.533293 systemd[1]: Stopped target paths.target. Feb 9 06:49:16.548947 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 06:49:16.553743 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 06:49:16.564054 systemd[1]: Stopped target slices.target. Feb 9 06:49:16.579004 systemd[1]: Stopped target sockets.target. Feb 9 06:49:16.595092 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 06:49:16.595473 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 06:49:16.613201 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 06:49:16.613566 systemd[1]: Stopped ignition-files.service. Feb 9 06:49:16.628179 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 06:49:16.628559 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 06:49:16.645087 systemd[1]: Stopping ignition-mount.service... Feb 9 06:49:16.656665 systemd[1]: Stopping iscsid.service... Feb 9 06:49:16.674691 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 06:49:16.674782 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 06:49:16.690369 systemd[1]: Stopping sysroot-boot.service... Feb 9 06:49:16.703730 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 06:49:17.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:16.703799 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 06:49:16.722709 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 06:49:16.722783 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 06:49:16.754146 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 06:49:16.755074 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 06:49:16.755181 systemd[1]: Stopped iscsid.service. Feb 9 06:49:16.769989 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 06:49:16.770149 systemd[1]: Closed iscsid.socket. Feb 9 06:49:16.783928 systemd[1]: Stopping iscsiuio.service... Feb 9 06:49:16.800249 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 06:49:16.800515 systemd[1]: Stopped iscsiuio.service. Feb 9 06:49:16.818461 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 06:49:16.818698 systemd[1]: Finished initrd-cleanup.service. Feb 9 06:49:16.835712 systemd[1]: Stopped target network.target. Feb 9 06:49:16.986742 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 06:49:16.986761 systemd[1]: Closed iscsiuio.socket. Feb 9 06:49:16.999752 systemd[1]: Stopping systemd-networkd.service... Feb 9 06:49:17.007658 systemd-networkd[881]: enp1s0f0np0: DHCPv6 lease lost Feb 9 06:49:17.014725 systemd[1]: Stopping systemd-resolved.service... Feb 9 06:49:17.019636 systemd-networkd[881]: enp1s0f1np1: DHCPv6 lease lost Feb 9 06:49:18.039000 audit: BPF prog-id=9 op=UNLOAD Feb 9 06:49:17.029831 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 06:49:18.041509 systemd-journald[269]: Received SIGTERM from PID 1 (n/a). Feb 9 06:49:17.029887 systemd[1]: Stopped systemd-resolved.service. Feb 9 06:49:17.044878 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 06:49:17.044954 systemd[1]: Stopped systemd-networkd.service. Feb 9 06:49:17.114670 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 06:49:17.114711 systemd[1]: Stopped ignition-mount.service. Feb 9 06:49:17.181774 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 06:49:17.181814 systemd[1]: Stopped sysroot-boot.service. Feb 9 06:49:17.248685 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 06:49:17.248700 systemd[1]: Closed systemd-networkd.socket. Feb 9 06:49:17.342693 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 06:49:17.342715 systemd[1]: Stopped ignition-disks.service. Feb 9 06:49:17.356695 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 06:49:17.376620 systemd[1]: Stopped ignition-kargs.service. Feb 9 06:49:17.425724 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 06:49:17.425746 systemd[1]: Stopped ignition-setup.service. Feb 9 06:49:17.513582 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 06:49:17.513620 systemd[1]: Stopped initrd-setup-root.service. Feb 9 06:49:17.563157 systemd[1]: Stopping network-cleanup.service... Feb 9 06:49:17.578712 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 06:49:17.578737 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 06:49:17.592723 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 06:49:17.592821 systemd[1]: Stopped systemd-sysctl.service. Feb 9 06:49:17.607842 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 06:49:17.607884 systemd[1]: Stopped systemd-modules-load.service. Feb 9 06:49:17.623888 systemd[1]: Stopping systemd-udevd.service... Feb 9 06:49:17.639454 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 06:49:17.640096 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 06:49:17.640235 systemd[1]: Stopped systemd-udevd.service. Feb 9 06:49:17.655002 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 06:49:17.655108 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 06:49:17.667866 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 06:49:17.667966 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 06:49:17.682722 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 06:49:17.682880 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 06:49:17.698901 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 06:49:17.699021 systemd[1]: Stopped dracut-cmdline.service. Feb 9 06:49:17.713832 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 06:49:17.713951 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 06:49:17.728974 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 06:49:17.744621 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 06:49:17.744660 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 06:49:17.759995 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 06:49:17.760120 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 06:49:17.914017 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 06:49:17.914238 systemd[1]: Stopped network-cleanup.service. Feb 9 06:49:17.927985 systemd[1]: Reached target initrd-switch-root.target. Feb 9 06:49:17.947414 systemd[1]: Starting initrd-switch-root.service... Feb 9 06:49:17.984166 systemd[1]: Switching root. Feb 9 06:49:18.043098 systemd-journald[269]: Journal stopped Feb 9 06:49:21.711715 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 06:49:21.711728 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 06:49:21.711736 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 06:49:21.711742 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 06:49:21.711747 kernel: SELinux: policy capability open_perms=1 Feb 9 06:49:21.711751 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 06:49:21.711757 kernel: SELinux: policy capability always_check_network=0 Feb 9 06:49:21.711763 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 06:49:21.711768 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 06:49:21.711774 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 06:49:21.711779 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 06:49:21.711785 systemd[1]: Successfully loaded SELinux policy in 330.771ms. Feb 9 06:49:21.711792 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.991ms. Feb 9 06:49:21.711798 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 06:49:21.711806 systemd[1]: Detected architecture x86-64. Feb 9 06:49:21.711812 systemd[1]: Detected first boot. Feb 9 06:49:21.711818 systemd[1]: Hostname set to . Feb 9 06:49:21.711824 systemd[1]: Initializing machine ID from random generator. Feb 9 06:49:21.711829 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 06:49:21.711835 systemd[1]: Populated /etc with preset unit settings. Feb 9 06:49:21.711841 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 06:49:21.711848 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 06:49:21.711855 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 06:49:21.711861 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 06:49:21.711867 systemd[1]: Stopped initrd-switch-root.service. Feb 9 06:49:21.711873 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 06:49:21.711879 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 06:49:21.711886 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 06:49:21.711892 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 06:49:21.711898 systemd[1]: Created slice system-getty.slice. Feb 9 06:49:21.711904 systemd[1]: Created slice system-modprobe.slice. Feb 9 06:49:21.711910 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 06:49:21.711916 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 06:49:21.711922 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 06:49:21.711928 systemd[1]: Created slice user.slice. Feb 9 06:49:21.711934 systemd[1]: Started systemd-ask-password-console.path. Feb 9 06:49:21.711941 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 06:49:21.711947 systemd[1]: Set up automount boot.automount. Feb 9 06:49:21.711953 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 06:49:21.711959 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 06:49:21.711967 systemd[1]: Stopped target initrd-fs.target. Feb 9 06:49:21.711973 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 06:49:21.711979 systemd[1]: Reached target integritysetup.target. Feb 9 06:49:21.711985 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 06:49:21.711992 systemd[1]: Reached target remote-fs.target. Feb 9 06:49:21.711999 systemd[1]: Reached target slices.target. Feb 9 06:49:21.712005 systemd[1]: Reached target swap.target. Feb 9 06:49:21.712011 systemd[1]: Reached target torcx.target. Feb 9 06:49:21.712017 systemd[1]: Reached target veritysetup.target. Feb 9 06:49:21.712023 systemd[1]: Listening on systemd-coredump.socket. Feb 9 06:49:21.712029 systemd[1]: Listening on systemd-initctl.socket. Feb 9 06:49:21.712035 systemd[1]: Listening on systemd-networkd.socket. Feb 9 06:49:21.712043 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 06:49:21.712049 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 06:49:21.712056 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 06:49:21.712062 systemd[1]: Mounting dev-hugepages.mount... Feb 9 06:49:21.712068 systemd[1]: Mounting dev-mqueue.mount... Feb 9 06:49:21.712074 systemd[1]: Mounting media.mount... Feb 9 06:49:21.712082 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 06:49:21.712088 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 06:49:21.712094 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 06:49:21.712101 systemd[1]: Mounting tmp.mount... Feb 9 06:49:21.712107 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 06:49:21.712113 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 06:49:21.712120 systemd[1]: Starting kmod-static-nodes.service... Feb 9 06:49:21.712126 systemd[1]: Starting modprobe@configfs.service... Feb 9 06:49:21.712132 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 06:49:21.712139 systemd[1]: Starting modprobe@drm.service... Feb 9 06:49:21.712146 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 06:49:21.712152 systemd[1]: Starting modprobe@fuse.service... Feb 9 06:49:21.712158 kernel: fuse: init (API version 7.34) Feb 9 06:49:21.712164 systemd[1]: Starting modprobe@loop.service... Feb 9 06:49:21.712170 kernel: loop: module loaded Feb 9 06:49:21.712177 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 06:49:21.712183 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 06:49:21.712190 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 06:49:21.712197 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 06:49:21.712203 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 06:49:21.712209 systemd[1]: Stopped systemd-journald.service. Feb 9 06:49:21.712216 systemd[1]: Starting systemd-journald.service... Feb 9 06:49:21.712222 systemd[1]: Starting systemd-modules-load.service... Feb 9 06:49:21.712230 systemd-journald[1235]: Journal started Feb 9 06:49:21.712256 systemd-journald[1235]: Runtime Journal (/run/log/journal/9cffdf94e1e64c2980b4c57a84d96ad7) is 8.0M, max 640.1M, 632.1M free. Feb 9 06:49:18.455000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 06:49:18.732000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 06:49:18.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 06:49:18.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 06:49:18.734000 audit: BPF prog-id=10 op=LOAD Feb 9 06:49:18.735000 audit: BPF prog-id=10 op=UNLOAD Feb 9 06:49:18.735000 audit: BPF prog-id=11 op=LOAD Feb 9 06:49:18.735000 audit: BPF prog-id=11 op=UNLOAD Feb 9 06:49:18.838000 audit[1125]: AVC avc: denied { associate } for pid=1125 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 06:49:18.838000 audit[1125]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1108 pid=1125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:18.838000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 06:49:18.865000 audit[1125]: AVC avc: denied { associate } for pid=1125 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 06:49:18.865000 audit[1125]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b9 a2=1ed a3=0 items=2 ppid=1108 pid=1125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:18.865000 audit: CWD cwd="/" Feb 9 06:49:18.865000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:18.865000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:18.865000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 06:49:20.369000 audit: BPF prog-id=12 op=LOAD Feb 9 06:49:20.370000 audit: BPF prog-id=3 op=UNLOAD Feb 9 06:49:20.370000 audit: BPF prog-id=13 op=LOAD Feb 9 06:49:20.370000 audit: BPF prog-id=14 op=LOAD Feb 9 06:49:20.370000 audit: BPF prog-id=4 op=UNLOAD Feb 9 06:49:20.370000 audit: BPF prog-id=5 op=UNLOAD Feb 9 06:49:20.370000 audit: BPF prog-id=15 op=LOAD Feb 9 06:49:20.370000 audit: BPF prog-id=12 op=UNLOAD Feb 9 06:49:20.370000 audit: BPF prog-id=16 op=LOAD Feb 9 06:49:20.371000 audit: BPF prog-id=17 op=LOAD Feb 9 06:49:20.371000 audit: BPF prog-id=13 op=UNLOAD Feb 9 06:49:20.371000 audit: BPF prog-id=14 op=UNLOAD Feb 9 06:49:20.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:20.422000 audit: BPF prog-id=15 op=UNLOAD Feb 9 06:49:20.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:20.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:21.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:21.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:21.683000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:21.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:21.683000 audit: BPF prog-id=18 op=LOAD Feb 9 06:49:21.684000 audit: BPF prog-id=19 op=LOAD Feb 9 06:49:21.684000 audit: BPF prog-id=20 op=LOAD Feb 9 06:49:21.684000 audit: BPF prog-id=16 op=UNLOAD Feb 9 06:49:21.684000 audit: BPF prog-id=17 op=UNLOAD Feb 9 06:49:21.707000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 06:49:21.707000 audit[1235]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7fff62d8fd10 a2=4000 a3=7fff62d8fdac items=0 ppid=1 pid=1235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:21.707000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 06:49:20.369465 systemd[1]: Queued start job for default target multi-user.target. Feb 9 06:49:18.838098 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 06:49:20.372779 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 06:49:18.838635 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 06:49:18.838646 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 06:49:18.838663 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 06:49:18.838668 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 06:49:18.838684 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 06:49:18.838691 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 06:49:18.838795 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 06:49:18.838815 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 06:49:18.838821 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 06:49:18.839318 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 06:49:18.839336 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 06:49:18.839345 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 06:49:18.839353 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 06:49:18.839361 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 06:49:18.839368 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 06:49:20.027562 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:20Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 06:49:20.027701 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:20Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 06:49:20.027754 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:20Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 06:49:20.027843 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:20Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 06:49:20.027874 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:20Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 06:49:20.027907 /usr/lib/systemd/system-generators/torcx-generator[1125]: time="2024-02-09T06:49:20Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 06:49:21.742667 systemd[1]: Starting systemd-network-generator.service... Feb 9 06:49:21.764530 systemd[1]: Starting systemd-remount-fs.service... Feb 9 06:49:21.786526 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 06:49:21.819031 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 06:49:21.819051 systemd[1]: Stopped verity-setup.service. Feb 9 06:49:21.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:21.853541 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 06:49:21.867560 systemd[1]: Started systemd-journald.service. Feb 9 06:49:21.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:21.875997 systemd[1]: Mounted dev-hugepages.mount. Feb 9 06:49:21.889180 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 9 06:49:21.889200 kernel: audit: type=1130 audit(1707461361.874:119): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:21.935727 systemd[1]: Mounted dev-mqueue.mount. Feb 9 06:49:21.942739 systemd[1]: Mounted media.mount. Feb 9 06:49:21.949725 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 06:49:21.958731 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 06:49:21.967688 systemd[1]: Mounted tmp.mount. Feb 9 06:49:21.974780 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 06:49:21.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:21.982795 systemd[1]: Finished kmod-static-nodes.service. Feb 9 06:49:22.024620 kernel: audit: type=1130 audit(1707461361.981:120): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.032777 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 06:49:22.032844 systemd[1]: Finished modprobe@configfs.service. Feb 9 06:49:22.076658 kernel: audit: type=1130 audit(1707461362.031:121): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.084801 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 06:49:22.084860 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 06:49:22.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.130538 kernel: audit: type=1130 audit(1707461362.083:122): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.130556 kernel: audit: type=1131 audit(1707461362.083:123): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.184803 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 06:49:22.184878 systemd[1]: Finished modprobe@drm.service. Feb 9 06:49:22.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.233538 kernel: audit: type=1130 audit(1707461362.183:124): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.233572 kernel: audit: type=1131 audit(1707461362.183:125): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.289803 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 06:49:22.289880 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 06:49:22.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.340537 kernel: audit: type=1130 audit(1707461362.288:126): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.340569 kernel: audit: type=1131 audit(1707461362.288:127): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.398803 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 06:49:22.398878 systemd[1]: Finished modprobe@fuse.service. Feb 9 06:49:22.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.452678 kernel: audit: type=1130 audit(1707461362.397:128): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.461819 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 06:49:22.461879 systemd[1]: Finished modprobe@loop.service. Feb 9 06:49:22.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.471812 systemd[1]: Finished systemd-modules-load.service. Feb 9 06:49:22.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.481820 systemd[1]: Finished systemd-network-generator.service. Feb 9 06:49:22.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.491819 systemd[1]: Finished systemd-remount-fs.service. Feb 9 06:49:22.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.499788 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 06:49:22.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.507955 systemd[1]: Reached target network-pre.target. Feb 9 06:49:22.518584 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 06:49:22.528788 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 06:49:22.536684 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 06:49:22.538815 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 06:49:22.547019 systemd[1]: Starting systemd-journal-flush.service... Feb 9 06:49:22.550153 systemd-journald[1235]: Time spent on flushing to /var/log/journal/9cffdf94e1e64c2980b4c57a84d96ad7 is 14.477ms for 1589 entries. Feb 9 06:49:22.550153 systemd-journald[1235]: System Journal (/var/log/journal/9cffdf94e1e64c2980b4c57a84d96ad7) is 8.0M, max 195.6M, 187.6M free. Feb 9 06:49:22.597482 systemd-journald[1235]: Received client request to flush runtime journal. Feb 9 06:49:22.563586 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 06:49:22.564046 systemd[1]: Starting systemd-random-seed.service... Feb 9 06:49:22.581609 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 06:49:22.582102 systemd[1]: Starting systemd-sysctl.service... Feb 9 06:49:22.590311 systemd[1]: Starting systemd-sysusers.service... Feb 9 06:49:22.597095 systemd[1]: Starting systemd-udev-settle.service... Feb 9 06:49:22.604654 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 06:49:22.612669 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 06:49:22.621706 systemd[1]: Finished systemd-journal-flush.service. Feb 9 06:49:22.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.629692 systemd[1]: Finished systemd-random-seed.service. Feb 9 06:49:22.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.637726 systemd[1]: Finished systemd-sysctl.service. Feb 9 06:49:22.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.645717 systemd[1]: Finished systemd-sysusers.service. Feb 9 06:49:22.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.654677 systemd[1]: Reached target first-boot-complete.target. Feb 9 06:49:22.662845 udevadm[1251]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 06:49:22.841497 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 06:49:22.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.848000 audit: BPF prog-id=21 op=LOAD Feb 9 06:49:22.849000 audit: BPF prog-id=22 op=LOAD Feb 9 06:49:22.849000 audit: BPF prog-id=7 op=UNLOAD Feb 9 06:49:22.849000 audit: BPF prog-id=8 op=UNLOAD Feb 9 06:49:22.850835 systemd[1]: Starting systemd-udevd.service... Feb 9 06:49:22.861964 systemd-udevd[1252]: Using default interface naming scheme 'v252'. Feb 9 06:49:22.881420 systemd[1]: Started systemd-udevd.service. Feb 9 06:49:22.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:22.892743 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 06:49:22.892000 audit: BPF prog-id=23 op=LOAD Feb 9 06:49:22.894069 systemd[1]: Starting systemd-networkd.service... Feb 9 06:49:22.939222 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 06:49:22.939294 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 06:49:22.939317 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1259) Feb 9 06:49:22.966011 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 06:49:22.965000 audit: BPF prog-id=24 op=LOAD Feb 9 06:49:22.988000 audit: BPF prog-id=25 op=LOAD Feb 9 06:49:22.988000 audit: BPF prog-id=26 op=LOAD Feb 9 06:49:22.990223 systemd[1]: Starting systemd-userdbd.service... Feb 9 06:49:22.928000 audit[1311]: AVC avc: denied { confidentiality } for pid=1311 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 06:49:22.928000 audit[1311]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fbc06753010 a1=4d8bc a2=7fbc083fcbc5 a3=5 items=42 ppid=1252 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:22.928000 audit: CWD cwd="/" Feb 9 06:49:22.928000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=1 name=(null) inode=27645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=2 name=(null) inode=27645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=3 name=(null) inode=27646 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=4 name=(null) inode=27645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=5 name=(null) inode=27647 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=6 name=(null) inode=27645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=7 name=(null) inode=27648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=8 name=(null) inode=27648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=9 name=(null) inode=27649 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=10 name=(null) inode=27648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=11 name=(null) inode=27650 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=12 name=(null) inode=27648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=13 name=(null) inode=27651 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=14 name=(null) inode=27648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=15 name=(null) inode=27652 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=16 name=(null) inode=27648 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=17 name=(null) inode=27653 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=18 name=(null) inode=27645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=19 name=(null) inode=27654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=20 name=(null) inode=27654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=21 name=(null) inode=27655 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=22 name=(null) inode=27654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=23 name=(null) inode=27656 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=24 name=(null) inode=27654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=25 name=(null) inode=27657 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=26 name=(null) inode=27654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=27 name=(null) inode=27658 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=28 name=(null) inode=27654 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=29 name=(null) inode=27659 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=30 name=(null) inode=27645 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=31 name=(null) inode=27660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=32 name=(null) inode=27660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=33 name=(null) inode=27661 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=34 name=(null) inode=27660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=35 name=(null) inode=27662 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=36 name=(null) inode=27660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=37 name=(null) inode=27663 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=38 name=(null) inode=27660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=39 name=(null) inode=27664 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=40 name=(null) inode=27660 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PATH item=41 name=(null) inode=27665 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:49:22.928000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 06:49:23.009762 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 06:49:23.015571 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 06:49:23.015629 kernel: ACPI: button: Power Button [PWRF] Feb 9 06:49:23.037555 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 06:49:23.038217 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 06:49:23.038324 kernel: IPMI message handler: version 39.2 Feb 9 06:49:23.125997 systemd[1]: Started systemd-userdbd.service. Feb 9 06:49:23.144557 kernel: ipmi device interface Feb 9 06:49:23.144596 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 06:49:23.165495 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 06:49:23.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:23.188495 kernel: ipmi_si: IPMI System Interface driver Feb 9 06:49:23.229797 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 06:49:23.229946 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 06:49:23.274985 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 06:49:23.275010 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 06:49:23.296648 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 06:49:23.342491 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 06:49:23.365492 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 06:49:23.365521 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 06:49:23.412381 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 06:49:23.412491 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 06:49:23.512973 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 9 06:49:23.513083 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 06:49:23.513166 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 9 06:49:23.536491 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 9 06:49:23.596015 systemd-networkd[1300]: bond0: netdev ready Feb 9 06:49:23.598596 systemd-networkd[1300]: lo: Link UP Feb 9 06:49:23.598599 systemd-networkd[1300]: lo: Gained carrier Feb 9 06:49:23.599148 systemd-networkd[1300]: Enumeration completed Feb 9 06:49:23.599204 systemd[1]: Started systemd-networkd.service. Feb 9 06:49:23.599468 systemd-networkd[1300]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 06:49:23.603093 systemd-networkd[1300]: enp1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:97:f6:b1.network. Feb 9 06:49:23.611390 kernel: intel_rapl_common: Found RAPL domain package Feb 9 06:49:23.611416 kernel: intel_rapl_common: Found RAPL domain core Feb 9 06:49:23.611430 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 06:49:23.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:23.664491 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 06:49:23.686495 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 06:49:23.688758 systemd[1]: Finished systemd-udev-settle.service. Feb 9 06:49:23.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:23.697241 systemd[1]: Starting lvm2-activation-early.service... Feb 9 06:49:23.713026 lvm[1356]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 06:49:23.740898 systemd[1]: Finished lvm2-activation-early.service. Feb 9 06:49:23.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:23.749627 systemd[1]: Reached target cryptsetup.target. Feb 9 06:49:23.758174 systemd[1]: Starting lvm2-activation.service... Feb 9 06:49:23.760368 lvm[1357]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 06:49:23.791975 systemd[1]: Finished lvm2-activation.service. Feb 9 06:49:23.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:23.800632 systemd[1]: Reached target local-fs-pre.target. Feb 9 06:49:23.808588 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 06:49:23.808602 systemd[1]: Reached target local-fs.target. Feb 9 06:49:23.816575 systemd[1]: Reached target machines.target. Feb 9 06:49:23.825183 systemd[1]: Starting ldconfig.service... Feb 9 06:49:23.832275 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 06:49:23.832296 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 06:49:23.832823 systemd[1]: Starting systemd-boot-update.service... Feb 9 06:49:23.840002 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 06:49:23.850055 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 06:49:23.850138 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 06:49:23.850162 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 06:49:23.850637 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 06:49:23.850827 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1359 (bootctl) Feb 9 06:49:23.851407 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 06:49:23.870909 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 06:49:23.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:24.005937 systemd-tmpfiles[1363]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 06:49:24.049531 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 06:49:24.076508 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 9 06:49:24.078257 systemd-networkd[1300]: enp1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:97:f6:b0.network. Feb 9 06:49:24.144511 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 06:49:24.177240 systemd-tmpfiles[1363]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 06:49:24.224705 systemd-tmpfiles[1363]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 06:49:24.226369 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 06:49:24.227950 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 06:49:24.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:24.270506 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 9 06:49:24.270804 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 06:49:24.293393 systemd-fsck[1367]: fsck.fat 4.2 (2021-01-31) Feb 9 06:49:24.293393 systemd-fsck[1367]: /dev/sda1: 789 files, 115332/258078 clusters Feb 9 06:49:24.293582 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 9 06:49:24.301710 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 06:49:24.315496 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 06:49:24.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:24.333400 systemd[1]: Mounting boot.mount... Feb 9 06:49:24.336749 systemd-networkd[1300]: bond0: Link UP Feb 9 06:49:24.337000 systemd-networkd[1300]: enp1s0f1np1: Link UP Feb 9 06:49:24.337182 systemd-networkd[1300]: enp1s0f1np1: Gained carrier Feb 9 06:49:24.338452 systemd-networkd[1300]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:97:f6:b0.network. Feb 9 06:49:24.345051 systemd[1]: Mounted boot.mount. Feb 9 06:49:24.363114 systemd[1]: Finished systemd-boot-update.service. Feb 9 06:49:24.373490 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:24.393500 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 06:49:24.396490 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:24.412373 systemd[1]: Starting audit-rules.service... Feb 9 06:49:24.418490 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.429000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 06:49:24.429000 audit[1386]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd100d01d0 a2=420 a3=0 items=0 ppid=1371 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:24.429000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 06:49:24.431384 augenrules[1386]: No rules Feb 9 06:49:24.433194 systemd[1]: Starting clean-ca-certificates.service... Feb 9 06:49:24.439490 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.441488 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.454138 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 06:49:24.478489 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.499491 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.499691 systemd[1]: Starting systemd-resolved.service... Feb 9 06:49:24.502034 ldconfig[1358]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 06:49:24.520124 systemd[1]: Starting systemd-timesyncd.service... Feb 9 06:49:24.520546 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.534002 systemd[1]: Starting systemd-update-utmp.service... Feb 9 06:49:24.540544 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.553833 systemd[1]: Finished ldconfig.service. Feb 9 06:49:24.559515 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.572717 systemd[1]: Finished audit-rules.service. Feb 9 06:49:24.578544 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.591702 systemd[1]: Finished clean-ca-certificates.service. Feb 9 06:49:24.597537 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.611681 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 06:49:24.617533 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.635330 systemd[1]: Starting systemd-update-done.service... Feb 9 06:49:24.635490 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.649602 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 06:49:24.650007 systemd[1]: Finished systemd-update-done.service. Feb 9 06:49:24.652492 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.668870 systemd[1]: Finished systemd-update-utmp.service. Feb 9 06:49:24.669490 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.687490 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.704490 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.704521 systemd-networkd[1300]: enp1s0f0np0: Link UP Feb 9 06:49:24.704692 systemd-networkd[1300]: bond0: Gained carrier Feb 9 06:49:24.704785 systemd-networkd[1300]: enp1s0f0np0: Gained carrier Feb 9 06:49:24.737257 kernel: bond0: (slave enp1s0f1np1): link status down again after 200 ms Feb 9 06:49:24.737280 kernel: bond0: (slave enp1s0f1np1): link status definitely down, disabling slave Feb 9 06:49:24.737297 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 06:49:24.741756 systemd[1]: Started systemd-timesyncd.service. Feb 9 06:49:24.743816 systemd-resolved[1393]: Positive Trust Anchors: Feb 9 06:49:24.743823 systemd-resolved[1393]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 06:49:24.743842 systemd-resolved[1393]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 06:49:24.747852 systemd-resolved[1393]: Using system hostname 'ci-3510.3.2-a-5a64198dec'. Feb 9 06:49:24.755638 systemd-timesyncd[1394]: Network configuration changed, trying to establish connection. Feb 9 06:49:24.771364 systemd[1]: Reached target time-set.target. Feb 9 06:49:24.783726 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 06:49:24.783751 kernel: bond0: active interface up! Feb 9 06:49:24.783846 systemd-networkd[1300]: enp1s0f1np1: Link DOWN Feb 9 06:49:24.783849 systemd-networkd[1300]: enp1s0f1np1: Lost carrier Feb 9 06:49:24.784704 systemd[1]: Started systemd-resolved.service. Feb 9 06:49:24.792550 systemd[1]: Reached target network.target. Feb 9 06:49:24.800522 systemd[1]: Reached target nss-lookup.target. Feb 9 06:49:24.804686 systemd-timesyncd[1394]: Network configuration changed, trying to establish connection. Feb 9 06:49:24.804884 systemd-timesyncd[1394]: Network configuration changed, trying to establish connection. Feb 9 06:49:24.808563 systemd[1]: Reached target sysinit.target. Feb 9 06:49:24.816599 systemd[1]: Started motdgen.path. Feb 9 06:49:24.823584 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 06:49:24.833638 systemd[1]: Started logrotate.timer. Feb 9 06:49:24.840568 systemd[1]: Started mdadm.timer. Feb 9 06:49:24.847527 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 06:49:24.855520 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 06:49:24.855535 systemd[1]: Reached target paths.target. Feb 9 06:49:24.862518 systemd[1]: Reached target timers.target. Feb 9 06:49:24.869665 systemd[1]: Listening on dbus.socket. Feb 9 06:49:24.877102 systemd[1]: Starting docker.socket... Feb 9 06:49:24.884841 systemd[1]: Listening on sshd.socket. Feb 9 06:49:24.891579 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 06:49:24.891826 systemd[1]: Listening on docker.socket. Feb 9 06:49:24.898561 systemd[1]: Reached target sockets.target. Feb 9 06:49:24.904695 systemd[1]: Reached target basic.target. Feb 9 06:49:24.911548 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 06:49:24.911562 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 06:49:24.912025 systemd[1]: Starting containerd.service... Feb 9 06:49:24.918944 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 06:49:24.933035 systemd[1]: Starting coreos-metadata.service... Feb 9 06:49:24.938492 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 06:49:24.945088 systemd[1]: Starting dbus.service... Feb 9 06:49:24.945654 systemd-networkd[1300]: enp1s0f1np1: Link UP Feb 9 06:49:24.945820 systemd-timesyncd[1394]: Network configuration changed, trying to establish connection. Feb 9 06:49:24.945846 systemd-networkd[1300]: enp1s0f1np1: Gained carrier Feb 9 06:49:24.945876 systemd-timesyncd[1394]: Network configuration changed, trying to establish connection. Feb 9 06:49:24.946856 coreos-metadata[1401]: Feb 09 06:49:24.946 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 06:49:24.951082 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 06:49:24.955803 jq[1410]: false Feb 9 06:49:24.959046 systemd[1]: Starting extend-filesystems.service... Feb 9 06:49:24.959684 systemd-timesyncd[1394]: Network configuration changed, trying to establish connection. Feb 9 06:49:24.959805 systemd-timesyncd[1394]: Network configuration changed, trying to establish connection. Feb 9 06:49:24.960707 coreos-metadata[1404]: Feb 09 06:49:24.960 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 06:49:24.962732 dbus-daemon[1408]: [system] SELinux support is enabled Feb 9 06:49:24.966470 extend-filesystems[1411]: Found sda Feb 9 06:49:24.973582 extend-filesystems[1411]: Found sda1 Feb 9 06:49:24.973582 extend-filesystems[1411]: Found sda2 Feb 9 06:49:24.973582 extend-filesystems[1411]: Found sda3 Feb 9 06:49:24.973582 extend-filesystems[1411]: Found usr Feb 9 06:49:24.973582 extend-filesystems[1411]: Found sda4 Feb 9 06:49:24.973582 extend-filesystems[1411]: Found sda6 Feb 9 06:49:24.973582 extend-filesystems[1411]: Found sda7 Feb 9 06:49:24.973582 extend-filesystems[1411]: Found sda9 Feb 9 06:49:24.973582 extend-filesystems[1411]: Checking size of /dev/sda9 Feb 9 06:49:24.973582 extend-filesystems[1411]: Resized partition /dev/sda9 Feb 9 06:49:25.156566 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 9 06:49:25.156588 kernel: bond0: (slave enp1s0f1np1): link status up, enabling it in 200 ms Feb 9 06:49:25.156605 kernel: bond0: (slave enp1s0f1np1): invalid new link 3 on slave Feb 9 06:49:24.966577 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 06:49:25.156680 extend-filesystems[1422]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 06:49:24.967131 systemd[1]: Starting motdgen.service... Feb 9 06:49:24.986692 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 06:49:25.037141 systemd[1]: Starting prepare-critools.service... Feb 9 06:49:25.051054 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 06:49:25.064993 systemd[1]: Starting sshd-keygen.service... Feb 9 06:49:25.080438 systemd[1]: Starting systemd-logind.service... Feb 9 06:49:25.092600 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 06:49:25.172026 update_engine[1440]: I0209 06:49:25.148160 1440 main.cc:92] Flatcar Update Engine starting Feb 9 06:49:25.172026 update_engine[1440]: I0209 06:49:25.151620 1440 update_check_scheduler.cc:74] Next update check in 4m17s Feb 9 06:49:25.093306 systemd[1]: Starting tcsd.service... Feb 9 06:49:25.172190 jq[1441]: true Feb 9 06:49:25.100591 systemd-logind[1438]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 06:49:25.100601 systemd-logind[1438]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 06:49:25.172458 tar[1443]: ./ Feb 9 06:49:25.172458 tar[1443]: ./loopback Feb 9 06:49:25.100610 systemd-logind[1438]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 06:49:25.100742 systemd-logind[1438]: New seat seat0. Feb 9 06:49:25.104931 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 06:49:25.105384 systemd[1]: Starting update-engine.service... Feb 9 06:49:25.119465 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 06:49:25.134042 systemd[1]: Started dbus.service. Feb 9 06:49:25.150248 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 06:49:25.150351 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 06:49:25.150518 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 06:49:25.150615 systemd[1]: Finished motdgen.service. Feb 9 06:49:25.164299 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 06:49:25.164388 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 06:49:25.182375 jq[1447]: true Feb 9 06:49:25.184399 tar[1444]: crictl Feb 9 06:49:25.184713 dbus-daemon[1408]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 06:49:25.187547 tar[1443]: ./bandwidth Feb 9 06:49:25.189311 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 06:49:25.189439 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 06:49:25.190751 systemd[1]: Started systemd-logind.service. Feb 9 06:49:25.191975 env[1448]: time="2024-02-09T06:49:25.191950997Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 06:49:25.205869 systemd[1]: Started update-engine.service. Feb 9 06:49:25.206050 env[1448]: time="2024-02-09T06:49:25.206030029Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 06:49:25.206429 env[1448]: time="2024-02-09T06:49:25.206417915Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 06:49:25.207153 env[1448]: time="2024-02-09T06:49:25.207098645Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 06:49:25.207153 env[1448]: time="2024-02-09T06:49:25.207119959Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 06:49:25.208713 bash[1475]: Updated "/home/core/.ssh/authorized_keys" Feb 9 06:49:25.208830 env[1448]: time="2024-02-09T06:49:25.208732363Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 06:49:25.208830 env[1448]: time="2024-02-09T06:49:25.208748013Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 06:49:25.208830 env[1448]: time="2024-02-09T06:49:25.208759296Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 06:49:25.208830 env[1448]: time="2024-02-09T06:49:25.208768123Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 06:49:25.208929 env[1448]: time="2024-02-09T06:49:25.208829076Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 06:49:25.209005 env[1448]: time="2024-02-09T06:49:25.208992963Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 06:49:25.209109 env[1448]: time="2024-02-09T06:49:25.209094782Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 06:49:25.209139 env[1448]: time="2024-02-09T06:49:25.209109277Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 06:49:25.209163 env[1448]: time="2024-02-09T06:49:25.209146506Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 06:49:25.209163 env[1448]: time="2024-02-09T06:49:25.209159283Z" level=info msg="metadata content store policy set" policy=shared Feb 9 06:49:25.214741 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 06:49:25.215042 env[1448]: time="2024-02-09T06:49:25.215029352Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 06:49:25.215075 env[1448]: time="2024-02-09T06:49:25.215049047Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 06:49:25.215075 env[1448]: time="2024-02-09T06:49:25.215063984Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 06:49:25.215125 env[1448]: time="2024-02-09T06:49:25.215085710Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 06:49:25.215125 env[1448]: time="2024-02-09T06:49:25.215097665Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 06:49:25.215125 env[1448]: time="2024-02-09T06:49:25.215111618Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 06:49:25.215125 env[1448]: time="2024-02-09T06:49:25.215122400Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 06:49:25.215228 env[1448]: time="2024-02-09T06:49:25.215134055Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 06:49:25.215228 env[1448]: time="2024-02-09T06:49:25.215146051Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 06:49:25.215228 env[1448]: time="2024-02-09T06:49:25.215157144Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 06:49:25.215228 env[1448]: time="2024-02-09T06:49:25.215167863Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 06:49:25.215228 env[1448]: time="2024-02-09T06:49:25.215178323Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 06:49:25.215341 env[1448]: time="2024-02-09T06:49:25.215238093Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 06:49:25.215341 env[1448]: time="2024-02-09T06:49:25.215296825Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 06:49:25.215862 env[1448]: time="2024-02-09T06:49:25.215767332Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 06:49:25.215909 env[1448]: time="2024-02-09T06:49:25.215878052Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 06:49:25.215909 env[1448]: time="2024-02-09T06:49:25.215893532Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 06:49:25.215953 env[1448]: time="2024-02-09T06:49:25.215935567Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 06:49:25.215953 env[1448]: time="2024-02-09T06:49:25.215947728Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 06:49:25.215986 env[1448]: time="2024-02-09T06:49:25.215958000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 06:49:25.215986 env[1448]: time="2024-02-09T06:49:25.215969141Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 06:49:25.215986 env[1448]: time="2024-02-09T06:49:25.215981010Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 06:49:25.216063 env[1448]: time="2024-02-09T06:49:25.215992228Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 06:49:25.216063 env[1448]: time="2024-02-09T06:49:25.216003230Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 06:49:25.216063 env[1448]: time="2024-02-09T06:49:25.216013382Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 06:49:25.216063 env[1448]: time="2024-02-09T06:49:25.216025924Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 06:49:25.216141 env[1448]: time="2024-02-09T06:49:25.216126108Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 06:49:25.216163 env[1448]: time="2024-02-09T06:49:25.216139938Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 06:49:25.216163 env[1448]: time="2024-02-09T06:49:25.216151010Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 06:49:25.216163 env[1448]: time="2024-02-09T06:49:25.216160707Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 06:49:25.216211 env[1448]: time="2024-02-09T06:49:25.216172685Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 06:49:25.216211 env[1448]: time="2024-02-09T06:49:25.216184414Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 06:49:25.216211 env[1448]: time="2024-02-09T06:49:25.216198384Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 06:49:25.216254 env[1448]: time="2024-02-09T06:49:25.216225227Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 06:49:25.216430 env[1448]: time="2024-02-09T06:49:25.216387721Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 06:49:25.218308 tar[1443]: ./ptp Feb 9 06:49:25.218339 env[1448]: time="2024-02-09T06:49:25.216439105Z" level=info msg="Connect containerd service" Feb 9 06:49:25.218339 env[1448]: time="2024-02-09T06:49:25.216465435Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 06:49:25.218339 env[1448]: time="2024-02-09T06:49:25.216848766Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 06:49:25.218339 env[1448]: time="2024-02-09T06:49:25.216944255Z" level=info msg="Start subscribing containerd event" Feb 9 06:49:25.218339 env[1448]: time="2024-02-09T06:49:25.216981738Z" level=info msg="Start recovering state" Feb 9 06:49:25.218339 env[1448]: time="2024-02-09T06:49:25.217002911Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 06:49:25.218339 env[1448]: time="2024-02-09T06:49:25.217032528Z" level=info msg="Start event monitor" Feb 9 06:49:25.218339 env[1448]: time="2024-02-09T06:49:25.217043502Z" level=info msg="Start snapshots syncer" Feb 9 06:49:25.218339 env[1448]: time="2024-02-09T06:49:25.217050575Z" level=info msg="Start cni network conf syncer for default" Feb 9 06:49:25.218339 env[1448]: time="2024-02-09T06:49:25.217032584Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 06:49:25.218339 env[1448]: time="2024-02-09T06:49:25.217057089Z" level=info msg="Start streaming server" Feb 9 06:49:25.218339 env[1448]: time="2024-02-09T06:49:25.217080850Z" level=info msg="containerd successfully booted in 0.025452s" Feb 9 06:49:25.232648 systemd[1]: Started containerd.service. Feb 9 06:49:25.235490 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 06:49:25.239317 tar[1443]: ./vlan Feb 9 06:49:25.243761 systemd[1]: Started locksmithd.service. Feb 9 06:49:25.250641 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 06:49:25.250783 systemd[1]: Reached target system-config.target. Feb 9 06:49:25.258595 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 06:49:25.258723 systemd[1]: Reached target user-config.target. Feb 9 06:49:25.261230 tar[1443]: ./host-device Feb 9 06:49:25.282472 tar[1443]: ./tuning Feb 9 06:49:25.301241 tar[1443]: ./vrf Feb 9 06:49:25.302424 sshd_keygen[1437]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 06:49:25.308094 locksmithd[1485]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 06:49:25.314190 systemd[1]: Finished sshd-keygen.service. Feb 9 06:49:25.320927 tar[1443]: ./sbr Feb 9 06:49:25.321436 systemd[1]: Starting issuegen.service... Feb 9 06:49:25.328775 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 06:49:25.328857 systemd[1]: Finished issuegen.service. Feb 9 06:49:25.336394 systemd[1]: Starting systemd-user-sessions.service... Feb 9 06:49:25.340356 tar[1443]: ./tap Feb 9 06:49:25.345791 systemd[1]: Finished systemd-user-sessions.service. Feb 9 06:49:25.355394 systemd[1]: Started getty@tty1.service. Feb 9 06:49:25.362399 tar[1443]: ./dhcp Feb 9 06:49:25.364363 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 06:49:25.373652 systemd[1]: Reached target getty.target. Feb 9 06:49:25.418451 tar[1443]: ./static Feb 9 06:49:25.434276 tar[1443]: ./firewall Feb 9 06:49:25.449300 systemd[1]: Finished prepare-critools.service. Feb 9 06:49:25.458689 tar[1443]: ./macvlan Feb 9 06:49:25.480494 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 9 06:49:25.507139 extend-filesystems[1422]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 06:49:25.507139 extend-filesystems[1422]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 06:49:25.507139 extend-filesystems[1422]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 9 06:49:25.544587 extend-filesystems[1411]: Resized filesystem in /dev/sda9 Feb 9 06:49:25.544587 extend-filesystems[1411]: Found sdb Feb 9 06:49:25.559530 tar[1443]: ./dummy Feb 9 06:49:25.559530 tar[1443]: ./bridge Feb 9 06:49:25.559530 tar[1443]: ./ipvlan Feb 9 06:49:25.507641 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 06:49:25.507727 systemd[1]: Finished extend-filesystems.service. Feb 9 06:49:25.575244 tar[1443]: ./portmap Feb 9 06:49:25.595930 tar[1443]: ./host-local Feb 9 06:49:25.619935 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 06:49:26.000582 systemd-networkd[1300]: bond0: Gained IPv6LL Feb 9 06:49:26.000789 systemd-timesyncd[1394]: Network configuration changed, trying to establish connection. Feb 9 06:49:26.000918 systemd-timesyncd[1394]: Network configuration changed, trying to establish connection. Feb 9 06:49:26.001008 systemd-timesyncd[1394]: Network configuration changed, trying to establish connection. Feb 9 06:49:27.095570 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 06:49:30.141197 coreos-metadata[1404]: Feb 09 06:49:30.141 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 06:49:30.141980 coreos-metadata[1401]: Feb 09 06:49:30.141 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 06:49:30.547937 login[1504]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 06:49:30.554548 login[1505]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 06:49:30.597885 systemd-logind[1438]: New session 1 of user core. Feb 9 06:49:30.600239 systemd[1]: Created slice user-500.slice. Feb 9 06:49:30.603006 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 06:49:30.613703 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 06:49:30.614419 systemd[1]: Starting user@500.service... Feb 9 06:49:30.616347 (systemd)[1513]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:49:30.689176 systemd[1513]: Queued start job for default target default.target. Feb 9 06:49:30.689412 systemd[1513]: Reached target paths.target. Feb 9 06:49:30.689424 systemd[1513]: Reached target sockets.target. Feb 9 06:49:30.689432 systemd[1513]: Reached target timers.target. Feb 9 06:49:30.689439 systemd[1513]: Reached target basic.target. Feb 9 06:49:30.689457 systemd[1513]: Reached target default.target. Feb 9 06:49:30.689470 systemd[1513]: Startup finished in 70ms. Feb 9 06:49:30.689530 systemd[1]: Started user@500.service. Feb 9 06:49:30.690081 systemd[1]: Started session-1.scope. Feb 9 06:49:31.141519 coreos-metadata[1401]: Feb 09 06:49:31.141 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 06:49:31.141780 coreos-metadata[1404]: Feb 09 06:49:31.141 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 06:49:31.145185 coreos-metadata[1401]: Feb 09 06:49:31.145 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 06:49:31.147467 coreos-metadata[1404]: Feb 09 06:49:31.147 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Temporary failure in name resolution Feb 9 06:49:31.548872 login[1504]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 06:49:31.559778 systemd-logind[1438]: New session 2 of user core. Feb 9 06:49:31.562296 systemd[1]: Started session-2.scope. Feb 9 06:49:32.526132 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 9 06:49:32.526285 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 9 06:49:32.818256 systemd[1]: Created slice system-sshd.slice. Feb 9 06:49:32.818919 systemd[1]: Started sshd@0-139.178.90.101:22-147.75.109.163:39086.service. Feb 9 06:49:32.864942 sshd[1534]: Accepted publickey for core from 147.75.109.163 port 39086 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:49:32.866226 sshd[1534]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:49:32.871022 systemd-logind[1438]: New session 3 of user core. Feb 9 06:49:32.872207 systemd[1]: Started session-3.scope. Feb 9 06:49:32.932067 systemd[1]: Started sshd@1-139.178.90.101:22-147.75.109.163:39088.service. Feb 9 06:49:32.966784 sshd[1539]: Accepted publickey for core from 147.75.109.163 port 39088 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:49:32.967449 sshd[1539]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:49:32.969880 systemd-logind[1438]: New session 4 of user core. Feb 9 06:49:32.970316 systemd[1]: Started session-4.scope. Feb 9 06:49:33.021146 sshd[1539]: pam_unix(sshd:session): session closed for user core Feb 9 06:49:33.023437 systemd[1]: sshd@1-139.178.90.101:22-147.75.109.163:39088.service: Deactivated successfully. Feb 9 06:49:33.024005 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 06:49:33.024496 systemd-logind[1438]: Session 4 logged out. Waiting for processes to exit. Feb 9 06:49:33.025411 systemd[1]: Started sshd@2-139.178.90.101:22-147.75.109.163:39096.service. Feb 9 06:49:33.026263 systemd-logind[1438]: Removed session 4. Feb 9 06:49:33.063234 sshd[1545]: Accepted publickey for core from 147.75.109.163 port 39096 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:49:33.064138 sshd[1545]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:49:33.067278 systemd-logind[1438]: New session 5 of user core. Feb 9 06:49:33.067930 systemd[1]: Started session-5.scope. Feb 9 06:49:33.123074 sshd[1545]: pam_unix(sshd:session): session closed for user core Feb 9 06:49:33.124309 systemd[1]: sshd@2-139.178.90.101:22-147.75.109.163:39096.service: Deactivated successfully. Feb 9 06:49:33.124695 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 06:49:33.125099 systemd-logind[1438]: Session 5 logged out. Waiting for processes to exit. Feb 9 06:49:33.125587 systemd-logind[1438]: Removed session 5. Feb 9 06:49:33.145239 coreos-metadata[1401]: Feb 09 06:49:33.145 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 9 06:49:33.147673 coreos-metadata[1404]: Feb 09 06:49:33.147 INFO Fetching https://metadata.packet.net/metadata: Attempt #3 Feb 9 06:49:33.167939 coreos-metadata[1404]: Feb 09 06:49:33.167 INFO Fetch successful Feb 9 06:49:33.168632 coreos-metadata[1401]: Feb 09 06:49:33.168 INFO Fetch successful Feb 9 06:49:33.191180 systemd[1]: Finished coreos-metadata.service. Feb 9 06:49:33.191943 systemd[1]: Started packet-phone-home.service. Feb 9 06:49:33.192232 unknown[1401]: wrote ssh authorized keys file for user: core Feb 9 06:49:33.197405 curl[1553]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 06:49:33.197603 curl[1553]: Dload Upload Total Spent Left Speed Feb 9 06:49:33.203245 update-ssh-keys[1554]: Updated "/home/core/.ssh/authorized_keys" Feb 9 06:49:33.203496 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 06:49:33.203701 systemd[1]: Reached target multi-user.target. Feb 9 06:49:33.204284 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 06:49:33.208207 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 06:49:33.208277 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 06:49:33.208377 systemd[1]: Startup finished in 1.852s (kernel) + 19.270s (initrd) + 15.105s (userspace) = 36.227s. Feb 9 06:49:33.424981 curl[1553]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 06:49:33.427438 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 06:49:43.132879 systemd[1]: Started sshd@3-139.178.90.101:22-147.75.109.163:46102.service. Feb 9 06:49:43.168500 sshd[1557]: Accepted publickey for core from 147.75.109.163 port 46102 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:49:43.169658 sshd[1557]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:49:43.173284 systemd-logind[1438]: New session 6 of user core. Feb 9 06:49:43.174082 systemd[1]: Started session-6.scope. Feb 9 06:49:43.231577 sshd[1557]: pam_unix(sshd:session): session closed for user core Feb 9 06:49:43.233245 systemd[1]: sshd@3-139.178.90.101:22-147.75.109.163:46102.service: Deactivated successfully. Feb 9 06:49:43.233619 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 06:49:43.233998 systemd-logind[1438]: Session 6 logged out. Waiting for processes to exit. Feb 9 06:49:43.234632 systemd[1]: Started sshd@4-139.178.90.101:22-147.75.109.163:46106.service. Feb 9 06:49:43.235184 systemd-logind[1438]: Removed session 6. Feb 9 06:49:43.269906 sshd[1563]: Accepted publickey for core from 147.75.109.163 port 46106 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:49:43.270931 sshd[1563]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:49:43.274490 systemd-logind[1438]: New session 7 of user core. Feb 9 06:49:43.275274 systemd[1]: Started session-7.scope. Feb 9 06:49:43.331173 sshd[1563]: pam_unix(sshd:session): session closed for user core Feb 9 06:49:43.332841 systemd[1]: sshd@4-139.178.90.101:22-147.75.109.163:46106.service: Deactivated successfully. Feb 9 06:49:43.333145 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 06:49:43.333417 systemd-logind[1438]: Session 7 logged out. Waiting for processes to exit. Feb 9 06:49:43.333926 systemd[1]: Started sshd@5-139.178.90.101:22-147.75.109.163:46108.service. Feb 9 06:49:43.334313 systemd-logind[1438]: Removed session 7. Feb 9 06:49:43.369598 sshd[1569]: Accepted publickey for core from 147.75.109.163 port 46108 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:49:43.370694 sshd[1569]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:49:43.374746 systemd-logind[1438]: New session 8 of user core. Feb 9 06:49:43.375667 systemd[1]: Started session-8.scope. Feb 9 06:49:43.445135 sshd[1569]: pam_unix(sshd:session): session closed for user core Feb 9 06:49:43.451687 systemd[1]: sshd@5-139.178.90.101:22-147.75.109.163:46108.service: Deactivated successfully. Feb 9 06:49:43.452489 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 06:49:43.452925 systemd-logind[1438]: Session 8 logged out. Waiting for processes to exit. Feb 9 06:49:43.453360 systemd[1]: Started sshd@6-139.178.90.101:22-147.75.109.163:46110.service. Feb 9 06:49:43.453845 systemd-logind[1438]: Removed session 8. Feb 9 06:49:43.488958 sshd[1575]: Accepted publickey for core from 147.75.109.163 port 46110 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:49:43.491855 sshd[1575]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:49:43.501434 systemd-logind[1438]: New session 9 of user core. Feb 9 06:49:43.503616 systemd[1]: Started session-9.scope. Feb 9 06:49:43.598906 sudo[1579]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 06:49:43.599518 sudo[1579]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 06:49:43.620899 dbus-daemon[1408]: Э\xfeO\x94U: received setenforce notice (enforcing=-1766659648) Feb 9 06:49:43.625729 sudo[1579]: pam_unix(sudo:session): session closed for user root Feb 9 06:49:43.630702 sshd[1575]: pam_unix(sshd:session): session closed for user core Feb 9 06:49:43.637459 systemd[1]: sshd@6-139.178.90.101:22-147.75.109.163:46110.service: Deactivated successfully. Feb 9 06:49:43.639064 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 06:49:43.640812 systemd-logind[1438]: Session 9 logged out. Waiting for processes to exit. Feb 9 06:49:43.643556 systemd[1]: Started sshd@7-139.178.90.101:22-147.75.109.163:46112.service. Feb 9 06:49:43.645989 systemd-logind[1438]: Removed session 9. Feb 9 06:49:43.713690 sshd[1583]: Accepted publickey for core from 147.75.109.163 port 46112 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:49:43.716539 sshd[1583]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:49:43.725741 systemd-logind[1438]: New session 10 of user core. Feb 9 06:49:43.727952 systemd[1]: Started session-10.scope. Feb 9 06:49:43.800334 sudo[1587]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 06:49:43.800482 sudo[1587]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 06:49:43.802091 sudo[1587]: pam_unix(sudo:session): session closed for user root Feb 9 06:49:43.804375 sudo[1586]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 06:49:43.804482 sudo[1586]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 06:49:43.809664 systemd[1]: Stopping audit-rules.service... Feb 9 06:49:43.808000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 06:49:43.810465 auditctl[1590]: No rules Feb 9 06:49:43.810649 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 06:49:43.810736 systemd[1]: Stopped audit-rules.service. Feb 9 06:49:43.811512 systemd[1]: Starting audit-rules.service... Feb 9 06:49:43.815896 kernel: kauditd_printk_skb: 82 callbacks suppressed Feb 9 06:49:43.815935 kernel: audit: type=1305 audit(1707461383.808:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 06:49:43.821340 augenrules[1607]: No rules Feb 9 06:49:43.821496 systemd[1]: Finished audit-rules.service. Feb 9 06:49:43.822007 sudo[1586]: pam_unix(sudo:session): session closed for user root Feb 9 06:49:43.822831 sshd[1583]: pam_unix(sshd:session): session closed for user core Feb 9 06:49:43.824541 systemd[1]: sshd@7-139.178.90.101:22-147.75.109.163:46112.service: Deactivated successfully. Feb 9 06:49:43.824869 systemd[1]: session-10.scope: Deactivated successfully. Feb 9 06:49:43.825179 systemd-logind[1438]: Session 10 logged out. Waiting for processes to exit. Feb 9 06:49:43.825738 systemd[1]: Started sshd@8-139.178.90.101:22-147.75.109.163:46116.service. Feb 9 06:49:43.826143 systemd-logind[1438]: Removed session 10. Feb 9 06:49:43.808000 audit[1590]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffec94d6420 a2=420 a3=0 items=0 ppid=1 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:43.862489 kernel: audit: type=1300 audit(1707461383.808:164): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffec94d6420 a2=420 a3=0 items=0 ppid=1 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:43.862565 kernel: audit: type=1327 audit(1707461383.808:164): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 06:49:43.808000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 06:49:43.872030 kernel: audit: type=1131 audit(1707461383.809:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:43.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:43.894576 kernel: audit: type=1130 audit(1707461383.820:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:43.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:43.901511 sshd[1613]: Accepted publickey for core from 147.75.109.163 port 46116 ssh2: RSA SHA256:iyCj5yVZK3Ynnwi357zQkTbtqc3nOk8lkuinqpwqTo0 Feb 9 06:49:43.903799 sshd[1613]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 06:49:43.905987 systemd-logind[1438]: New session 11 of user core. Feb 9 06:49:43.906364 systemd[1]: Started session-11.scope. Feb 9 06:49:43.917075 kernel: audit: type=1106 audit(1707461383.820:167): pid=1586 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:49:43.820000 audit[1586]: USER_END pid=1586 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:49:43.943144 kernel: audit: type=1104 audit(1707461383.820:168): pid=1586 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:49:43.820000 audit[1586]: CRED_DISP pid=1586 uid=500 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:49:43.953704 sudo[1616]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 06:49:43.953811 sudo[1616]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 06:49:43.966804 kernel: audit: type=1106 audit(1707461383.821:169): pid=1583 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:43.821000 audit[1583]: USER_END pid=1583 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:43.999063 kernel: audit: type=1104 audit(1707461383.822:170): pid=1583 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:43.822000 audit[1583]: CRED_DISP pid=1583 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:44.025165 kernel: audit: type=1131 audit(1707461383.823:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.101:22-147.75.109.163:46112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:43.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.101:22-147.75.109.163:46112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:43.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.101:22-147.75.109.163:46116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:43.899000 audit[1613]: USER_ACCT pid=1613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:43.902000 audit[1613]: CRED_ACQ pid=1613 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:43.902000 audit[1613]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9b4257c0 a2=3 a3=0 items=0 ppid=1 pid=1613 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:43.902000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 06:49:43.906000 audit[1613]: USER_START pid=1613 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:43.907000 audit[1615]: CRED_ACQ pid=1615 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:43.952000 audit[1616]: USER_ACCT pid=1616 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:49:43.952000 audit[1616]: CRED_REFR pid=1616 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:49:43.953000 audit[1616]: USER_START pid=1616 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:49:48.012404 systemd[1]: Reloading. Feb 9 06:49:48.047009 /usr/lib/systemd/system-generators/torcx-generator[1646]: time="2024-02-09T06:49:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 06:49:48.047027 /usr/lib/systemd/system-generators/torcx-generator[1646]: time="2024-02-09T06:49:48Z" level=info msg="torcx already run" Feb 9 06:49:48.104060 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 06:49:48.104070 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 06:49:48.117930 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 06:49:48.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.161000 audit: BPF prog-id=34 op=LOAD Feb 9 06:49:48.161000 audit: BPF prog-id=28 op=UNLOAD Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit: BPF prog-id=35 op=LOAD Feb 9 06:49:48.162000 audit: BPF prog-id=32 op=UNLOAD Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit: BPF prog-id=36 op=LOAD Feb 9 06:49:48.163000 audit: BPF prog-id=29 op=UNLOAD Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit: BPF prog-id=37 op=LOAD Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit: BPF prog-id=38 op=LOAD Feb 9 06:49:48.163000 audit: BPF prog-id=30 op=UNLOAD Feb 9 06:49:48.163000 audit: BPF prog-id=31 op=UNLOAD Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit: BPF prog-id=39 op=LOAD Feb 9 06:49:48.163000 audit: BPF prog-id=18 op=UNLOAD Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit: BPF prog-id=40 op=LOAD Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit: BPF prog-id=41 op=LOAD Feb 9 06:49:48.164000 audit: BPF prog-id=19 op=UNLOAD Feb 9 06:49:48.164000 audit: BPF prog-id=20 op=UNLOAD Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit: BPF prog-id=42 op=LOAD Feb 9 06:49:48.164000 audit: BPF prog-id=24 op=UNLOAD Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit: BPF prog-id=43 op=LOAD Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit: BPF prog-id=44 op=LOAD Feb 9 06:49:48.165000 audit: BPF prog-id=25 op=UNLOAD Feb 9 06:49:48.165000 audit: BPF prog-id=26 op=UNLOAD Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit: BPF prog-id=45 op=LOAD Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.165000 audit: BPF prog-id=46 op=LOAD Feb 9 06:49:48.165000 audit: BPF prog-id=21 op=UNLOAD Feb 9 06:49:48.165000 audit: BPF prog-id=22 op=UNLOAD Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit: BPF prog-id=47 op=LOAD Feb 9 06:49:48.166000 audit: BPF prog-id=23 op=UNLOAD Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.166000 audit: BPF prog-id=48 op=LOAD Feb 9 06:49:48.166000 audit: BPF prog-id=27 op=UNLOAD Feb 9 06:49:48.172263 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 06:49:48.175920 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 06:49:48.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:48.176171 systemd[1]: Reached target network-online.target. Feb 9 06:49:48.176827 systemd[1]: Started kubelet.service. Feb 9 06:49:48.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:48.201947 kubelet[1706]: E0209 06:49:48.201877 1706 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 06:49:48.203250 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 06:49:48.203316 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 06:49:48.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 06:49:48.529998 systemd[1]: Stopped kubelet.service. Feb 9 06:49:48.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:48.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:48.553382 systemd[1]: Reloading. Feb 9 06:49:48.604029 /usr/lib/systemd/system-generators/torcx-generator[1814]: time="2024-02-09T06:49:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 06:49:48.604052 /usr/lib/systemd/system-generators/torcx-generator[1814]: time="2024-02-09T06:49:48Z" level=info msg="torcx already run" Feb 9 06:49:48.652115 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 06:49:48.652122 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 06:49:48.662970 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit: BPF prog-id=49 op=LOAD Feb 9 06:49:48.706000 audit: BPF prog-id=34 op=UNLOAD Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.706000 audit: BPF prog-id=50 op=LOAD Feb 9 06:49:48.706000 audit: BPF prog-id=35 op=UNLOAD Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit: BPF prog-id=51 op=LOAD Feb 9 06:49:48.707000 audit: BPF prog-id=36 op=UNLOAD Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit: BPF prog-id=52 op=LOAD Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit: BPF prog-id=53 op=LOAD Feb 9 06:49:48.708000 audit: BPF prog-id=37 op=UNLOAD Feb 9 06:49:48.708000 audit: BPF prog-id=38 op=UNLOAD Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit: BPF prog-id=54 op=LOAD Feb 9 06:49:48.708000 audit: BPF prog-id=39 op=UNLOAD Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit: BPF prog-id=55 op=LOAD Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.708000 audit: BPF prog-id=56 op=LOAD Feb 9 06:49:48.708000 audit: BPF prog-id=40 op=UNLOAD Feb 9 06:49:48.708000 audit: BPF prog-id=41 op=UNLOAD Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit: BPF prog-id=57 op=LOAD Feb 9 06:49:48.709000 audit: BPF prog-id=42 op=UNLOAD Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit: BPF prog-id=58 op=LOAD Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit: BPF prog-id=59 op=LOAD Feb 9 06:49:48.710000 audit: BPF prog-id=43 op=UNLOAD Feb 9 06:49:48.710000 audit: BPF prog-id=44 op=UNLOAD Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit: BPF prog-id=60 op=LOAD Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.710000 audit: BPF prog-id=61 op=LOAD Feb 9 06:49:48.710000 audit: BPF prog-id=45 op=UNLOAD Feb 9 06:49:48.710000 audit: BPF prog-id=46 op=UNLOAD Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit: BPF prog-id=62 op=LOAD Feb 9 06:49:48.711000 audit: BPF prog-id=47 op=UNLOAD Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:48.712000 audit: BPF prog-id=63 op=LOAD Feb 9 06:49:48.712000 audit: BPF prog-id=48 op=UNLOAD Feb 9 06:49:48.719967 systemd[1]: Started kubelet.service. Feb 9 06:49:48.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:48.743055 kubelet[1872]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 06:49:48.743055 kubelet[1872]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 06:49:48.743055 kubelet[1872]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 06:49:48.743055 kubelet[1872]: I0209 06:49:48.743039 1872 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 06:49:49.063234 kubelet[1872]: I0209 06:49:49.063192 1872 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 06:49:49.063234 kubelet[1872]: I0209 06:49:49.063204 1872 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 06:49:49.063349 kubelet[1872]: I0209 06:49:49.063309 1872 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 06:49:49.064293 kubelet[1872]: I0209 06:49:49.064255 1872 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 06:49:49.083333 kubelet[1872]: I0209 06:49:49.083284 1872 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 06:49:49.083407 kubelet[1872]: I0209 06:49:49.083387 1872 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 06:49:49.083432 kubelet[1872]: I0209 06:49:49.083427 1872 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 06:49:49.083484 kubelet[1872]: I0209 06:49:49.083438 1872 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 06:49:49.083484 kubelet[1872]: I0209 06:49:49.083444 1872 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 06:49:49.083558 kubelet[1872]: I0209 06:49:49.083518 1872 state_mem.go:36] "Initialized new in-memory state store" Feb 9 06:49:49.085638 kubelet[1872]: I0209 06:49:49.085608 1872 kubelet.go:405] "Attempting to sync node with API server" Feb 9 06:49:49.085638 kubelet[1872]: I0209 06:49:49.085635 1872 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 06:49:49.085710 kubelet[1872]: I0209 06:49:49.085644 1872 kubelet.go:309] "Adding apiserver pod source" Feb 9 06:49:49.085710 kubelet[1872]: I0209 06:49:49.085652 1872 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 06:49:49.085710 kubelet[1872]: E0209 06:49:49.085705 1872 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:49:49.085710 kubelet[1872]: E0209 06:49:49.085706 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:49:49.085947 kubelet[1872]: I0209 06:49:49.085938 1872 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 06:49:49.086110 kubelet[1872]: W0209 06:49:49.086104 1872 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 06:49:49.086365 kubelet[1872]: I0209 06:49:49.086359 1872 server.go:1168] "Started kubelet" Feb 9 06:49:49.086415 kubelet[1872]: I0209 06:49:49.086409 1872 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 06:49:49.086415 kubelet[1872]: I0209 06:49:49.086410 1872 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 06:49:49.086567 kubelet[1872]: E0209 06:49:49.086556 1872 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 06:49:49.086601 kubelet[1872]: E0209 06:49:49.086571 1872 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 06:49:49.086996 kubelet[1872]: I0209 06:49:49.086961 1872 server.go:461] "Adding debug handlers to kubelet server" Feb 9 06:49:49.085000 audit[1872]: AVC avc: denied { mac_admin } for pid=1872 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:49.087126 kubelet[1872]: I0209 06:49:49.087065 1872 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 06:49:49.087126 kubelet[1872]: I0209 06:49:49.087083 1872 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 06:49:49.087126 kubelet[1872]: I0209 06:49:49.087112 1872 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 06:49:49.087183 kubelet[1872]: I0209 06:49:49.087163 1872 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 06:49:49.087200 kubelet[1872]: E0209 06:49:49.087180 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:49.087218 kubelet[1872]: I0209 06:49:49.087213 1872 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 06:49:49.092679 kernel: kauditd_printk_skb: 361 callbacks suppressed Feb 9 06:49:49.092717 kernel: audit: type=1400 audit(1707461389.085:531): avc: denied { mac_admin } for pid=1872 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:49.097349 kubelet[1872]: I0209 06:49:49.097337 1872 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 06:49:49.097349 kubelet[1872]: I0209 06:49:49.097348 1872 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 06:49:49.097422 kubelet[1872]: I0209 06:49:49.097355 1872 state_mem.go:36] "Initialized new in-memory state store" Feb 9 06:49:49.098096 kubelet[1872]: I0209 06:49:49.098090 1872 policy_none.go:49] "None policy: Start" Feb 9 06:49:49.098344 kubelet[1872]: I0209 06:49:49.098338 1872 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 06:49:49.098372 kubelet[1872]: I0209 06:49:49.098348 1872 state_mem.go:35] "Initializing new in-memory state store" Feb 9 06:49:49.101061 systemd[1]: Created slice kubepods.slice. Feb 9 06:49:49.103283 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 06:49:49.104896 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 06:49:49.085000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 06:49:49.114890 kubelet[1872]: W0209 06:49:49.114841 1872 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 06:49:49.114890 kubelet[1872]: W0209 06:49:49.114847 1872 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.67.80.25" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 06:49:49.114890 kubelet[1872]: E0209 06:49:49.114857 1872 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 06:49:49.114890 kubelet[1872]: E0209 06:49:49.114886 1872 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.67.80.25" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 06:49:49.114989 kubelet[1872]: E0209 06:49:49.114897 1872 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.80.25\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 9 06:49:49.114989 kubelet[1872]: W0209 06:49:49.114897 1872 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 06:49:49.114989 kubelet[1872]: E0209 06:49:49.114911 1872 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 06:49:49.115037 kubelet[1872]: E0209 06:49:49.114854 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163c2fd7d8", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 86349272, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 86349272, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.126342 kernel: audit: type=1401 audit(1707461389.085:531): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 06:49:49.126368 kernel: audit: type=1300 audit(1707461389.085:531): arch=c000003e syscall=188 success=no exit=-22 a0=c0009741e0 a1=c0005f6570 a2=c0009741b0 a3=25 items=0 ppid=1 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.085000 audit[1872]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009741e0 a1=c0005f6570 a2=c0009741b0 a3=25 items=0 ppid=1 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.126427 kubelet[1872]: E0209 06:49:49.126394 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163c332675", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 86566005, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 86566005, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.187900 kubelet[1872]: I0209 06:49:49.187859 1872 kubelet_node_status.go:70] "Attempting to register node" node="10.67.80.25" Feb 9 06:49:49.191937 kernel: audit: type=1327 audit(1707461389.085:531): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 06:49:49.085000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 06:49:49.192038 kubelet[1872]: E0209 06:49:49.191994 1872 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.80.25" Feb 9 06:49:49.192038 kubelet[1872]: E0209 06:49:49.191990 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163cd2f4aa", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.80.25 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97039018, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97039018, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.272788 kernel: audit: type=1400 audit(1707461389.085:532): avc: denied { mac_admin } for pid=1872 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:49.085000 audit[1872]: AVC avc: denied { mac_admin } for pid=1872 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:49.272845 kubelet[1872]: E0209 06:49:49.272784 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163cd33d73", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.80.25 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97057651, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97057651, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.330005 kernel: audit: type=1401 audit(1707461389.085:532): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 06:49:49.085000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 06:49:49.330069 kubelet[1872]: E0209 06:49:49.330021 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163cd34396", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.80.25 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97059222, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97059222, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.330069 kubelet[1872]: E0209 06:49:49.330048 1872 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.80.25\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 9 06:49:49.359788 kernel: audit: type=1300 audit(1707461389.085:532): arch=c000003e syscall=188 success=no exit=-22 a0=c0002c74e0 a1=c0005f6588 a2=c000974270 a3=25 items=0 ppid=1 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.085000 audit[1872]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0002c74e0 a1=c0005f6588 a2=c000974270 a3=25 items=0 ppid=1 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.359857 kubelet[1872]: E0209 06:49:49.359817 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163cd2f4aa", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.80.25 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97039018, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 187842882, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.25.17b21f163cd2f4aa" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.392511 kubelet[1872]: I0209 06:49:49.392472 1872 kubelet_node_status.go:70] "Attempting to register node" node="10.67.80.25" Feb 9 06:49:49.448903 kernel: audit: type=1327 audit(1707461389.085:532): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 06:49:49.085000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 06:49:49.449002 kubelet[1872]: E0209 06:49:49.448965 1872 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.80.25" Feb 9 06:49:49.449002 kubelet[1872]: E0209 06:49:49.448966 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163cd33d73", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.80.25 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97057651, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 187845039, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.25.17b21f163cd33d73" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.538214 kubelet[1872]: E0209 06:49:49.538149 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163cd34396", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.80.25 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97059222, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 187847098, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.25.17b21f163cd34396" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.537000 audit[1901]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:49:49.540984 kubelet[1872]: I0209 06:49:49.540976 1872 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 06:49:49.541023 kubelet[1872]: I0209 06:49:49.541005 1872 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 06:49:49.541147 kubelet[1872]: I0209 06:49:49.541112 1872 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 06:49:49.541334 kubelet[1872]: E0209 06:49:49.541300 1872 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.80.25\" not found" Feb 9 06:49:49.537000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdcbbf5020 a2=0 a3=7ffdcbbf500c items=0 ppid=1872 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.595343 kubelet[1872]: E0209 06:49:49.595315 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163cd2f4aa", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.80.25 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97039018, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 392455832, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.25.17b21f163cd2f4aa" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.690562 kernel: audit: type=1325 audit(1707461389.537:533): table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:49:49.690587 kernel: audit: type=1300 audit(1707461389.537:533): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdcbbf5020 a2=0 a3=7ffdcbbf500c items=0 ppid=1872 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 06:49:49.537000 audit[1904]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1904 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:49:49.537000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff608c1660 a2=0 a3=7fff608c164c items=0 ppid=1872 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 06:49:49.539000 audit[1872]: AVC avc: denied { mac_admin } for pid=1872 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:49.539000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 06:49:49.539000 audit[1872]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d568a0 a1=c000d4a888 a2=c000d56870 a3=25 items=0 ppid=1 pid=1872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.539000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 06:49:49.690771 kubelet[1872]: E0209 06:49:49.690563 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163cd33d73", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.80.25 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97057651, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 392458367, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.25.17b21f163cd33d73" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.692200 kubelet[1872]: E0209 06:49:49.692155 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163cd34396", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.80.25 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97059222, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 392459539, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.25.17b21f163cd34396" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.693557 kubelet[1872]: E0209 06:49:49.693526 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f165754b3e4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 541749732, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 541749732, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.538000 audit[1906]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:49:49.538000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd837709b0 a2=0 a3=7ffd8377099c items=0 ppid=1872 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.538000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 06:49:49.706000 audit[1911]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:49:49.706000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc3f00e690 a2=0 a3=7ffc3f00e67c items=0 ppid=1872 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.706000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 06:49:49.732048 kubelet[1872]: E0209 06:49:49.732007 1872 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.80.25\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 9 06:49:49.731000 audit[1916]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:49:49.731000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc84e39f20 a2=0 a3=7ffc84e39f0c items=0 ppid=1872 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 06:49:49.733584 kubelet[1872]: I0209 06:49:49.733559 1872 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 06:49:49.732000 audit[1917]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:49:49.732000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc0c0e3400 a2=0 a3=7ffc0c0e33ec items=0 ppid=1872 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 06:49:49.734054 kubelet[1872]: I0209 06:49:49.734048 1872 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 06:49:49.732000 audit[1918]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:49:49.732000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1c3fd5c0 a2=0 a3=7ffc1c3fd5ac items=0 ppid=1872 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 06:49:49.734140 kubelet[1872]: I0209 06:49:49.734061 1872 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 06:49:49.734140 kubelet[1872]: I0209 06:49:49.734072 1872 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 06:49:49.734140 kubelet[1872]: E0209 06:49:49.734098 1872 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 06:49:49.733000 audit[1919]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:49:49.733000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0d95daf0 a2=0 a3=7ffe0d95dadc items=0 ppid=1872 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.733000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 06:49:49.733000 audit[1920]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:49:49.733000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc3e171440 a2=0 a3=7ffc3e17142c items=0 ppid=1872 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.733000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 06:49:49.733000 audit[1921]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:49:49.733000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffd3a9e980 a2=0 a3=7fffd3a9e96c items=0 ppid=1872 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.733000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 06:49:49.733000 audit[1922]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:49:49.733000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc54d25c40 a2=0 a3=7ffc54d25c2c items=0 ppid=1872 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.733000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 06:49:49.733000 audit[1923]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:49:49.733000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe586a9480 a2=0 a3=7ffe586a946c items=0 ppid=1872 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:49.733000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 06:49:49.735530 kubelet[1872]: W0209 06:49:49.735481 1872 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 06:49:49.735530 kubelet[1872]: E0209 06:49:49.735497 1872 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 06:49:49.851543 kubelet[1872]: I0209 06:49:49.851302 1872 kubelet_node_status.go:70] "Attempting to register node" node="10.67.80.25" Feb 9 06:49:49.853031 kubelet[1872]: E0209 06:49:49.852958 1872 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.80.25" Feb 9 06:49:49.853031 kubelet[1872]: E0209 06:49:49.852897 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163cd2f4aa", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.80.25 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97039018, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 851205625, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.25.17b21f163cd2f4aa" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.854430 kubelet[1872]: E0209 06:49:49.854279 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163cd33d73", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.80.25 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97057651, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 851233940, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.25.17b21f163cd33d73" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.855724 kubelet[1872]: E0209 06:49:49.855578 1872 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25.17b21f163cd34396", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.25", UID:"10.67.80.25", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.80.25 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.25"}, FirstTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 97059222, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 6, 49, 49, 851245301, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.25.17b21f163cd34396" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 06:49:49.921082 kubelet[1872]: W0209 06:49:49.920984 1872 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 06:49:49.921082 kubelet[1872]: E0209 06:49:49.921051 1872 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 06:49:49.995153 kubelet[1872]: W0209 06:49:49.995056 1872 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.67.80.25" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 06:49:49.995153 kubelet[1872]: E0209 06:49:49.995119 1872 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.67.80.25" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 06:49:50.064413 kubelet[1872]: I0209 06:49:50.064296 1872 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 06:49:50.086949 kubelet[1872]: E0209 06:49:50.086854 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:49:50.485609 kubelet[1872]: E0209 06:49:50.485483 1872 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.67.80.25" not found Feb 9 06:49:50.541859 kubelet[1872]: E0209 06:49:50.541764 1872 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.67.80.25\" not found" node="10.67.80.25" Feb 9 06:49:50.654439 kubelet[1872]: I0209 06:49:50.654338 1872 kubelet_node_status.go:70] "Attempting to register node" node="10.67.80.25" Feb 9 06:49:50.661821 kubelet[1872]: I0209 06:49:50.661720 1872 kubelet_node_status.go:73] "Successfully registered node" node="10.67.80.25" Feb 9 06:49:50.673734 kubelet[1872]: E0209 06:49:50.673658 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:50.747052 sudo[1616]: pam_unix(sudo:session): session closed for user root Feb 9 06:49:50.745000 audit[1616]: USER_END pid=1616 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:49:50.745000 audit[1616]: CRED_DISP pid=1616 uid=500 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 06:49:50.750034 sshd[1613]: pam_unix(sshd:session): session closed for user core Feb 9 06:49:50.751000 audit[1613]: USER_END pid=1613 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:50.751000 audit[1613]: CRED_DISP pid=1613 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 06:49:50.755845 systemd[1]: sshd@8-139.178.90.101:22-147.75.109.163:46116.service: Deactivated successfully. Feb 9 06:49:50.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.101:22-147.75.109.163:46116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:49:50.757600 systemd[1]: session-11.scope: Deactivated successfully. Feb 9 06:49:50.759334 systemd-logind[1438]: Session 11 logged out. Waiting for processes to exit. Feb 9 06:49:50.761452 systemd-logind[1438]: Removed session 11. Feb 9 06:49:50.774638 kubelet[1872]: E0209 06:49:50.774593 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:50.875254 kubelet[1872]: E0209 06:49:50.875134 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:50.976395 kubelet[1872]: E0209 06:49:50.976289 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:51.077508 kubelet[1872]: E0209 06:49:51.077261 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:51.087755 kubelet[1872]: E0209 06:49:51.087658 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:49:51.177771 kubelet[1872]: E0209 06:49:51.177654 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:51.277894 kubelet[1872]: E0209 06:49:51.277786 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:51.378149 kubelet[1872]: E0209 06:49:51.377928 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:51.479145 kubelet[1872]: E0209 06:49:51.479027 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:51.579788 kubelet[1872]: E0209 06:49:51.579667 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:51.680303 kubelet[1872]: E0209 06:49:51.680183 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:51.780693 kubelet[1872]: E0209 06:49:51.780588 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:51.881798 kubelet[1872]: E0209 06:49:51.881694 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:51.983172 kubelet[1872]: E0209 06:49:51.982941 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:52.083778 kubelet[1872]: E0209 06:49:52.083662 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:52.088212 kubelet[1872]: E0209 06:49:52.088115 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:49:52.184734 kubelet[1872]: E0209 06:49:52.184613 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:52.284980 kubelet[1872]: E0209 06:49:52.284763 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:52.386050 kubelet[1872]: E0209 06:49:52.385950 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:52.486425 kubelet[1872]: E0209 06:49:52.486304 1872 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.25\" not found" Feb 9 06:49:52.588799 kubelet[1872]: I0209 06:49:52.588593 1872 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 06:49:52.589477 env[1448]: time="2024-02-09T06:49:52.589330230Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 06:49:52.590186 kubelet[1872]: I0209 06:49:52.589793 1872 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 06:49:53.088758 kubelet[1872]: E0209 06:49:53.088657 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:49:53.088758 kubelet[1872]: I0209 06:49:53.088676 1872 apiserver.go:52] "Watching apiserver" Feb 9 06:49:53.094361 kubelet[1872]: I0209 06:49:53.094264 1872 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:49:53.094590 kubelet[1872]: I0209 06:49:53.094478 1872 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:49:53.094743 kubelet[1872]: I0209 06:49:53.094707 1872 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:49:53.095452 kubelet[1872]: E0209 06:49:53.095383 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:49:53.106636 systemd[1]: Created slice kubepods-besteffort-pod3c5d52df_8428_4020_96e3_87b7ca0625e6.slice. Feb 9 06:49:53.118677 systemd[1]: Created slice kubepods-besteffort-podb4e0a16e_7254_431f_8ca7_8425cc87998b.slice. Feb 9 06:49:53.189274 kubelet[1872]: I0209 06:49:53.189174 1872 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 06:49:53.211929 kubelet[1872]: I0209 06:49:53.211831 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3c5d52df-8428-4020-96e3-87b7ca0625e6-cni-net-dir\") pod \"calico-node-9468p\" (UID: \"3c5d52df-8428-4020-96e3-87b7ca0625e6\") " pod="calico-system/calico-node-9468p" Feb 9 06:49:53.212184 kubelet[1872]: I0209 06:49:53.212035 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3c5d52df-8428-4020-96e3-87b7ca0625e6-flexvol-driver-host\") pod \"calico-node-9468p\" (UID: \"3c5d52df-8428-4020-96e3-87b7ca0625e6\") " pod="calico-system/calico-node-9468p" Feb 9 06:49:53.212184 kubelet[1872]: I0209 06:49:53.212133 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t76fc\" (UniqueName: \"kubernetes.io/projected/3c5d52df-8428-4020-96e3-87b7ca0625e6-kube-api-access-t76fc\") pod \"calico-node-9468p\" (UID: \"3c5d52df-8428-4020-96e3-87b7ca0625e6\") " pod="calico-system/calico-node-9468p" Feb 9 06:49:53.212537 kubelet[1872]: I0209 06:49:53.212301 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/b4e0a16e-7254-431f-8ca7-8425cc87998b-kube-proxy\") pod \"kube-proxy-2qr84\" (UID: \"b4e0a16e-7254-431f-8ca7-8425cc87998b\") " pod="kube-system/kube-proxy-2qr84" Feb 9 06:49:53.212537 kubelet[1872]: I0209 06:49:53.212473 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bf44f\" (UniqueName: \"kubernetes.io/projected/b4e0a16e-7254-431f-8ca7-8425cc87998b-kube-api-access-bf44f\") pod \"kube-proxy-2qr84\" (UID: \"b4e0a16e-7254-431f-8ca7-8425cc87998b\") " pod="kube-system/kube-proxy-2qr84" Feb 9 06:49:53.212745 kubelet[1872]: I0209 06:49:53.212637 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3c5d52df-8428-4020-96e3-87b7ca0625e6-cni-bin-dir\") pod \"calico-node-9468p\" (UID: \"3c5d52df-8428-4020-96e3-87b7ca0625e6\") " pod="calico-system/calico-node-9468p" Feb 9 06:49:53.212745 kubelet[1872]: I0209 06:49:53.212738 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/18f52d4a-0597-44e7-a214-40bf2641a612-registration-dir\") pod \"csi-node-driver-s9m5t\" (UID: \"18f52d4a-0597-44e7-a214-40bf2641a612\") " pod="calico-system/csi-node-driver-s9m5t" Feb 9 06:49:53.212935 kubelet[1872]: I0209 06:49:53.212901 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b4e0a16e-7254-431f-8ca7-8425cc87998b-xtables-lock\") pod \"kube-proxy-2qr84\" (UID: \"b4e0a16e-7254-431f-8ca7-8425cc87998b\") " pod="kube-system/kube-proxy-2qr84" Feb 9 06:49:53.213087 kubelet[1872]: I0209 06:49:53.213043 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3c5d52df-8428-4020-96e3-87b7ca0625e6-cni-log-dir\") pod \"calico-node-9468p\" (UID: \"3c5d52df-8428-4020-96e3-87b7ca0625e6\") " pod="calico-system/calico-node-9468p" Feb 9 06:49:53.213202 kubelet[1872]: I0209 06:49:53.213127 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3c5d52df-8428-4020-96e3-87b7ca0625e6-policysync\") pod \"calico-node-9468p\" (UID: \"3c5d52df-8428-4020-96e3-87b7ca0625e6\") " pod="calico-system/calico-node-9468p" Feb 9 06:49:53.213304 kubelet[1872]: I0209 06:49:53.213277 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3c5d52df-8428-4020-96e3-87b7ca0625e6-node-certs\") pod \"calico-node-9468p\" (UID: \"3c5d52df-8428-4020-96e3-87b7ca0625e6\") " pod="calico-system/calico-node-9468p" Feb 9 06:49:53.213450 kubelet[1872]: I0209 06:49:53.213413 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3c5d52df-8428-4020-96e3-87b7ca0625e6-var-run-calico\") pod \"calico-node-9468p\" (UID: \"3c5d52df-8428-4020-96e3-87b7ca0625e6\") " pod="calico-system/calico-node-9468p" Feb 9 06:49:53.213580 kubelet[1872]: I0209 06:49:53.213562 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/18f52d4a-0597-44e7-a214-40bf2641a612-varrun\") pod \"csi-node-driver-s9m5t\" (UID: \"18f52d4a-0597-44e7-a214-40bf2641a612\") " pod="calico-system/csi-node-driver-s9m5t" Feb 9 06:49:53.213786 kubelet[1872]: I0209 06:49:53.213717 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/18f52d4a-0597-44e7-a214-40bf2641a612-socket-dir\") pod \"csi-node-driver-s9m5t\" (UID: \"18f52d4a-0597-44e7-a214-40bf2641a612\") " pod="calico-system/csi-node-driver-s9m5t" Feb 9 06:49:53.213976 kubelet[1872]: I0209 06:49:53.213812 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3c5d52df-8428-4020-96e3-87b7ca0625e6-xtables-lock\") pod \"calico-node-9468p\" (UID: \"3c5d52df-8428-4020-96e3-87b7ca0625e6\") " pod="calico-system/calico-node-9468p" Feb 9 06:49:53.213976 kubelet[1872]: I0209 06:49:53.213896 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3c5d52df-8428-4020-96e3-87b7ca0625e6-tigera-ca-bundle\") pod \"calico-node-9468p\" (UID: \"3c5d52df-8428-4020-96e3-87b7ca0625e6\") " pod="calico-system/calico-node-9468p" Feb 9 06:49:53.213976 kubelet[1872]: I0209 06:49:53.213974 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3c5d52df-8428-4020-96e3-87b7ca0625e6-var-lib-calico\") pod \"calico-node-9468p\" (UID: \"3c5d52df-8428-4020-96e3-87b7ca0625e6\") " pod="calico-system/calico-node-9468p" Feb 9 06:49:53.214304 kubelet[1872]: I0209 06:49:53.214090 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/18f52d4a-0597-44e7-a214-40bf2641a612-kubelet-dir\") pod \"csi-node-driver-s9m5t\" (UID: \"18f52d4a-0597-44e7-a214-40bf2641a612\") " pod="calico-system/csi-node-driver-s9m5t" Feb 9 06:49:53.214304 kubelet[1872]: I0209 06:49:53.214179 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rv6gc\" (UniqueName: \"kubernetes.io/projected/18f52d4a-0597-44e7-a214-40bf2641a612-kube-api-access-rv6gc\") pod \"csi-node-driver-s9m5t\" (UID: \"18f52d4a-0597-44e7-a214-40bf2641a612\") " pod="calico-system/csi-node-driver-s9m5t" Feb 9 06:49:53.214304 kubelet[1872]: I0209 06:49:53.214256 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b4e0a16e-7254-431f-8ca7-8425cc87998b-lib-modules\") pod \"kube-proxy-2qr84\" (UID: \"b4e0a16e-7254-431f-8ca7-8425cc87998b\") " pod="kube-system/kube-proxy-2qr84" Feb 9 06:49:53.214618 kubelet[1872]: I0209 06:49:53.214332 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3c5d52df-8428-4020-96e3-87b7ca0625e6-lib-modules\") pod \"calico-node-9468p\" (UID: \"3c5d52df-8428-4020-96e3-87b7ca0625e6\") " pod="calico-system/calico-node-9468p" Feb 9 06:49:53.214618 kubelet[1872]: I0209 06:49:53.214380 1872 reconciler.go:41] "Reconciler: start to sync state" Feb 9 06:49:53.317440 kubelet[1872]: E0209 06:49:53.317383 1872 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:49:53.317440 kubelet[1872]: W0209 06:49:53.317422 1872 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:49:53.317847 kubelet[1872]: E0209 06:49:53.317482 1872 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:49:53.318081 kubelet[1872]: E0209 06:49:53.318002 1872 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:49:53.318081 kubelet[1872]: W0209 06:49:53.318035 1872 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:49:53.318081 kubelet[1872]: E0209 06:49:53.318091 1872 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:49:53.318903 kubelet[1872]: E0209 06:49:53.318815 1872 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:49:53.318903 kubelet[1872]: W0209 06:49:53.318873 1872 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:49:53.319227 kubelet[1872]: E0209 06:49:53.318960 1872 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:49:53.319501 kubelet[1872]: E0209 06:49:53.319450 1872 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:49:53.319622 kubelet[1872]: W0209 06:49:53.319506 1872 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:49:53.319622 kubelet[1872]: E0209 06:49:53.319565 1872 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:49:53.320122 kubelet[1872]: E0209 06:49:53.320048 1872 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:49:53.320122 kubelet[1872]: W0209 06:49:53.320082 1872 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:49:53.320122 kubelet[1872]: E0209 06:49:53.320124 1872 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:49:53.320577 kubelet[1872]: E0209 06:49:53.320531 1872 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:49:53.320577 kubelet[1872]: W0209 06:49:53.320555 1872 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:49:53.320805 kubelet[1872]: E0209 06:49:53.320588 1872 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:49:53.321188 kubelet[1872]: E0209 06:49:53.321113 1872 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:49:53.321188 kubelet[1872]: W0209 06:49:53.321147 1872 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:49:53.321188 kubelet[1872]: E0209 06:49:53.321189 1872 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:49:53.321994 kubelet[1872]: E0209 06:49:53.321904 1872 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:49:53.321994 kubelet[1872]: W0209 06:49:53.321944 1872 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:49:53.322303 kubelet[1872]: E0209 06:49:53.322013 1872 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:49:53.323577 kubelet[1872]: E0209 06:49:53.323523 1872 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:49:53.323577 kubelet[1872]: W0209 06:49:53.323530 1872 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:49:53.323577 kubelet[1872]: E0209 06:49:53.323552 1872 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:49:53.330458 kubelet[1872]: E0209 06:49:53.330448 1872 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:49:53.330458 kubelet[1872]: W0209 06:49:53.330456 1872 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:49:53.330533 kubelet[1872]: E0209 06:49:53.330467 1872 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:49:53.330602 kubelet[1872]: E0209 06:49:53.330558 1872 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:49:53.330602 kubelet[1872]: W0209 06:49:53.330564 1872 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:49:53.330602 kubelet[1872]: E0209 06:49:53.330575 1872 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:49:53.330670 kubelet[1872]: E0209 06:49:53.330648 1872 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 06:49:53.330670 kubelet[1872]: W0209 06:49:53.330652 1872 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 06:49:53.330670 kubelet[1872]: E0209 06:49:53.330659 1872 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 06:49:53.419908 env[1448]: time="2024-02-09T06:49:53.419781803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9468p,Uid:3c5d52df-8428-4020-96e3-87b7ca0625e6,Namespace:calico-system,Attempt:0,}" Feb 9 06:49:53.422356 env[1448]: time="2024-02-09T06:49:53.422233808Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2qr84,Uid:b4e0a16e-7254-431f-8ca7-8425cc87998b,Namespace:kube-system,Attempt:0,}" Feb 9 06:49:54.089160 kubelet[1872]: E0209 06:49:54.089057 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:49:54.332803 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount255926750.mount: Deactivated successfully. Feb 9 06:49:54.334157 env[1448]: time="2024-02-09T06:49:54.334141176Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:49:54.335211 env[1448]: time="2024-02-09T06:49:54.335196923Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:49:54.335786 env[1448]: time="2024-02-09T06:49:54.335744646Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:49:54.336612 env[1448]: time="2024-02-09T06:49:54.336556921Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:49:54.337741 env[1448]: time="2024-02-09T06:49:54.337706340Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:49:54.339663 env[1448]: time="2024-02-09T06:49:54.339605851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:49:54.340013 env[1448]: time="2024-02-09T06:49:54.339983756Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:49:54.340422 env[1448]: time="2024-02-09T06:49:54.340378508Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:49:54.346976 env[1448]: time="2024-02-09T06:49:54.346918073Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:49:54.346976 env[1448]: time="2024-02-09T06:49:54.346941705Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:49:54.346976 env[1448]: time="2024-02-09T06:49:54.346951069Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:49:54.347068 env[1448]: time="2024-02-09T06:49:54.347010524Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8e5ae928704757ef4223f70b049131d79f900e7fc7047eb2fb448bfdb319634f pid=1953 runtime=io.containerd.runc.v2 Feb 9 06:49:54.347284 env[1448]: time="2024-02-09T06:49:54.347258708Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:49:54.347284 env[1448]: time="2024-02-09T06:49:54.347278333Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:49:54.347352 env[1448]: time="2024-02-09T06:49:54.347284860Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:49:54.347371 env[1448]: time="2024-02-09T06:49:54.347353959Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7a71cdc93f8c7a62f2c362a6630b20033fb9174fd6ad8b44691b02fe9f7bd58d pid=1958 runtime=io.containerd.runc.v2 Feb 9 06:49:54.352529 systemd[1]: Started cri-containerd-7a71cdc93f8c7a62f2c362a6630b20033fb9174fd6ad8b44691b02fe9f7bd58d.scope. Feb 9 06:49:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.384963 kernel: kauditd_printk_skb: 43 callbacks suppressed Feb 9 06:49:54.385051 kernel: audit: type=1400 audit(1707461394.356:551): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.448528 kernel: audit: type=1400 audit(1707461394.356:552): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.449376 systemd[1]: Started cri-containerd-8e5ae928704757ef4223f70b049131d79f900e7fc7047eb2fb448bfdb319634f.scope. Feb 9 06:49:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.573150 kernel: audit: type=1400 audit(1707461394.356:553): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.573188 kernel: audit: type=1400 audit(1707461394.356:554): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.635951 kernel: audit: type=1400 audit(1707461394.356:555): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.698693 kernel: audit: type=1400 audit(1707461394.356:556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.735257 kubelet[1872]: E0209 06:49:54.735219 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:49:54.761431 kernel: audit: type=1400 audit(1707461394.356:557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.824222 kernel: audit: type=1400 audit(1707461394.356:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.887014 kernel: audit: type=1400 audit(1707461394.356:559): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.013137 kernel: audit: type=1400 audit(1707461394.446:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit: BPF prog-id=64 op=LOAD Feb 9 06:49:54.446000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1958 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:54.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373163646339336638633761363266326333363261363633306232 Feb 9 06:49:54.446000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1958 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:54.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373163646339336638633761363266326333363261363633306232 Feb 9 06:49:54.446000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.446000 audit: BPF prog-id=65 op=LOAD Feb 9 06:49:54.446000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024de0 items=0 ppid=1958 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:54.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373163646339336638633761363266326333363261363633306232 Feb 9 06:49:54.509000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.509000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.509000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.509000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.509000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.509000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.509000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.509000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.509000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit: BPF prog-id=66 op=LOAD Feb 9 06:49:54.509000 audit: BPF prog-id=67 op=LOAD Feb 9 06:49:54.509000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024e28 items=0 ppid=1958 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:54.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373163646339336638633761363266326333363261363633306232 Feb 9 06:49:54.634000 audit: BPF prog-id=67 op=UNLOAD Feb 9 06:49:54.634000 audit: BPF prog-id=65 op=UNLOAD Feb 9 06:49:54.634000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit[1976]: AVC avc: denied { perfmon } for pid=1976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=1953 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:54.634000 audit[1976]: AVC avc: denied { bpf } for pid=1976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit: BPF prog-id=68 op=LOAD Feb 9 06:49:54.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865356165393238373034373537656634323233663730623034393133 Feb 9 06:49:54.948000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:54.634000 audit[1976]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025238 items=0 ppid=1958 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:54.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761373163646339336638633761363266326333363261363633306232 Feb 9 06:49:54.948000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=c items=0 ppid=1953 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:54.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865356165393238373034373537656634323233663730623034393133 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit: BPF prog-id=69 op=LOAD Feb 9 06:49:55.011000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c00020ed40 items=0 ppid=1953 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:55.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865356165393238373034373537656634323233663730623034393133 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit: BPF prog-id=70 op=LOAD Feb 9 06:49:55.011000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c00020ed88 items=0 ppid=1953 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:55.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865356165393238373034373537656634323233663730623034393133 Feb 9 06:49:55.011000 audit: BPF prog-id=70 op=UNLOAD Feb 9 06:49:55.011000 audit: BPF prog-id=69 op=UNLOAD Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { perfmon } for pid=1975 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit[1975]: AVC avc: denied { bpf } for pid=1975 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:49:55.011000 audit: BPF prog-id=71 op=LOAD Feb 9 06:49:55.011000 audit[1975]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c00020f198 items=0 ppid=1953 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:49:55.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865356165393238373034373537656634323233663730623034393133 Feb 9 06:49:55.018484 env[1448]: time="2024-02-09T06:49:55.018460130Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-9468p,Uid:3c5d52df-8428-4020-96e3-87b7ca0625e6,Namespace:calico-system,Attempt:0,} returns sandbox id \"8e5ae928704757ef4223f70b049131d79f900e7fc7047eb2fb448bfdb319634f\"" Feb 9 06:49:55.019431 env[1448]: time="2024-02-09T06:49:55.019416815Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 06:49:55.030361 env[1448]: time="2024-02-09T06:49:55.030318313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2qr84,Uid:b4e0a16e-7254-431f-8ca7-8425cc87998b,Namespace:kube-system,Attempt:0,} returns sandbox id \"7a71cdc93f8c7a62f2c362a6630b20033fb9174fd6ad8b44691b02fe9f7bd58d\"" Feb 9 06:49:55.089732 kubelet[1872]: E0209 06:49:55.089642 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:49:56.090606 kubelet[1872]: E0209 06:49:56.090484 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:49:56.376850 systemd-timesyncd[1394]: Contacted time server [2606:82c0:21::e]:123 (2.flatcar.pool.ntp.org). Feb 9 06:49:56.376978 systemd-timesyncd[1394]: Initial clock synchronization to Fri 2024-02-09 06:49:56.217050 UTC. Feb 9 06:49:56.734664 kubelet[1872]: E0209 06:49:56.734559 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:49:57.091022 kubelet[1872]: E0209 06:49:57.090818 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:49:58.091697 kubelet[1872]: E0209 06:49:58.091624 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:49:58.446677 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4212501782.mount: Deactivated successfully. Feb 9 06:49:58.734801 kubelet[1872]: E0209 06:49:58.734607 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:49:59.092616 kubelet[1872]: E0209 06:49:59.092409 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:00.092932 kubelet[1872]: E0209 06:50:00.092855 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:00.734821 kubelet[1872]: E0209 06:50:00.734704 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:01.094273 kubelet[1872]: E0209 06:50:01.094043 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:01.820762 systemd[1]: Started sshd@9-139.178.90.101:22-218.92.0.52:55730.service. Feb 9 06:50:01.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.101:22-218.92.0.52:55730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:01.847857 kernel: kauditd_printk_skb: 104 callbacks suppressed Feb 9 06:50:01.847954 kernel: audit: type=1130 audit(1707461401.820:587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.101:22-218.92.0.52:55730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:01.972029 sshd[2022]: Unable to negotiate with 218.92.0.52 port 55730: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 06:50:01.973706 systemd[1]: sshd@9-139.178.90.101:22-218.92.0.52:55730.service: Deactivated successfully. Feb 9 06:50:01.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.101:22-218.92.0.52:55730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:02.061674 kernel: audit: type=1131 audit(1707461401.973:588): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.101:22-218.92.0.52:55730 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:02.094611 kubelet[1872]: E0209 06:50:02.094552 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:02.734800 kubelet[1872]: E0209 06:50:02.734731 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:03.095428 kubelet[1872]: E0209 06:50:03.095233 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:04.095731 kubelet[1872]: E0209 06:50:04.095631 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:04.735254 kubelet[1872]: E0209 06:50:04.735152 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:05.096066 kubelet[1872]: E0209 06:50:05.095834 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:06.097023 kubelet[1872]: E0209 06:50:06.096918 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:06.735569 kubelet[1872]: E0209 06:50:06.735461 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:07.097834 kubelet[1872]: E0209 06:50:07.097650 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:08.098601 kubelet[1872]: E0209 06:50:08.098524 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:08.220957 env[1448]: time="2024-02-09T06:50:08.220935475Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:08.221494 env[1448]: time="2024-02-09T06:50:08.221478156Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:08.222599 env[1448]: time="2024-02-09T06:50:08.222559060Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:08.223949 env[1448]: time="2024-02-09T06:50:08.223936434Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:08.224341 env[1448]: time="2024-02-09T06:50:08.224328923Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 06:50:08.224878 env[1448]: time="2024-02-09T06:50:08.224822073Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 06:50:08.225682 env[1448]: time="2024-02-09T06:50:08.225668799Z" level=info msg="CreateContainer within sandbox \"8e5ae928704757ef4223f70b049131d79f900e7fc7047eb2fb448bfdb319634f\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 06:50:08.231062 env[1448]: time="2024-02-09T06:50:08.231013587Z" level=info msg="CreateContainer within sandbox \"8e5ae928704757ef4223f70b049131d79f900e7fc7047eb2fb448bfdb319634f\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0dedccd3c152a9174f0f3b309ae90fed3b4eac025d2c374b5a098135b03e8056\"" Feb 9 06:50:08.231275 env[1448]: time="2024-02-09T06:50:08.231225941Z" level=info msg="StartContainer for \"0dedccd3c152a9174f0f3b309ae90fed3b4eac025d2c374b5a098135b03e8056\"" Feb 9 06:50:08.252589 systemd[1]: Started cri-containerd-0dedccd3c152a9174f0f3b309ae90fed3b4eac025d2c374b5a098135b03e8056.scope. Feb 9 06:50:08.258000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.258000 audit[2032]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1953 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:08.418431 kernel: audit: type=1400 audit(1707461408.258:589): avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.418468 kernel: audit: type=1300 audit(1707461408.258:589): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1953 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:08.418492 kernel: audit: type=1327 audit(1707461408.258:589): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064656463636433633135326139313734663066336233303961653930 Feb 9 06:50:08.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064656463636433633135326139313734663066336233303961653930 Feb 9 06:50:08.510798 kernel: audit: type=1400 audit(1707461408.258:590): avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.258000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.574010 kernel: audit: type=1400 audit(1707461408.258:590): avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.258000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.637207 kernel: audit: type=1400 audit(1707461408.258:590): avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.258000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.700493 kernel: audit: type=1400 audit(1707461408.258:590): avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.258000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.718252 env[1448]: time="2024-02-09T06:50:08.718227696Z" level=info msg="StartContainer for \"0dedccd3c152a9174f0f3b309ae90fed3b4eac025d2c374b5a098135b03e8056\" returns successfully" Feb 9 06:50:08.734306 kubelet[1872]: E0209 06:50:08.734291 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:08.764312 kernel: audit: type=1400 audit(1707461408.258:590): avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.258000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.764569 systemd[1]: cri-containerd-0dedccd3c152a9174f0f3b309ae90fed3b4eac025d2c374b5a098135b03e8056.scope: Deactivated successfully. Feb 9 06:50:08.773606 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0dedccd3c152a9174f0f3b309ae90fed3b4eac025d2c374b5a098135b03e8056-rootfs.mount: Deactivated successfully. Feb 9 06:50:08.828092 kernel: audit: type=1400 audit(1707461408.258:590): avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.258000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.258000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.955954 kernel: audit: type=1400 audit(1707461408.258:590): avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.258000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.258000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.258000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.258000 audit: BPF prog-id=72 op=LOAD Feb 9 06:50:08.258000 audit[2032]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00038c740 items=0 ppid=1953 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:08.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064656463636433633135326139313734663066336233303961653930 Feb 9 06:50:08.416000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.416000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.416000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.416000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.416000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.416000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.416000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.416000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.416000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.416000 audit: BPF prog-id=73 op=LOAD Feb 9 06:50:08.416000 audit[2032]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00038c788 items=0 ppid=1953 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:08.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064656463636433633135326139313734663066336233303961653930 Feb 9 06:50:08.510000 audit: BPF prog-id=73 op=UNLOAD Feb 9 06:50:08.510000 audit: BPF prog-id=72 op=UNLOAD Feb 9 06:50:08.510000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.510000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.510000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.510000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.510000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.510000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.510000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.510000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.510000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.510000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:08.510000 audit: BPF prog-id=74 op=LOAD Feb 9 06:50:08.510000 audit[2032]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00038c818 items=0 ppid=1953 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:08.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064656463636433633135326139313734663066336233303961653930 Feb 9 06:50:08.956765 env[1448]: time="2024-02-09T06:50:08.956213566Z" level=info msg="shim disconnected" id=0dedccd3c152a9174f0f3b309ae90fed3b4eac025d2c374b5a098135b03e8056 Feb 9 06:50:08.956765 env[1448]: time="2024-02-09T06:50:08.956239034Z" level=warning msg="cleaning up after shim disconnected" id=0dedccd3c152a9174f0f3b309ae90fed3b4eac025d2c374b5a098135b03e8056 namespace=k8s.io Feb 9 06:50:08.956765 env[1448]: time="2024-02-09T06:50:08.956245451Z" level=info msg="cleaning up dead shim" Feb 9 06:50:08.958000 audit: BPF prog-id=74 op=UNLOAD Feb 9 06:50:08.972273 env[1448]: time="2024-02-09T06:50:08.972227324Z" level=warning msg="cleanup warnings time=\"2024-02-09T06:50:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2073 runtime=io.containerd.runc.v2\n" Feb 9 06:50:09.085814 kubelet[1872]: E0209 06:50:09.085728 1872 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:09.099606 kubelet[1872]: E0209 06:50:09.099561 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:09.419282 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4278188321.mount: Deactivated successfully. Feb 9 06:50:09.446743 systemd[1]: Started sshd@10-139.178.90.101:22-144.91.92.112:42776.service. Feb 9 06:50:09.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-144.91.92.112:42776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:09.871851 env[1448]: time="2024-02-09T06:50:09.871762827Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:09.872632 env[1448]: time="2024-02-09T06:50:09.872595287Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:09.873408 env[1448]: time="2024-02-09T06:50:09.873368991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:09.873916 env[1448]: time="2024-02-09T06:50:09.873874715Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:09.874055 env[1448]: time="2024-02-09T06:50:09.874014886Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 9 06:50:09.874417 env[1448]: time="2024-02-09T06:50:09.874405762Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 06:50:09.875098 env[1448]: time="2024-02-09T06:50:09.875066068Z" level=info msg="CreateContainer within sandbox \"7a71cdc93f8c7a62f2c362a6630b20033fb9174fd6ad8b44691b02fe9f7bd58d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 06:50:09.882789 env[1448]: time="2024-02-09T06:50:09.882745229Z" level=info msg="CreateContainer within sandbox \"7a71cdc93f8c7a62f2c362a6630b20033fb9174fd6ad8b44691b02fe9f7bd58d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"73bebdce205e873f56652266bd68362929b23875a9d996df4806852cb3ec4174\"" Feb 9 06:50:09.883069 env[1448]: time="2024-02-09T06:50:09.883026850Z" level=info msg="StartContainer for \"73bebdce205e873f56652266bd68362929b23875a9d996df4806852cb3ec4174\"" Feb 9 06:50:09.903833 systemd[1]: Started cri-containerd-73bebdce205e873f56652266bd68362929b23875a9d996df4806852cb3ec4174.scope. Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1958 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:09.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626562646365323035653837336635363635323236366264363833 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit: BPF prog-id=75 op=LOAD Feb 9 06:50:09.911000 audit[2096]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00020a730 items=0 ppid=1958 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:09.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626562646365323035653837336635363635323236366264363833 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit: BPF prog-id=76 op=LOAD Feb 9 06:50:09.911000 audit[2096]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00020a778 items=0 ppid=1958 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:09.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626562646365323035653837336635363635323236366264363833 Feb 9 06:50:09.911000 audit: BPF prog-id=76 op=UNLOAD Feb 9 06:50:09.911000 audit: BPF prog-id=75 op=UNLOAD Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:09.911000 audit: BPF prog-id=77 op=LOAD Feb 9 06:50:09.911000 audit[2096]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00020a808 items=0 ppid=1958 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:09.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733626562646365323035653837336635363635323236366264363833 Feb 9 06:50:09.930084 env[1448]: time="2024-02-09T06:50:09.930059690Z" level=info msg="StartContainer for \"73bebdce205e873f56652266bd68362929b23875a9d996df4806852cb3ec4174\" returns successfully" Feb 9 06:50:09.970000 audit[2159]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:09.970000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2d9ca6a0 a2=0 a3=7ffd2d9ca68c items=0 ppid=2107 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:09.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 06:50:09.970000 audit[2160]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:09.970000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc94296e50 a2=0 a3=7ffc94296e3c items=0 ppid=2107 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:09.970000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 06:50:09.971000 audit[2161]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:09.971000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe95928c50 a2=0 a3=7ffe95928c3c items=0 ppid=2107 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:09.971000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 06:50:09.971000 audit[2162]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:09.971000 audit[2162]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc25ab4fb0 a2=0 a3=7ffc25ab4f9c items=0 ppid=2107 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:09.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 06:50:09.972000 audit[2163]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:09.972000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc48975800 a2=0 a3=7ffc489757ec items=0 ppid=2107 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:09.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 06:50:09.972000 audit[2164]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:09.972000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc8ffddc0 a2=0 a3=7ffdc8ffddac items=0 ppid=2107 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:09.972000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 06:50:09.981589 update_engine[1440]: I0209 06:50:09.981498 1440 update_attempter.cc:509] Updating boot flags... Feb 9 06:50:10.073000 audit[2183]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.073000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe24f4a5f0 a2=0 a3=7ffe24f4a5dc items=0 ppid=2107 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 06:50:10.074000 audit[2185]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.074000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffa999c400 a2=0 a3=7fffa999c3ec items=0 ppid=2107 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 06:50:10.076000 audit[2188]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.076000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe7fc8d4d0 a2=0 a3=7ffe7fc8d4bc items=0 ppid=2107 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 06:50:10.076000 audit[2189]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.076000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5d503580 a2=0 a3=7ffe5d50356c items=0 ppid=2107 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 06:50:10.077000 audit[2191]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.077000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd59885a60 a2=0 a3=7ffd59885a4c items=0 ppid=2107 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 06:50:10.078000 audit[2192]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.078000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb0bfc370 a2=0 a3=7ffcb0bfc35c items=0 ppid=2107 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.078000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 06:50:10.079000 audit[2194]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.079000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffed940a190 a2=0 a3=7ffed940a17c items=0 ppid=2107 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.079000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 06:50:10.081000 audit[2197]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.081000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe75f18a00 a2=0 a3=7ffe75f189ec items=0 ppid=2107 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 06:50:10.082000 audit[2198]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.082000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe329f86c0 a2=0 a3=7ffe329f86ac items=0 ppid=2107 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 06:50:10.083000 audit[2200]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.083000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb7e49800 a2=0 a3=7ffeb7e497ec items=0 ppid=2107 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 06:50:10.083000 audit[2201]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.083000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5e5e44d0 a2=0 a3=7ffe5e5e44bc items=0 ppid=2107 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 06:50:10.085000 audit[2203]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.085000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc00f005c0 a2=0 a3=7ffc00f005ac items=0 ppid=2107 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 06:50:10.087000 audit[2206]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.087000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd0789cca0 a2=0 a3=7ffd0789cc8c items=0 ppid=2107 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 06:50:10.088000 audit[2209]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.088000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe67934940 a2=0 a3=7ffe6793492c items=0 ppid=2107 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 06:50:10.089000 audit[2210]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.089000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffca75ec300 a2=0 a3=7ffca75ec2ec items=0 ppid=2107 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 06:50:10.099753 kubelet[1872]: E0209 06:50:10.099712 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:10.090000 audit[2212]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.090000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe5666ced0 a2=0 a3=7ffe5666cebc items=0 ppid=2107 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 06:50:10.113000 audit[2216]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.113000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcaa8624b0 a2=0 a3=7ffcaa86249c items=0 ppid=2107 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 06:50:10.116000 audit[2221]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.116000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff20ae00e0 a2=0 a3=7fff20ae00cc items=0 ppid=2107 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 06:50:10.117000 audit[2223]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 06:50:10.117000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffe31f0b10 a2=0 a3=7fffe31f0afc items=0 ppid=2107 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 06:50:10.122000 audit[2225]: NETFILTER_CFG table=filter:39 family=2 entries=6 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:50:10.122000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff70929de0 a2=0 a3=7fff70929dcc items=0 ppid=2107 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:50:10.147000 audit[2225]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:50:10.147000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fff70929de0 a2=0 a3=7fff70929dcc items=0 ppid=2107 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.147000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:50:10.169000 audit[2236]: NETFILTER_CFG table=filter:41 family=2 entries=10 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:50:10.169000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe0042d780 a2=0 a3=7ffe0042d76c items=0 ppid=2107 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:50:10.177000 audit[2236]: NETFILTER_CFG table=nat:42 family=2 entries=20 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:50:10.177000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe0042d780 a2=0 a3=7ffe0042d76c items=0 ppid=2107 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.177000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:50:10.184000 audit[2237]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.184000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff18836650 a2=0 a3=7fff1883663c items=0 ppid=2107 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 06:50:10.186000 audit[2239]: NETFILTER_CFG table=filter:44 family=10 entries=2 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.186000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdc73b4f50 a2=0 a3=7ffdc73b4f3c items=0 ppid=2107 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 06:50:10.189000 audit[2242]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.189000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc60cc3b30 a2=0 a3=7ffc60cc3b1c items=0 ppid=2107 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 06:50:10.190000 audit[2243]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.190000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc79ed6c50 a2=0 a3=7ffc79ed6c3c items=0 ppid=2107 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 06:50:10.192000 audit[2245]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.192000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeafe67bd0 a2=0 a3=7ffeafe67bbc items=0 ppid=2107 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 06:50:10.193000 audit[2246]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.193000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe1f14170 a2=0 a3=7fffe1f1415c items=0 ppid=2107 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 06:50:10.195000 audit[2248]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.195000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe47a8cb00 a2=0 a3=7ffe47a8caec items=0 ppid=2107 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.195000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 06:50:10.197000 audit[2251]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.197000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc522d1250 a2=0 a3=7ffc522d123c items=0 ppid=2107 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.197000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 06:50:10.198000 audit[2252]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.198000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1a6388f0 a2=0 a3=7ffc1a6388dc items=0 ppid=2107 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 06:50:10.200000 audit[2254]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.200000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcea5f1810 a2=0 a3=7ffcea5f17fc items=0 ppid=2107 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 06:50:10.201000 audit[2255]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.201000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffccb6d1a0 a2=0 a3=7fffccb6d18c items=0 ppid=2107 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.201000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 06:50:10.204000 audit[2257]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.204000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe61122410 a2=0 a3=7ffe611223fc items=0 ppid=2107 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 06:50:10.207000 audit[2260]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.207000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3ee4a9d0 a2=0 a3=7ffc3ee4a9bc items=0 ppid=2107 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 06:50:10.212000 audit[2263]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.212000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc0ea57e30 a2=0 a3=7ffc0ea57e1c items=0 ppid=2107 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 06:50:10.213000 audit[2264]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.213000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff2ea84620 a2=0 a3=7fff2ea8460c items=0 ppid=2107 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.213000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 06:50:10.216000 audit[2266]: NETFILTER_CFG table=nat:58 family=10 entries=2 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.216000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff66709ce0 a2=0 a3=7fff66709ccc items=0 ppid=2107 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.216000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 06:50:10.221000 audit[2269]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.221000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe0b5bc950 a2=0 a3=7ffe0b5bc93c items=0 ppid=2107 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 06:50:10.223000 audit[2270]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.223000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff99543a30 a2=0 a3=7fff99543a1c items=0 ppid=2107 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 06:50:10.227000 audit[2272]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.227000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffedf616bb0 a2=0 a3=7ffedf616b9c items=0 ppid=2107 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 06:50:10.233000 audit[2275]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.233000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed2743cb0 a2=0 a3=7ffed2743c9c items=0 ppid=2107 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 06:50:10.235000 audit[2276]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.235000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc9942dc0 a2=0 a3=7ffcc9942dac items=0 ppid=2107 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 06:50:10.239000 audit[2278]: NETFILTER_CFG table=nat:64 family=10 entries=2 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 06:50:10.239000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff60f7f3c0 a2=0 a3=7fff60f7f3ac items=0 ppid=2107 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 06:50:10.244000 audit[2280]: NETFILTER_CFG table=filter:65 family=10 entries=3 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 06:50:10.244000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe674598e0 a2=0 a3=7ffe674598cc items=0 ppid=2107 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.244000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:50:10.245000 audit[2280]: NETFILTER_CFG table=nat:66 family=10 entries=7 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 06:50:10.245000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffe674598e0 a2=0 a3=7ffe674598cc items=0 ppid=2107 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:10.245000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:50:10.385838 sshd[2087]: Invalid user joshua from 144.91.92.112 port 42776 Feb 9 06:50:10.392057 sshd[2087]: pam_faillock(sshd:auth): User unknown Feb 9 06:50:10.393016 sshd[2087]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:50:10.393099 sshd[2087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.92.112 Feb 9 06:50:10.393982 sshd[2087]: pam_faillock(sshd:auth): User unknown Feb 9 06:50:10.392000 audit[2087]: USER_AUTH pid=2087 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="joshua" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 06:50:10.735026 kubelet[1872]: E0209 06:50:10.734914 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:10.801930 kubelet[1872]: I0209 06:50:10.801819 1872 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-2qr84" podStartSLOduration=5.958182917 podCreationTimestamp="2024-02-09 06:49:50 +0000 UTC" firstStartedPulling="2024-02-09 06:49:55.030713087 +0000 UTC m=+6.309053559" lastFinishedPulling="2024-02-09 06:50:09.874256453 +0000 UTC m=+21.152596927" observedRunningTime="2024-02-09 06:50:10.801196625 +0000 UTC m=+22.079537172" watchObservedRunningTime="2024-02-09 06:50:10.801726285 +0000 UTC m=+22.080066815" Feb 9 06:50:11.100725 kubelet[1872]: E0209 06:50:11.100535 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:12.101546 kubelet[1872]: E0209 06:50:12.101428 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:12.694268 sshd[2087]: Failed password for invalid user joshua from 144.91.92.112 port 42776 ssh2 Feb 9 06:50:12.734705 kubelet[1872]: E0209 06:50:12.734574 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:13.102682 kubelet[1872]: E0209 06:50:13.102448 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:13.367479 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3453485430.mount: Deactivated successfully. Feb 9 06:50:14.103638 kubelet[1872]: E0209 06:50:14.103529 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:14.157121 sshd[2087]: Received disconnect from 144.91.92.112 port 42776:11: Bye Bye [preauth] Feb 9 06:50:14.157121 sshd[2087]: Disconnected from invalid user joshua 144.91.92.112 port 42776 [preauth] Feb 9 06:50:14.159702 systemd[1]: sshd@10-139.178.90.101:22-144.91.92.112:42776.service: Deactivated successfully. Feb 9 06:50:14.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-144.91.92.112:42776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:14.187991 kernel: kauditd_printk_skb: 238 callbacks suppressed Feb 9 06:50:14.188021 kernel: audit: type=1131 audit(1707461414.158:657): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.101:22-144.91.92.112:42776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:50:14.735585 kubelet[1872]: E0209 06:50:14.735479 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:15.104908 kubelet[1872]: E0209 06:50:15.104689 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:16.105888 kubelet[1872]: E0209 06:50:16.105784 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:16.735183 kubelet[1872]: E0209 06:50:16.735087 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:17.107171 kubelet[1872]: E0209 06:50:17.106958 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:18.107913 kubelet[1872]: E0209 06:50:18.107806 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:18.734875 kubelet[1872]: E0209 06:50:18.734765 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:19.108631 kubelet[1872]: E0209 06:50:19.108403 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:20.109556 kubelet[1872]: E0209 06:50:20.109418 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:20.734937 kubelet[1872]: E0209 06:50:20.734883 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:21.110352 kubelet[1872]: E0209 06:50:21.110138 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:22.110690 kubelet[1872]: E0209 06:50:22.110583 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:22.735550 kubelet[1872]: E0209 06:50:22.735439 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:23.111925 kubelet[1872]: E0209 06:50:23.111712 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:24.112898 kubelet[1872]: E0209 06:50:24.112846 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:24.734325 kubelet[1872]: E0209 06:50:24.734282 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:25.113448 kubelet[1872]: E0209 06:50:25.113372 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:25.935098 env[1448]: time="2024-02-09T06:50:25.935046730Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:25.935747 env[1448]: time="2024-02-09T06:50:25.935699918Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:25.937788 env[1448]: time="2024-02-09T06:50:25.937731659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:25.938685 env[1448]: time="2024-02-09T06:50:25.938644933Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:25.939155 env[1448]: time="2024-02-09T06:50:25.939103661Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 06:50:25.940491 env[1448]: time="2024-02-09T06:50:25.940445141Z" level=info msg="CreateContainer within sandbox \"8e5ae928704757ef4223f70b049131d79f900e7fc7047eb2fb448bfdb319634f\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 06:50:25.945553 env[1448]: time="2024-02-09T06:50:25.945476671Z" level=info msg="CreateContainer within sandbox \"8e5ae928704757ef4223f70b049131d79f900e7fc7047eb2fb448bfdb319634f\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f34cfeaadac3620839fe43d5a97bf96a0cf45999a736d18d6934a060d404ec71\"" Feb 9 06:50:25.945852 env[1448]: time="2024-02-09T06:50:25.945802444Z" level=info msg="StartContainer for \"f34cfeaadac3620839fe43d5a97bf96a0cf45999a736d18d6934a060d404ec71\"" Feb 9 06:50:25.974612 systemd[1]: Started cri-containerd-f34cfeaadac3620839fe43d5a97bf96a0cf45999a736d18d6934a060d404ec71.scope. Feb 9 06:50:25.982000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:25.982000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1953 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:26.114295 kubelet[1872]: E0209 06:50:26.114230 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:26.143065 kernel: audit: type=1400 audit(1707461425.982:658): avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.143103 kernel: audit: type=1300 audit(1707461425.982:658): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1953 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:26.143120 kernel: audit: type=1327 audit(1707461425.982:658): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346366656161646163333632303833396665343364356139376266 Feb 9 06:50:25.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346366656161646163333632303833396665343364356139376266 Feb 9 06:50:26.236517 kernel: audit: type=1400 audit(1707461425.982:659): avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:25.982000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:25.982000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.363677 kernel: audit: type=1400 audit(1707461425.982:659): avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.363708 kernel: audit: type=1400 audit(1707461425.982:659): avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:25.982000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.427178 kernel: audit: type=1400 audit(1707461425.982:659): avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:25.982000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.491341 kernel: audit: type=1400 audit(1707461425.982:659): avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:25.982000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.509537 env[1448]: time="2024-02-09T06:50:26.509495624Z" level=info msg="StartContainer for \"f34cfeaadac3620839fe43d5a97bf96a0cf45999a736d18d6934a060d404ec71\" returns successfully" Feb 9 06:50:25.982000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:25.982000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.683979 kernel: audit: type=1400 audit(1707461425.982:659): avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.684578 kernel: audit: type=1400 audit(1707461425.982:659): avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:25.982000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:25.982000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:25.982000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:25.982000 audit: BPF prog-id=78 op=LOAD Feb 9 06:50:25.982000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002cfbe0 items=0 ppid=1953 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:25.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346366656161646163333632303833396665343364356139376266 Feb 9 06:50:26.142000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.142000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.142000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.142000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.142000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.142000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.142000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.142000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.142000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.142000 audit: BPF prog-id=79 op=LOAD Feb 9 06:50:26.142000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002cfc28 items=0 ppid=1953 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:26.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346366656161646163333632303833396665343364356139376266 Feb 9 06:50:26.299000 audit: BPF prog-id=79 op=UNLOAD Feb 9 06:50:26.299000 audit: BPF prog-id=78 op=UNLOAD Feb 9 06:50:26.299000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.299000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.299000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.299000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.299000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.299000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.299000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.299000 audit[2289]: AVC avc: denied { perfmon } for pid=2289 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.299000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.299000 audit[2289]: AVC avc: denied { bpf } for pid=2289 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:26.299000 audit: BPF prog-id=80 op=LOAD Feb 9 06:50:26.299000 audit[2289]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002cfcb8 items=0 ppid=1953 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:26.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633346366656161646163333632303833396665343364356139376266 Feb 9 06:50:26.734495 kubelet[1872]: E0209 06:50:26.734445 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:27.114528 kubelet[1872]: E0209 06:50:27.114426 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:27.174863 env[1448]: time="2024-02-09T06:50:27.174673879Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 06:50:27.179031 systemd[1]: cri-containerd-f34cfeaadac3620839fe43d5a97bf96a0cf45999a736d18d6934a060d404ec71.scope: Deactivated successfully. Feb 9 06:50:27.187000 audit: BPF prog-id=80 op=UNLOAD Feb 9 06:50:27.202271 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f34cfeaadac3620839fe43d5a97bf96a0cf45999a736d18d6934a060d404ec71-rootfs.mount: Deactivated successfully. Feb 9 06:50:27.263275 kubelet[1872]: I0209 06:50:27.263251 1872 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 06:50:27.905772 env[1448]: time="2024-02-09T06:50:27.905660541Z" level=info msg="shim disconnected" id=f34cfeaadac3620839fe43d5a97bf96a0cf45999a736d18d6934a060d404ec71 Feb 9 06:50:27.906078 env[1448]: time="2024-02-09T06:50:27.905778214Z" level=warning msg="cleaning up after shim disconnected" id=f34cfeaadac3620839fe43d5a97bf96a0cf45999a736d18d6934a060d404ec71 namespace=k8s.io Feb 9 06:50:27.906078 env[1448]: time="2024-02-09T06:50:27.905805569Z" level=info msg="cleaning up dead shim" Feb 9 06:50:27.934647 env[1448]: time="2024-02-09T06:50:27.934479348Z" level=warning msg="cleanup warnings time=\"2024-02-09T06:50:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2351 runtime=io.containerd.runc.v2\n" Feb 9 06:50:28.115298 kubelet[1872]: E0209 06:50:28.115174 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:28.338003 kubelet[1872]: I0209 06:50:28.337808 1872 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:50:28.350624 systemd[1]: Created slice kubepods-besteffort-pod4c04c5c0_be88_4b2b_b529_e31e19db453c.slice. Feb 9 06:50:28.390827 kubelet[1872]: I0209 06:50:28.390730 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-56mxn\" (UniqueName: \"kubernetes.io/projected/4c04c5c0-be88-4b2b-b529-e31e19db453c-kube-api-access-56mxn\") pod \"nginx-deployment-845c78c8b9-clb94\" (UID: \"4c04c5c0-be88-4b2b-b529-e31e19db453c\") " pod="default/nginx-deployment-845c78c8b9-clb94" Feb 9 06:50:28.656347 env[1448]: time="2024-02-09T06:50:28.656202834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-clb94,Uid:4c04c5c0-be88-4b2b-b529-e31e19db453c,Namespace:default,Attempt:0,}" Feb 9 06:50:28.694932 env[1448]: time="2024-02-09T06:50:28.694861197Z" level=error msg="Failed to destroy network for sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:50:28.695218 env[1448]: time="2024-02-09T06:50:28.695160236Z" level=error msg="encountered an error cleaning up failed sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:50:28.695271 env[1448]: time="2024-02-09T06:50:28.695212330Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-clb94,Uid:4c04c5c0-be88-4b2b-b529-e31e19db453c,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:50:28.695440 kubelet[1872]: E0209 06:50:28.695425 1872 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:50:28.695497 kubelet[1872]: E0209 06:50:28.695478 1872 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-clb94" Feb 9 06:50:28.695535 kubelet[1872]: E0209 06:50:28.695516 1872 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-clb94" Feb 9 06:50:28.695617 kubelet[1872]: E0209 06:50:28.695582 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-clb94_default(4c04c5c0-be88-4b2b-b529-e31e19db453c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-clb94_default(4c04c5c0-be88-4b2b-b529-e31e19db453c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-clb94" podUID=4c04c5c0-be88-4b2b-b529-e31e19db453c Feb 9 06:50:28.696041 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599-shm.mount: Deactivated successfully. Feb 9 06:50:28.746262 systemd[1]: Created slice kubepods-besteffort-pod18f52d4a_0597_44e7_a214_40bf2641a612.slice. Feb 9 06:50:28.750972 env[1448]: time="2024-02-09T06:50:28.750852833Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-s9m5t,Uid:18f52d4a-0597-44e7-a214-40bf2641a612,Namespace:calico-system,Attempt:0,}" Feb 9 06:50:28.787085 env[1448]: time="2024-02-09T06:50:28.787019528Z" level=error msg="Failed to destroy network for sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:50:28.787250 env[1448]: time="2024-02-09T06:50:28.787204450Z" level=error msg="encountered an error cleaning up failed sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:50:28.787250 env[1448]: time="2024-02-09T06:50:28.787233803Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-s9m5t,Uid:18f52d4a-0597-44e7-a214-40bf2641a612,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:50:28.787393 kubelet[1872]: E0209 06:50:28.787382 1872 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:50:28.787427 kubelet[1872]: E0209 06:50:28.787412 1872 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-s9m5t" Feb 9 06:50:28.787427 kubelet[1872]: E0209 06:50:28.787425 1872 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-s9m5t" Feb 9 06:50:28.787469 kubelet[1872]: E0209 06:50:28.787455 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-s9m5t_calico-system(18f52d4a-0597-44e7-a214-40bf2641a612)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-s9m5t_calico-system(18f52d4a-0597-44e7-a214-40bf2641a612)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:28.837047 kubelet[1872]: I0209 06:50:28.837011 1872 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:50:28.837268 env[1448]: time="2024-02-09T06:50:28.837087631Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 06:50:28.837714 env[1448]: time="2024-02-09T06:50:28.837678010Z" level=info msg="StopPodSandbox for \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\"" Feb 9 06:50:28.838027 kubelet[1872]: I0209 06:50:28.838000 1872 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:50:28.838521 env[1448]: time="2024-02-09T06:50:28.838470093Z" level=info msg="StopPodSandbox for \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\"" Feb 9 06:50:28.884842 env[1448]: time="2024-02-09T06:50:28.884741922Z" level=error msg="StopPodSandbox for \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\" failed" error="failed to destroy network for sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:50:28.885019 env[1448]: time="2024-02-09T06:50:28.884826178Z" level=error msg="StopPodSandbox for \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\" failed" error="failed to destroy network for sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:50:28.885168 kubelet[1872]: E0209 06:50:28.885104 1872 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:50:28.885245 kubelet[1872]: E0209 06:50:28.885194 1872 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c} Feb 9 06:50:28.885245 kubelet[1872]: E0209 06:50:28.885105 1872 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:50:28.885400 kubelet[1872]: E0209 06:50:28.885249 1872 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"18f52d4a-0597-44e7-a214-40bf2641a612\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 06:50:28.885400 kubelet[1872]: E0209 06:50:28.885282 1872 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599} Feb 9 06:50:28.885400 kubelet[1872]: E0209 06:50:28.885285 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"18f52d4a-0597-44e7-a214-40bf2641a612\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:28.885400 kubelet[1872]: E0209 06:50:28.885352 1872 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4c04c5c0-be88-4b2b-b529-e31e19db453c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 06:50:28.885699 kubelet[1872]: E0209 06:50:28.885409 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4c04c5c0-be88-4b2b-b529-e31e19db453c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-clb94" podUID=4c04c5c0-be88-4b2b-b529-e31e19db453c Feb 9 06:50:29.086093 kubelet[1872]: E0209 06:50:29.085905 1872 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:29.115527 kubelet[1872]: E0209 06:50:29.115408 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:29.509244 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c-shm.mount: Deactivated successfully. Feb 9 06:50:30.116628 kubelet[1872]: E0209 06:50:30.116514 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:31.116745 kubelet[1872]: E0209 06:50:31.116633 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:32.117817 kubelet[1872]: E0209 06:50:32.117697 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:33.118464 kubelet[1872]: E0209 06:50:33.118347 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:34.119036 kubelet[1872]: E0209 06:50:34.118915 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:35.119915 kubelet[1872]: E0209 06:50:35.119837 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:36.120173 kubelet[1872]: E0209 06:50:36.120100 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:37.121088 kubelet[1872]: E0209 06:50:37.121020 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:38.121627 kubelet[1872]: E0209 06:50:38.121559 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:39.122048 kubelet[1872]: E0209 06:50:39.121941 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:40.122178 kubelet[1872]: E0209 06:50:40.122097 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:41.123079 kubelet[1872]: E0209 06:50:41.122981 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:42.124204 kubelet[1872]: E0209 06:50:42.124134 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:43.125111 kubelet[1872]: E0209 06:50:43.125035 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:43.735241 env[1448]: time="2024-02-09T06:50:43.735195351Z" level=info msg="StopPodSandbox for \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\"" Feb 9 06:50:43.748007 env[1448]: time="2024-02-09T06:50:43.747956224Z" level=error msg="StopPodSandbox for \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\" failed" error="failed to destroy network for sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:50:43.748215 kubelet[1872]: E0209 06:50:43.748190 1872 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:50:43.748271 kubelet[1872]: E0209 06:50:43.748227 1872 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599} Feb 9 06:50:43.748271 kubelet[1872]: E0209 06:50:43.748251 1872 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4c04c5c0-be88-4b2b-b529-e31e19db453c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 06:50:43.748271 kubelet[1872]: E0209 06:50:43.748267 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4c04c5c0-be88-4b2b-b529-e31e19db453c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-clb94" podUID=4c04c5c0-be88-4b2b-b529-e31e19db453c Feb 9 06:50:44.125900 kubelet[1872]: E0209 06:50:44.125826 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:44.735125 env[1448]: time="2024-02-09T06:50:44.735061740Z" level=info msg="StopPodSandbox for \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\"" Feb 9 06:50:44.748008 env[1448]: time="2024-02-09T06:50:44.747949134Z" level=error msg="StopPodSandbox for \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\" failed" error="failed to destroy network for sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 06:50:44.748289 kubelet[1872]: E0209 06:50:44.748152 1872 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:50:44.748289 kubelet[1872]: E0209 06:50:44.748192 1872 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c} Feb 9 06:50:44.748289 kubelet[1872]: E0209 06:50:44.748216 1872 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"18f52d4a-0597-44e7-a214-40bf2641a612\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 06:50:44.748289 kubelet[1872]: E0209 06:50:44.748233 1872 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"18f52d4a-0597-44e7-a214-40bf2641a612\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-s9m5t" podUID=18f52d4a-0597-44e7-a214-40bf2641a612 Feb 9 06:50:45.126794 kubelet[1872]: E0209 06:50:45.126714 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:45.782357 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2465431955.mount: Deactivated successfully. Feb 9 06:50:45.805958 env[1448]: time="2024-02-09T06:50:45.805938250Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:45.806449 env[1448]: time="2024-02-09T06:50:45.806435306Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:45.807311 env[1448]: time="2024-02-09T06:50:45.807285362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:45.808116 env[1448]: time="2024-02-09T06:50:45.808101617Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:50:45.808489 env[1448]: time="2024-02-09T06:50:45.808473370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 06:50:45.812094 env[1448]: time="2024-02-09T06:50:45.812063440Z" level=info msg="CreateContainer within sandbox \"8e5ae928704757ef4223f70b049131d79f900e7fc7047eb2fb448bfdb319634f\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 06:50:45.817475 env[1448]: time="2024-02-09T06:50:45.817440546Z" level=info msg="CreateContainer within sandbox \"8e5ae928704757ef4223f70b049131d79f900e7fc7047eb2fb448bfdb319634f\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c35961c992513fcf1b1e01ae6093a7f228471eae092089b1d55a90ac9f036156\"" Feb 9 06:50:45.817725 env[1448]: time="2024-02-09T06:50:45.817713442Z" level=info msg="StartContainer for \"c35961c992513fcf1b1e01ae6093a7f228471eae092089b1d55a90ac9f036156\"" Feb 9 06:50:45.839353 systemd[1]: Started cri-containerd-c35961c992513fcf1b1e01ae6093a7f228471eae092089b1d55a90ac9f036156.scope. Feb 9 06:50:45.847000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:45.876554 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 06:50:45.876642 kernel: audit: type=1400 audit(1707461445.847:665): avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:45.847000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1953 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:45.941557 kernel: audit: type=1300 audit(1707461445.847:665): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1953 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:45.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333353936316339393235313366636631623165303161653630393361 Feb 9 06:50:46.127596 kubelet[1872]: E0209 06:50:46.127586 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:46.130550 kernel: audit: type=1327 audit(1707461445.847:665): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333353936316339393235313366636631623165303161653630393361 Feb 9 06:50:46.130583 kernel: audit: type=1400 audit(1707461445.847:666): avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:45.847000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:45.847000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.257810 kernel: audit: type=1400 audit(1707461445.847:666): avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.257841 kernel: audit: type=1400 audit(1707461445.847:666): avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:45.847000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.321473 kernel: audit: type=1400 audit(1707461445.847:666): avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:45.847000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:45.847000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.450818 kernel: audit: type=1400 audit(1707461445.847:666): avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.450904 kernel: audit: type=1400 audit(1707461445.847:666): avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:45.847000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.514986 kernel: audit: type=1400 audit(1707461445.847:666): avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:45.847000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.517960 env[1448]: time="2024-02-09T06:50:46.517936085Z" level=info msg="StartContainer for \"c35961c992513fcf1b1e01ae6093a7f228471eae092089b1d55a90ac9f036156\" returns successfully" Feb 9 06:50:45.847000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:45.847000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:45.847000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:45.847000 audit: BPF prog-id=81 op=LOAD Feb 9 06:50:45.847000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00026bc70 items=0 ppid=1953 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:45.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333353936316339393235313366636631623165303161653630393361 Feb 9 06:50:46.035000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.035000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.035000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.035000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.035000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.035000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.035000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.035000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.035000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.035000 audit: BPF prog-id=82 op=LOAD Feb 9 06:50:46.035000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00026bcb8 items=0 ppid=1953 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:46.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333353936316339393235313366636631623165303161653630393361 Feb 9 06:50:46.192000 audit: BPF prog-id=82 op=UNLOAD Feb 9 06:50:46.192000 audit: BPF prog-id=81 op=UNLOAD Feb 9 06:50:46.192000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.192000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.192000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.192000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.192000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.192000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.192000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.192000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.192000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.192000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:46.192000 audit: BPF prog-id=83 op=LOAD Feb 9 06:50:46.192000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00026bd48 items=0 ppid=1953 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:46.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333353936316339393235313366636631623165303161653630393361 Feb 9 06:50:46.663283 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 06:50:46.663324 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 06:50:46.915404 kubelet[1872]: I0209 06:50:46.915383 1872 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-9468p" podStartSLOduration=6.125915244 podCreationTimestamp="2024-02-09 06:49:50 +0000 UTC" firstStartedPulling="2024-02-09 06:49:55.019220166 +0000 UTC m=+6.297560639" lastFinishedPulling="2024-02-09 06:50:45.80864875 +0000 UTC m=+57.086989224" observedRunningTime="2024-02-09 06:50:46.915050863 +0000 UTC m=+58.193391346" watchObservedRunningTime="2024-02-09 06:50:46.915343829 +0000 UTC m=+58.193684304" Feb 9 06:50:47.128119 kubelet[1872]: E0209 06:50:47.128049 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:47.936000 audit[2738]: AVC avc: denied { write } for pid=2738 comm="tee" name="fd" dev="proc" ino=13874 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:50:47.936000 audit[2738]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffda647987 a2=241 a3=1b6 items=1 ppid=2708 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:47.936000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 06:50:47.936000 audit: PATH item=0 name="/dev/fd/63" inode=17917 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:50:47.936000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:50:47.936000 audit[2743]: AVC avc: denied { write } for pid=2743 comm="tee" name="fd" dev="proc" ino=15277 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:50:47.936000 audit[2743]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff73c39986 a2=241 a3=1b6 items=1 ppid=2705 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:47.936000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 06:50:47.936000 audit: PATH item=0 name="/dev/fd/63" inode=23027 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:50:47.936000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:50:47.936000 audit[2744]: AVC avc: denied { write } for pid=2744 comm="tee" name="fd" dev="proc" ino=32945 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:50:47.936000 audit[2744]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff99188986 a2=241 a3=1b6 items=1 ppid=2704 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:47.936000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 06:50:47.936000 audit: PATH item=0 name="/dev/fd/63" inode=30966 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:50:47.936000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:50:47.936000 audit[2750]: AVC avc: denied { write } for pid=2750 comm="tee" name="fd" dev="proc" ino=17920 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:50:47.936000 audit[2750]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe26668977 a2=241 a3=1b6 items=1 ppid=2702 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:47.936000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 06:50:47.936000 audit: PATH item=0 name="/dev/fd/63" inode=23028 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:50:47.936000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:50:47.937000 audit[2759]: AVC avc: denied { write } for pid=2759 comm="tee" name="fd" dev="proc" ino=32949 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:50:47.937000 audit[2759]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf448d976 a2=241 a3=1b6 items=1 ppid=2706 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:47.937000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 06:50:47.937000 audit: PATH item=0 name="/dev/fd/63" inode=13876 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:50:47.937000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:50:47.937000 audit[2740]: AVC avc: denied { write } for pid=2740 comm="tee" name="fd" dev="proc" ino=29121 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:50:47.937000 audit[2754]: AVC avc: denied { write } for pid=2754 comm="tee" name="fd" dev="proc" ino=13879 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 06:50:47.937000 audit[2740]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeb92cb988 a2=241 a3=1b6 items=1 ppid=2703 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:47.937000 audit[2754]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3e067986 a2=241 a3=1b6 items=1 ppid=2707 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:47.937000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 06:50:47.937000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 06:50:47.937000 audit: PATH item=0 name="/dev/fd/63" inode=29118 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:50:47.937000 audit: PATH item=0 name="/dev/fd/63" inode=17005 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:50:47.937000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:50:47.937000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 06:50:48.012497 kernel: Initializing XFRM netlink socket Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit: BPF prog-id=84 op=LOAD Feb 9 06:50:48.055000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd62c222e0 a2=70 a3=7f300fe92000 items=0 ppid=2716 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.055000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:50:48.055000 audit: BPF prog-id=84 op=UNLOAD Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit: BPF prog-id=85 op=LOAD Feb 9 06:50:48.055000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd62c222e0 a2=70 a3=6e items=0 ppid=2716 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.055000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:50:48.055000 audit: BPF prog-id=85 op=UNLOAD Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd62c22290 a2=70 a3=7ffd62c222e0 items=0 ppid=2716 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.055000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit: BPF prog-id=86 op=LOAD Feb 9 06:50:48.055000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd62c22270 a2=70 a3=7ffd62c222e0 items=0 ppid=2716 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.055000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:50:48.055000 audit: BPF prog-id=86 op=UNLOAD Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd62c22350 a2=70 a3=0 items=0 ppid=2716 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.055000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd62c22340 a2=70 a3=0 items=0 ppid=2716 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.055000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd62c22380 a2=70 a3=0 items=0 ppid=2716 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.055000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.055000 audit: BPF prog-id=87 op=LOAD Feb 9 06:50:48.055000 audit[2892]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd62c222a0 a2=70 a3=ffffffff items=0 ppid=2716 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.055000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 06:50:48.056000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.056000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff5dd0840 a2=70 a3=fff80800 items=0 ppid=2716 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 06:50:48.057000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:48.057000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff5dd0710 a2=70 a3=3 items=0 ppid=2716 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.057000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 06:50:48.080000 audit: BPF prog-id=87 op=UNLOAD Feb 9 06:50:48.104000 audit[2950]: NETFILTER_CFG table=mangle:67 family=2 entries=19 op=nft_register_chain pid=2950 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:50:48.104000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffc47c05dc0 a2=0 a3=7ffc47c05dac items=0 ppid=2716 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.104000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:50:48.106000 audit[2949]: NETFILTER_CFG table=raw:68 family=2 entries=19 op=nft_register_chain pid=2949 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:50:48.106000 audit[2949]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff43583960 a2=0 a3=564581fae000 items=0 ppid=2716 pid=2949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.106000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:50:48.107000 audit[2951]: NETFILTER_CFG table=nat:69 family=2 entries=16 op=nft_register_chain pid=2951 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:50:48.107000 audit[2951]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd823eef80 a2=0 a3=55e6d5349000 items=0 ppid=2716 pid=2951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.107000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:50:48.108000 audit[2954]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2954 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:50:48.108000 audit[2954]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffc8eda5110 a2=0 a3=561a9a55a000 items=0 ppid=2716 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:48.108000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:50:48.129208 kubelet[1872]: E0209 06:50:48.129185 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:49.032954 systemd-networkd[1300]: vxlan.calico: Link UP Feb 9 06:50:49.032958 systemd-networkd[1300]: vxlan.calico: Gained carrier Feb 9 06:50:49.085999 kubelet[1872]: E0209 06:50:49.085959 1872 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:49.129897 kubelet[1872]: E0209 06:50:49.129793 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:50.130380 kubelet[1872]: E0209 06:50:50.130299 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:50.736814 systemd-networkd[1300]: vxlan.calico: Gained IPv6LL Feb 9 06:50:51.131135 kubelet[1872]: E0209 06:50:51.130940 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:52.131897 kubelet[1872]: E0209 06:50:52.131736 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:53.132383 kubelet[1872]: E0209 06:50:53.132314 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:54.132937 kubelet[1872]: E0209 06:50:54.132854 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:55.134209 kubelet[1872]: E0209 06:50:55.134127 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:56.134442 kubelet[1872]: E0209 06:50:56.134361 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:56.735940 env[1448]: time="2024-02-09T06:50:56.735783306Z" level=info msg="StopPodSandbox for \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\"" Feb 9 06:50:56.822543 env[1448]: 2024-02-09 06:50:56.792 [INFO][2990] k8s.go 578: Cleaning up netns ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:50:56.822543 env[1448]: 2024-02-09 06:50:56.792 [INFO][2990] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" iface="eth0" netns="/var/run/netns/cni-8de58724-2345-7902-a861-98b5bb363a9d" Feb 9 06:50:56.822543 env[1448]: 2024-02-09 06:50:56.792 [INFO][2990] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" iface="eth0" netns="/var/run/netns/cni-8de58724-2345-7902-a861-98b5bb363a9d" Feb 9 06:50:56.822543 env[1448]: 2024-02-09 06:50:56.792 [INFO][2990] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" iface="eth0" netns="/var/run/netns/cni-8de58724-2345-7902-a861-98b5bb363a9d" Feb 9 06:50:56.822543 env[1448]: 2024-02-09 06:50:56.792 [INFO][2990] k8s.go 585: Releasing IP address(es) ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:50:56.822543 env[1448]: 2024-02-09 06:50:56.792 [INFO][2990] utils.go 188: Calico CNI releasing IP address ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:50:56.822543 env[1448]: 2024-02-09 06:50:56.804 [INFO][3004] ipam_plugin.go 415: Releasing address using handleID ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" HandleID="k8s-pod-network.ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Workload="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:50:56.822543 env[1448]: 2024-02-09 06:50:56.804 [INFO][3004] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:50:56.822543 env[1448]: 2024-02-09 06:50:56.804 [INFO][3004] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:50:56.822543 env[1448]: 2024-02-09 06:50:56.816 [WARNING][3004] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" HandleID="k8s-pod-network.ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Workload="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:50:56.822543 env[1448]: 2024-02-09 06:50:56.816 [INFO][3004] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" HandleID="k8s-pod-network.ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Workload="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:50:56.822543 env[1448]: 2024-02-09 06:50:56.820 [INFO][3004] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:50:56.822543 env[1448]: 2024-02-09 06:50:56.821 [INFO][2990] k8s.go 591: Teardown processing complete. ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:50:56.823120 env[1448]: time="2024-02-09T06:50:56.822642270Z" level=info msg="TearDown network for sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\" successfully" Feb 9 06:50:56.823120 env[1448]: time="2024-02-09T06:50:56.822672072Z" level=info msg="StopPodSandbox for \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\" returns successfully" Feb 9 06:50:56.823272 env[1448]: time="2024-02-09T06:50:56.823212035Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-clb94,Uid:4c04c5c0-be88-4b2b-b529-e31e19db453c,Namespace:default,Attempt:1,}" Feb 9 06:50:56.824601 systemd[1]: run-netns-cni\x2d8de58724\x2d2345\x2d7902\x2da861\x2d98b5bb363a9d.mount: Deactivated successfully. Feb 9 06:50:56.908599 systemd-networkd[1300]: cali79f06d70597: Link UP Feb 9 06:50:56.964202 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 06:50:56.964242 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali79f06d70597: link becomes ready Feb 9 06:50:56.964257 systemd-networkd[1300]: cali79f06d70597: Gained carrier Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.857 [INFO][3023] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0 nginx-deployment-845c78c8b9- default 4c04c5c0-be88-4b2b-b529-e31e19db453c 1646 0 2024-02-09 06:50:28 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.25 nginx-deployment-845c78c8b9-clb94 eth0 default [] [] [kns.default ksa.default.default] cali79f06d70597 [] []}} ContainerID="fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" Namespace="default" Pod="nginx-deployment-845c78c8b9-clb94" WorkloadEndpoint="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-" Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.857 [INFO][3023] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" Namespace="default" Pod="nginx-deployment-845c78c8b9-clb94" WorkloadEndpoint="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.873 [INFO][3044] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" HandleID="k8s-pod-network.fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" Workload="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.881 [INFO][3044] ipam_plugin.go 268: Auto assigning IP ContainerID="fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" HandleID="k8s-pod-network.fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" Workload="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000398570), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.25", "pod":"nginx-deployment-845c78c8b9-clb94", "timestamp":"2024-02-09 06:50:56.873447153 +0000 UTC"}, Hostname:"10.67.80.25", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.881 [INFO][3044] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.881 [INFO][3044] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.881 [INFO][3044] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.25' Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.882 [INFO][3044] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" host="10.67.80.25" Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.886 [INFO][3044] ipam.go 372: Looking up existing affinities for host host="10.67.80.25" Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.890 [INFO][3044] ipam.go 489: Trying affinity for 192.168.51.192/26 host="10.67.80.25" Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.892 [INFO][3044] ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="10.67.80.25" Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.894 [INFO][3044] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="10.67.80.25" Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.894 [INFO][3044] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" host="10.67.80.25" Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.896 [INFO][3044] ipam.go 1682: Creating new handle: k8s-pod-network.fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011 Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.899 [INFO][3044] ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" host="10.67.80.25" Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.903 [INFO][3044] ipam.go 1216: Successfully claimed IPs: [192.168.51.193/26] block=192.168.51.192/26 handle="k8s-pod-network.fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" host="10.67.80.25" Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.904 [INFO][3044] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.193/26] handle="k8s-pod-network.fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" host="10.67.80.25" Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.904 [INFO][3044] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:50:56.975994 env[1448]: 2024-02-09 06:50:56.904 [INFO][3044] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.51.193/26] IPv6=[] ContainerID="fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" HandleID="k8s-pod-network.fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" Workload="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:50:56.977273 env[1448]: 2024-02-09 06:50:56.907 [INFO][3023] k8s.go 385: Populated endpoint ContainerID="fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" Namespace="default" Pod="nginx-deployment-845c78c8b9-clb94" WorkloadEndpoint="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"4c04c5c0-be88-4b2b-b529-e31e19db453c", ResourceVersion:"1646", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 50, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.25", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-clb94", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali79f06d70597", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:50:56.977273 env[1448]: 2024-02-09 06:50:56.907 [INFO][3023] k8s.go 386: Calico CNI using IPs: [192.168.51.193/32] ContainerID="fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" Namespace="default" Pod="nginx-deployment-845c78c8b9-clb94" WorkloadEndpoint="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:50:56.977273 env[1448]: 2024-02-09 06:50:56.907 [INFO][3023] dataplane_linux.go 68: Setting the host side veth name to cali79f06d70597 ContainerID="fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" Namespace="default" Pod="nginx-deployment-845c78c8b9-clb94" WorkloadEndpoint="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:50:56.977273 env[1448]: 2024-02-09 06:50:56.964 [INFO][3023] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" Namespace="default" Pod="nginx-deployment-845c78c8b9-clb94" WorkloadEndpoint="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:50:56.977273 env[1448]: 2024-02-09 06:50:56.964 [INFO][3023] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" Namespace="default" Pod="nginx-deployment-845c78c8b9-clb94" WorkloadEndpoint="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"4c04c5c0-be88-4b2b-b529-e31e19db453c", ResourceVersion:"1646", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 50, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.25", ContainerID:"fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011", Pod:"nginx-deployment-845c78c8b9-clb94", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali79f06d70597", MAC:"66:9c:8a:fc:10:27", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:50:56.977273 env[1448]: 2024-02-09 06:50:56.973 [INFO][3023] k8s.go 491: Wrote updated endpoint to datastore ContainerID="fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011" Namespace="default" Pod="nginx-deployment-845c78c8b9-clb94" WorkloadEndpoint="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:50:56.987721 env[1448]: time="2024-02-09T06:50:56.987527004Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:50:56.987721 env[1448]: time="2024-02-09T06:50:56.987589703Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:50:56.987721 env[1448]: time="2024-02-09T06:50:56.987606673Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:50:56.987925 env[1448]: time="2024-02-09T06:50:56.987792812Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011 pid=3081 runtime=io.containerd.runc.v2 Feb 9 06:50:56.987000 audit[3083]: NETFILTER_CFG table=filter:71 family=2 entries=36 op=nft_register_chain pid=3083 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:50:57.012943 systemd[1]: Started cri-containerd-fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011.scope. Feb 9 06:50:57.014894 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 9 06:50:57.014961 kernel: audit: type=1325 audit(1707461456.987:696): table=filter:71 family=2 entries=36 op=nft_register_chain pid=3083 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:50:56.987000 audit[3083]: SYSCALL arch=c000003e syscall=46 success=yes exit=19876 a0=3 a1=7ffef4148400 a2=0 a3=7ffef41483ec items=0 ppid=2716 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:57.072488 kernel: audit: type=1300 audit(1707461456.987:696): arch=c000003e syscall=46 success=yes exit=19876 a0=3 a1=7ffef4148400 a2=0 a3=7ffef41483ec items=0 ppid=2716 pid=3083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:57.134970 kubelet[1872]: E0209 06:50:57.134921 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:56.987000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:50:57.168561 kernel: audit: type=1327 audit(1707461456.987:696): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:50:57.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.289742 kernel: audit: type=1400 audit(1707461457.079:697): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.289776 kernel: audit: type=1400 audit(1707461457.079:698): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.351569 kernel: audit: type=1400 audit(1707461457.079:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.413368 kernel: audit: type=1400 audit(1707461457.079:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.475553 kernel: audit: type=1400 audit(1707461457.079:701): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.537748 kernel: audit: type=1400 audit(1707461457.079:702): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.599952 kernel: audit: type=1400 audit(1707461457.079:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit: BPF prog-id=88 op=LOAD Feb 9 06:50:57.227000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3081 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:57.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366566613030363435323039636533346331653265336231306463 Feb 9 06:50:57.227000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3081 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:57.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366566613030363435323039636533346331653265336231306463 Feb 9 06:50:57.227000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.227000 audit: BPF prog-id=89 op=LOAD Feb 9 06:50:57.227000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a1630 items=0 ppid=3081 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:57.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366566613030363435323039636533346331653265336231306463 Feb 9 06:50:57.350000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.350000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.350000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.350000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.350000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.350000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.350000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.350000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.350000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.350000 audit: BPF prog-id=90 op=LOAD Feb 9 06:50:57.350000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a1678 items=0 ppid=3081 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:57.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366566613030363435323039636533346331653265336231306463 Feb 9 06:50:57.474000 audit: BPF prog-id=90 op=UNLOAD Feb 9 06:50:57.474000 audit: BPF prog-id=89 op=UNLOAD Feb 9 06:50:57.475000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.475000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.475000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.475000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.475000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.475000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.475000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.475000 audit[3093]: AVC avc: denied { perfmon } for pid=3093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.475000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.475000 audit[3093]: AVC avc: denied { bpf } for pid=3093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:50:57.475000 audit: BPF prog-id=91 op=LOAD Feb 9 06:50:57.475000 audit[3093]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a1a88 items=0 ppid=3081 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:50:57.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665366566613030363435323039636533346331653265336231306463 Feb 9 06:50:57.678535 env[1448]: time="2024-02-09T06:50:57.678511674Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-clb94,Uid:4c04c5c0-be88-4b2b-b529-e31e19db453c,Namespace:default,Attempt:1,} returns sandbox id \"fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011\"" Feb 9 06:50:57.679580 env[1448]: time="2024-02-09T06:50:57.679564418Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 06:50:58.135810 kubelet[1872]: E0209 06:50:58.135758 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:58.160809 systemd-networkd[1300]: cali79f06d70597: Gained IPv6LL Feb 9 06:50:59.136019 kubelet[1872]: E0209 06:50:59.135937 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:50:59.736185 env[1448]: time="2024-02-09T06:50:59.736069286Z" level=info msg="StopPodSandbox for \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\"" Feb 9 06:50:59.836124 env[1448]: 2024-02-09 06:50:59.776 [INFO][3139] k8s.go 578: Cleaning up netns ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:50:59.836124 env[1448]: 2024-02-09 06:50:59.776 [INFO][3139] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" iface="eth0" netns="/var/run/netns/cni-7c57a0b0-bb5d-fbca-4be4-4be821b3b5a1" Feb 9 06:50:59.836124 env[1448]: 2024-02-09 06:50:59.777 [INFO][3139] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" iface="eth0" netns="/var/run/netns/cni-7c57a0b0-bb5d-fbca-4be4-4be821b3b5a1" Feb 9 06:50:59.836124 env[1448]: 2024-02-09 06:50:59.777 [INFO][3139] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" iface="eth0" netns="/var/run/netns/cni-7c57a0b0-bb5d-fbca-4be4-4be821b3b5a1" Feb 9 06:50:59.836124 env[1448]: 2024-02-09 06:50:59.777 [INFO][3139] k8s.go 585: Releasing IP address(es) ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:50:59.836124 env[1448]: 2024-02-09 06:50:59.777 [INFO][3139] utils.go 188: Calico CNI releasing IP address ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:50:59.836124 env[1448]: 2024-02-09 06:50:59.817 [INFO][3156] ipam_plugin.go 415: Releasing address using handleID ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" HandleID="k8s-pod-network.6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Workload="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:50:59.836124 env[1448]: 2024-02-09 06:50:59.817 [INFO][3156] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:50:59.836124 env[1448]: 2024-02-09 06:50:59.817 [INFO][3156] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:50:59.836124 env[1448]: 2024-02-09 06:50:59.829 [WARNING][3156] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" HandleID="k8s-pod-network.6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Workload="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:50:59.836124 env[1448]: 2024-02-09 06:50:59.829 [INFO][3156] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" HandleID="k8s-pod-network.6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Workload="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:50:59.836124 env[1448]: 2024-02-09 06:50:59.832 [INFO][3156] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:50:59.836124 env[1448]: 2024-02-09 06:50:59.834 [INFO][3139] k8s.go 591: Teardown processing complete. ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:50:59.837149 env[1448]: time="2024-02-09T06:50:59.836289399Z" level=info msg="TearDown network for sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\" successfully" Feb 9 06:50:59.837149 env[1448]: time="2024-02-09T06:50:59.836343904Z" level=info msg="StopPodSandbox for \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\" returns successfully" Feb 9 06:50:59.837306 env[1448]: time="2024-02-09T06:50:59.837257849Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-s9m5t,Uid:18f52d4a-0597-44e7-a214-40bf2641a612,Namespace:calico-system,Attempt:1,}" Feb 9 06:50:59.841450 systemd[1]: run-netns-cni\x2d7c57a0b0\x2dbb5d\x2dfbca\x2d4be4\x2d4be821b3b5a1.mount: Deactivated successfully. Feb 9 06:51:00.087560 systemd-networkd[1300]: cali93aed6525cc: Link UP Feb 9 06:51:00.136896 kubelet[1872]: E0209 06:51:00.136825 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:00.143734 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 06:51:00.143790 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali93aed6525cc: link becomes ready Feb 9 06:51:00.143830 systemd-networkd[1300]: cali93aed6525cc: Gained carrier Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:50:59.892 [INFO][3175] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.25-k8s-csi--node--driver--s9m5t-eth0 csi-node-driver- calico-system 18f52d4a-0597-44e7-a214-40bf2641a612 1656 0 2024-02-09 06:49:50 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.25 csi-node-driver-s9m5t eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali93aed6525cc [] []}} ContainerID="09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" Namespace="calico-system" Pod="csi-node-driver-s9m5t" WorkloadEndpoint="10.67.80.25-k8s-csi--node--driver--s9m5t-" Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:50:59.892 [INFO][3175] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" Namespace="calico-system" Pod="csi-node-driver-s9m5t" WorkloadEndpoint="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:50:59.960 [INFO][3199] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" HandleID="k8s-pod-network.09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" Workload="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:50:59.971 [INFO][3199] ipam_plugin.go 268: Auto assigning IP ContainerID="09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" HandleID="k8s-pod-network.09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" Workload="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00071b960), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.80.25", "pod":"csi-node-driver-s9m5t", "timestamp":"2024-02-09 06:50:59.960277856 +0000 UTC"}, Hostname:"10.67.80.25", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:50:59.971 [INFO][3199] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:50:59.971 [INFO][3199] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:50:59.971 [INFO][3199] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.25' Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:50:59.972 [INFO][3199] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" host="10.67.80.25" Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:50:59.976 [INFO][3199] ipam.go 372: Looking up existing affinities for host host="10.67.80.25" Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:51:00.009 [INFO][3199] ipam.go 489: Trying affinity for 192.168.51.192/26 host="10.67.80.25" Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:51:00.065 [INFO][3199] ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="10.67.80.25" Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:51:00.068 [INFO][3199] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="10.67.80.25" Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:51:00.068 [INFO][3199] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" host="10.67.80.25" Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:51:00.070 [INFO][3199] ipam.go 1682: Creating new handle: k8s-pod-network.09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:51:00.075 [INFO][3199] ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" host="10.67.80.25" Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:51:00.079 [INFO][3199] ipam.go 1216: Successfully claimed IPs: [192.168.51.194/26] block=192.168.51.192/26 handle="k8s-pod-network.09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" host="10.67.80.25" Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:51:00.079 [INFO][3199] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.194/26] handle="k8s-pod-network.09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" host="10.67.80.25" Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:51:00.079 [INFO][3199] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:51:00.149408 env[1448]: 2024-02-09 06:51:00.080 [INFO][3199] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.51.194/26] IPv6=[] ContainerID="09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" HandleID="k8s-pod-network.09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" Workload="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:51:00.150131 env[1448]: 2024-02-09 06:51:00.083 [INFO][3175] k8s.go 385: Populated endpoint ContainerID="09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" Namespace="calico-system" Pod="csi-node-driver-s9m5t" WorkloadEndpoint="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25-k8s-csi--node--driver--s9m5t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"18f52d4a-0597-44e7-a214-40bf2641a612", ResourceVersion:"1656", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 49, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.25", ContainerID:"", Pod:"csi-node-driver-s9m5t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali93aed6525cc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:51:00.150131 env[1448]: 2024-02-09 06:51:00.084 [INFO][3175] k8s.go 386: Calico CNI using IPs: [192.168.51.194/32] ContainerID="09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" Namespace="calico-system" Pod="csi-node-driver-s9m5t" WorkloadEndpoint="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:51:00.150131 env[1448]: 2024-02-09 06:51:00.084 [INFO][3175] dataplane_linux.go 68: Setting the host side veth name to cali93aed6525cc ContainerID="09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" Namespace="calico-system" Pod="csi-node-driver-s9m5t" WorkloadEndpoint="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:51:00.150131 env[1448]: 2024-02-09 06:51:00.143 [INFO][3175] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" Namespace="calico-system" Pod="csi-node-driver-s9m5t" WorkloadEndpoint="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:51:00.150131 env[1448]: 2024-02-09 06:51:00.144 [INFO][3175] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" Namespace="calico-system" Pod="csi-node-driver-s9m5t" WorkloadEndpoint="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25-k8s-csi--node--driver--s9m5t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"18f52d4a-0597-44e7-a214-40bf2641a612", ResourceVersion:"1656", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 49, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.25", ContainerID:"09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa", Pod:"csi-node-driver-s9m5t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali93aed6525cc", MAC:"d6:22:91:b9:c5:12", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:51:00.150131 env[1448]: 2024-02-09 06:51:00.148 [INFO][3175] k8s.go 491: Wrote updated endpoint to datastore ContainerID="09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa" Namespace="calico-system" Pod="csi-node-driver-s9m5t" WorkloadEndpoint="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:51:00.155000 audit[3233]: NETFILTER_CFG table=filter:72 family=2 entries=40 op=nft_register_chain pid=3233 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:51:00.155000 audit[3233]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffe16006e70 a2=0 a3=7ffe16006e5c items=0 ppid=2716 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:00.155000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:51:00.156630 env[1448]: time="2024-02-09T06:51:00.156569454Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:51:00.156630 env[1448]: time="2024-02-09T06:51:00.156590755Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:51:00.156630 env[1448]: time="2024-02-09T06:51:00.156600296Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:51:00.156740 env[1448]: time="2024-02-09T06:51:00.156670443Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa pid=3239 runtime=io.containerd.runc.v2 Feb 9 06:51:00.174444 systemd[1]: Started cri-containerd-09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa.scope. Feb 9 06:51:00.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.178000 audit: BPF prog-id=92 op=LOAD Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3239 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:00.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039353930626366336535376663346163316437623638653439396433 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3239 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:00.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039353930626366336535376663346163316437623638653439396433 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit: BPF prog-id=93 op=LOAD Feb 9 06:51:00.179000 audit[3249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098c60 items=0 ppid=3239 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:00.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039353930626366336535376663346163316437623638653439396433 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit: BPF prog-id=94 op=LOAD Feb 9 06:51:00.179000 audit[3249]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098ca8 items=0 ppid=3239 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:00.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039353930626366336535376663346163316437623638653439396433 Feb 9 06:51:00.179000 audit: BPF prog-id=94 op=UNLOAD Feb 9 06:51:00.179000 audit: BPF prog-id=93 op=UNLOAD Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { perfmon } for pid=3249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit[3249]: AVC avc: denied { bpf } for pid=3249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:00.179000 audit: BPF prog-id=95 op=LOAD Feb 9 06:51:00.179000 audit[3249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000990b8 items=0 ppid=3239 pid=3249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:00.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039353930626366336535376663346163316437623638653439396433 Feb 9 06:51:00.201706 env[1448]: time="2024-02-09T06:51:00.201587372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-s9m5t,Uid:18f52d4a-0597-44e7-a214-40bf2641a612,Namespace:calico-system,Attempt:1,} returns sandbox id \"09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa\"" Feb 9 06:51:01.137769 kubelet[1872]: E0209 06:51:01.137690 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:01.232924 systemd-networkd[1300]: cali93aed6525cc: Gained IPv6LL Feb 9 06:51:02.138028 kubelet[1872]: E0209 06:51:02.137913 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:03.138243 kubelet[1872]: E0209 06:51:03.138144 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:04.139412 kubelet[1872]: E0209 06:51:04.139342 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:05.140436 kubelet[1872]: E0209 06:51:05.140358 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:05.978082 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2951762986.mount: Deactivated successfully. Feb 9 06:51:06.141189 kubelet[1872]: E0209 06:51:06.141167 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:06.538417 env[1448]: time="2024-02-09T06:51:06.538370981Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:51:06.539027 env[1448]: time="2024-02-09T06:51:06.538980649Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:51:06.539903 env[1448]: time="2024-02-09T06:51:06.539855873Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:51:06.541009 env[1448]: time="2024-02-09T06:51:06.540974018Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:51:06.541775 env[1448]: time="2024-02-09T06:51:06.541746011Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 06:51:06.542239 env[1448]: time="2024-02-09T06:51:06.542224788Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 06:51:06.543144 env[1448]: time="2024-02-09T06:51:06.543107881Z" level=info msg="CreateContainer within sandbox \"fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 06:51:06.547663 env[1448]: time="2024-02-09T06:51:06.547619453Z" level=info msg="CreateContainer within sandbox \"fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"25e94930034730ba56fb39dc58926d4bfe775b0081377d69bb7dae67e214c0cb\"" Feb 9 06:51:06.548074 env[1448]: time="2024-02-09T06:51:06.547997465Z" level=info msg="StartContainer for \"25e94930034730ba56fb39dc58926d4bfe775b0081377d69bb7dae67e214c0cb\"" Feb 9 06:51:06.569636 systemd[1]: Started cri-containerd-25e94930034730ba56fb39dc58926d4bfe775b0081377d69bb7dae67e214c0cb.scope. Feb 9 06:51:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.599902 kernel: kauditd_printk_skb: 110 callbacks suppressed Feb 9 06:51:06.599936 kernel: audit: type=1400 audit(1707461466.573:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721683 kernel: audit: type=1400 audit(1707461466.573:735): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721715 kernel: audit: type=1400 audit(1707461466.573:736): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.783928 kernel: audit: type=1400 audit(1707461466.573:737): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.845339 kernel: audit: type=1400 audit(1707461466.573:738): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.907856 kernel: audit: type=1400 audit(1707461466.573:739): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.970453 kernel: audit: type=1400 audit(1707461466.573:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:07.031705 kernel: audit: type=1400 audit(1707461466.573:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:07.092867 kernel: audit: type=1400 audit(1707461466.573:742): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:07.141282 kubelet[1872]: E0209 06:51:07.141240 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:07.153798 kernel: audit: type=1400 audit(1707461466.721:743): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit: BPF prog-id=96 op=LOAD Feb 9 06:51:06.721000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit[3284]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3081 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:06.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235653934393330303334373330626135366662333964633538393236 Feb 9 06:51:06.721000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit[3284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3081 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:06.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235653934393330303334373330626135366662333964633538393236 Feb 9 06:51:06.721000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.721000 audit: BPF prog-id=97 op=LOAD Feb 9 06:51:06.721000 audit[3284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000318de0 items=0 ppid=3081 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:06.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235653934393330303334373330626135366662333964633538393236 Feb 9 06:51:06.844000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.844000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.844000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.844000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.844000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.844000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.844000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.844000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.844000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.844000 audit: BPF prog-id=98 op=LOAD Feb 9 06:51:06.844000 audit[3284]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000318e28 items=0 ppid=3081 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:06.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235653934393330303334373330626135366662333964633538393236 Feb 9 06:51:06.969000 audit: BPF prog-id=98 op=UNLOAD Feb 9 06:51:06.969000 audit: BPF prog-id=97 op=UNLOAD Feb 9 06:51:06.969000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.969000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.969000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.969000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.969000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.969000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.969000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.969000 audit[3284]: AVC avc: denied { perfmon } for pid=3284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.969000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.969000 audit[3284]: AVC avc: denied { bpf } for pid=3284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:06.969000 audit: BPF prog-id=99 op=LOAD Feb 9 06:51:06.969000 audit[3284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000319238 items=0 ppid=3081 pid=3284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:06.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235653934393330303334373330626135366662333964633538393236 Feb 9 06:51:07.233035 env[1448]: time="2024-02-09T06:51:07.233012786Z" level=info msg="StartContainer for \"25e94930034730ba56fb39dc58926d4bfe775b0081377d69bb7dae67e214c0cb\" returns successfully" Feb 9 06:51:07.968124 kubelet[1872]: I0209 06:51:07.968029 1872 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-clb94" podStartSLOduration=31.105115366 podCreationTimestamp="2024-02-09 06:50:28 +0000 UTC" firstStartedPulling="2024-02-09 06:50:57.679281293 +0000 UTC m=+68.957621780" lastFinishedPulling="2024-02-09 06:51:06.542111432 +0000 UTC m=+77.820451907" observedRunningTime="2024-02-09 06:51:07.967753682 +0000 UTC m=+79.246094217" watchObservedRunningTime="2024-02-09 06:51:07.967945493 +0000 UTC m=+79.246286009" Feb 9 06:51:08.141462 kubelet[1872]: E0209 06:51:08.141413 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:09.086219 kubelet[1872]: E0209 06:51:09.086159 1872 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:09.142647 kubelet[1872]: E0209 06:51:09.142552 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:10.143034 kubelet[1872]: E0209 06:51:10.142904 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:10.885613 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3119667241.mount: Deactivated successfully. Feb 9 06:51:11.143771 kubelet[1872]: E0209 06:51:11.143662 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:12.144032 kubelet[1872]: E0209 06:51:12.143908 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:12.936000 audit[3358]: NETFILTER_CFG table=filter:73 family=2 entries=22 op=nft_register_rule pid=3358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:51:12.944978 kubelet[1872]: I0209 06:51:12.944910 1872 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:51:12.948634 systemd[1]: Created slice kubepods-besteffort-pod6dd47a8f_f977_408d_9ff1_6622bcc35a72.slice. Feb 9 06:51:12.964641 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 9 06:51:12.964710 kernel: audit: type=1325 audit(1707461472.936:752): table=filter:73 family=2 entries=22 op=nft_register_rule pid=3358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:51:13.017981 kubelet[1872]: I0209 06:51:13.017970 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6hc6d\" (UniqueName: \"kubernetes.io/projected/6dd47a8f-f977-408d-9ff1-6622bcc35a72-kube-api-access-6hc6d\") pod \"nfs-server-provisioner-0\" (UID: \"6dd47a8f-f977-408d-9ff1-6622bcc35a72\") " pod="default/nfs-server-provisioner-0" Feb 9 06:51:13.018035 kubelet[1872]: I0209 06:51:13.018002 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/6dd47a8f-f977-408d-9ff1-6622bcc35a72-data\") pod \"nfs-server-provisioner-0\" (UID: \"6dd47a8f-f977-408d-9ff1-6622bcc35a72\") " pod="default/nfs-server-provisioner-0" Feb 9 06:51:12.936000 audit[3358]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffddfa09220 a2=0 a3=7ffddfa0920c items=0 ppid=2107 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.121553 kernel: audit: type=1300 audit(1707461472.936:752): arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffddfa09220 a2=0 a3=7ffddfa0920c items=0 ppid=2107 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.121588 kernel: audit: type=1327 audit(1707461472.936:752): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:51:12.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:51:13.144518 kubelet[1872]: E0209 06:51:13.144498 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:13.184000 audit[3358]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=3358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:51:13.184000 audit[3358]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffddfa09220 a2=0 a3=31030 items=0 ppid=2107 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.250304 env[1448]: time="2024-02-09T06:51:13.250259621Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6dd47a8f-f977-408d-9ff1-6622bcc35a72,Namespace:default,Attempt:0,}" Feb 9 06:51:13.327621 systemd-networkd[1300]: cali60e51b789ff: Link UP Feb 9 06:51:13.339376 kernel: audit: type=1325 audit(1707461473.184:753): table=nat:74 family=2 entries=20 op=nft_register_rule pid=3358 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:51:13.339411 kernel: audit: type=1300 audit(1707461473.184:753): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffddfa09220 a2=0 a3=31030 items=0 ppid=2107 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.339430 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 06:51:13.339445 kernel: audit: type=1327 audit(1707461473.184:753): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:51:13.184000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:51:13.366734 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 06:51:13.452573 systemd-networkd[1300]: cali60e51b789ff: Gained carrier Feb 9 06:51:13.460000 audit[3423]: NETFILTER_CFG table=filter:75 family=2 entries=34 op=nft_register_rule pid=3423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.271 [INFO][3361] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.25-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 6dd47a8f-f977-408d-9ff1-6622bcc35a72 1713 0 2024-02-09 06:51:12 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.80.25 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.25-k8s-nfs--server--provisioner--0-" Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.271 [INFO][3361] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.25-k8s-nfs--server--provisioner--0-eth0" Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.285 [INFO][3380] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" HandleID="k8s-pod-network.bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" Workload="10.67.80.25-k8s-nfs--server--provisioner--0-eth0" Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.294 [INFO][3380] ipam_plugin.go 268: Auto assigning IP ContainerID="bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" HandleID="k8s-pod-network.bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" Workload="10.67.80.25-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00012d370), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.25", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 06:51:13.28544115 +0000 UTC"}, Hostname:"10.67.80.25", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.294 [INFO][3380] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.294 [INFO][3380] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.294 [INFO][3380] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.25' Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.296 [INFO][3380] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" host="10.67.80.25" Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.300 [INFO][3380] ipam.go 372: Looking up existing affinities for host host="10.67.80.25" Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.306 [INFO][3380] ipam.go 489: Trying affinity for 192.168.51.192/26 host="10.67.80.25" Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.309 [INFO][3380] ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="10.67.80.25" Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.312 [INFO][3380] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="10.67.80.25" Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.312 [INFO][3380] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" host="10.67.80.25" Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.314 [INFO][3380] ipam.go 1682: Creating new handle: k8s-pod-network.bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29 Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.318 [INFO][3380] ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" host="10.67.80.25" Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.325 [INFO][3380] ipam.go 1216: Successfully claimed IPs: [192.168.51.195/26] block=192.168.51.192/26 handle="k8s-pod-network.bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" host="10.67.80.25" Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.325 [INFO][3380] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.195/26] handle="k8s-pod-network.bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" host="10.67.80.25" Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.325 [INFO][3380] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:51:13.470915 env[1448]: 2024-02-09 06:51:13.325 [INFO][3380] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.51.195/26] IPv6=[] ContainerID="bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" HandleID="k8s-pod-network.bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" Workload="10.67.80.25-k8s-nfs--server--provisioner--0-eth0" Feb 9 06:51:13.471377 env[1448]: 2024-02-09 06:51:13.326 [INFO][3361] k8s.go 385: Populated endpoint ContainerID="bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.25-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6dd47a8f-f977-408d-9ff1-6622bcc35a72", ResourceVersion:"1713", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 51, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.25", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.51.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:51:13.471377 env[1448]: 2024-02-09 06:51:13.326 [INFO][3361] k8s.go 386: Calico CNI using IPs: [192.168.51.195/32] ContainerID="bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.25-k8s-nfs--server--provisioner--0-eth0" Feb 9 06:51:13.471377 env[1448]: 2024-02-09 06:51:13.326 [INFO][3361] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.25-k8s-nfs--server--provisioner--0-eth0" Feb 9 06:51:13.471377 env[1448]: 2024-02-09 06:51:13.452 [INFO][3361] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.25-k8s-nfs--server--provisioner--0-eth0" Feb 9 06:51:13.471558 env[1448]: 2024-02-09 06:51:13.457 [INFO][3361] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.25-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"6dd47a8f-f977-408d-9ff1-6622bcc35a72", ResourceVersion:"1713", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 51, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.25", ContainerID:"bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.51.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"9a:0d:32:ee:95:17", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:51:13.471558 env[1448]: 2024-02-09 06:51:13.470 [INFO][3361] k8s.go 491: Wrote updated endpoint to datastore ContainerID="bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.25-k8s-nfs--server--provisioner--0-eth0" Feb 9 06:51:13.476760 env[1448]: time="2024-02-09T06:51:13.476714948Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:51:13.476760 env[1448]: time="2024-02-09T06:51:13.476735555Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:51:13.476760 env[1448]: time="2024-02-09T06:51:13.476742238Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:51:13.476879 env[1448]: time="2024-02-09T06:51:13.476799955Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29 pid=3445 runtime=io.containerd.runc.v2 Feb 9 06:51:13.460000 audit[3423]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffc8b89a770 a2=0 a3=7ffc8b89a75c items=0 ppid=2107 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.534026 systemd[1]: Started cri-containerd-bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29.scope. Feb 9 06:51:13.615555 kernel: audit: type=1325 audit(1707461473.460:754): table=filter:75 family=2 entries=34 op=nft_register_rule pid=3423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:51:13.615590 kernel: audit: type=1300 audit(1707461473.460:754): arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffc8b89a770 a2=0 a3=7ffc8b89a75c items=0 ppid=2107 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.615604 kernel: audit: type=1327 audit(1707461473.460:754): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:51:13.460000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:51:13.672740 kernel: audit: type=1400 audit(1707461473.622:755): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.734000 audit: BPF prog-id=100 op=LOAD Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3445 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393163393562626334396462326630663338323763663834633264 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3445 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393163393562626334396462326630663338323763663834633264 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit: BPF prog-id=101 op=LOAD Feb 9 06:51:13.735000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024420 items=0 ppid=3445 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393163393562626334396462326630663338323763663834633264 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit: BPF prog-id=102 op=LOAD Feb 9 06:51:13.735000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024468 items=0 ppid=3445 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393163393562626334396462326630663338323763663834633264 Feb 9 06:51:13.735000 audit: BPF prog-id=102 op=UNLOAD Feb 9 06:51:13.735000 audit: BPF prog-id=101 op=UNLOAD Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { perfmon } for pid=3456 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit[3456]: AVC avc: denied { bpf } for pid=3456 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:51:13.735000 audit: BPF prog-id=103 op=LOAD Feb 9 06:51:13.735000 audit[3456]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024878 items=0 ppid=3445 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264393163393562626334396462326630663338323763663834633264 Feb 9 06:51:13.737000 audit[3423]: NETFILTER_CFG table=nat:76 family=2 entries=20 op=nft_register_rule pid=3423 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:51:13.737000 audit[3423]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc8b89a770 a2=0 a3=31030 items=0 ppid=2107 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.737000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:51:13.751921 env[1448]: time="2024-02-09T06:51:13.751885628Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:6dd47a8f-f977-408d-9ff1-6622bcc35a72,Namespace:default,Attempt:0,} returns sandbox id \"bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29\"" Feb 9 06:51:13.752000 audit[3479]: NETFILTER_CFG table=filter:77 family=2 entries=38 op=nft_register_chain pid=3479 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:51:13.752000 audit[3479]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffc680bfc20 a2=0 a3=7ffc680bfc0c items=0 ppid=2716 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:51:13.752000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:51:14.145330 kubelet[1872]: E0209 06:51:14.145307 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:15.056809 systemd-networkd[1300]: cali60e51b789ff: Gained IPv6LL Feb 9 06:51:15.146174 kubelet[1872]: E0209 06:51:15.146074 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:15.240880 systemd[1]: Started sshd@11-139.178.90.101:22-144.91.92.112:42832.service. Feb 9 06:51:15.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-144.91.92.112:42832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:16.135101 sshd[3481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.92.112 user=root Feb 9 06:51:16.134000 audit[3481]: USER_AUTH pid=3481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 06:51:16.146837 kubelet[1872]: E0209 06:51:16.146750 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:17.147042 kubelet[1872]: E0209 06:51:17.146936 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:18.147259 kubelet[1872]: E0209 06:51:18.147119 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:18.164438 sshd[3481]: Failed password for root from 144.91.92.112 port 42832 ssh2 Feb 9 06:51:19.147445 kubelet[1872]: E0209 06:51:19.147341 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:20.148410 kubelet[1872]: E0209 06:51:20.148335 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:20.252709 sshd[3481]: Received disconnect from 144.91.92.112 port 42832:11: Bye Bye [preauth] Feb 9 06:51:20.252709 sshd[3481]: Disconnected from authenticating user root 144.91.92.112 port 42832 [preauth] Feb 9 06:51:20.255363 systemd[1]: sshd@11-139.178.90.101:22-144.91.92.112:42832.service: Deactivated successfully. Feb 9 06:51:20.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-144.91.92.112:42832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:20.283232 kernel: kauditd_printk_skb: 64 callbacks suppressed Feb 9 06:51:20.283338 kernel: audit: type=1131 audit(1707461480.255:777): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.101:22-144.91.92.112:42832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:21.149556 kubelet[1872]: E0209 06:51:21.149430 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:22.149815 kubelet[1872]: E0209 06:51:22.149694 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:23.149998 kubelet[1872]: E0209 06:51:23.149883 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:24.151038 kubelet[1872]: E0209 06:51:24.150917 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:25.151517 kubelet[1872]: E0209 06:51:25.151388 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:26.152623 kubelet[1872]: E0209 06:51:26.152511 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:27.152725 kubelet[1872]: E0209 06:51:27.152671 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:28.152804 kubelet[1872]: E0209 06:51:28.152756 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:29.086539 kubelet[1872]: E0209 06:51:29.086420 1872 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:29.153826 kubelet[1872]: E0209 06:51:29.153707 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:30.154897 kubelet[1872]: E0209 06:51:30.154775 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:31.155884 kubelet[1872]: E0209 06:51:31.155762 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:32.156143 kubelet[1872]: E0209 06:51:32.156021 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:33.157022 kubelet[1872]: E0209 06:51:33.156905 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:34.157902 kubelet[1872]: E0209 06:51:34.157778 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:35.158969 kubelet[1872]: E0209 06:51:35.158910 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:36.159244 kubelet[1872]: E0209 06:51:36.159118 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:37.160080 kubelet[1872]: E0209 06:51:37.159956 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:38.161073 kubelet[1872]: E0209 06:51:38.160949 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:39.161919 kubelet[1872]: E0209 06:51:39.161798 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:40.162152 kubelet[1872]: E0209 06:51:40.162042 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:41.162513 kubelet[1872]: E0209 06:51:41.162374 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:42.163002 kubelet[1872]: E0209 06:51:42.162882 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:43.163536 kubelet[1872]: E0209 06:51:43.163400 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:44.164713 kubelet[1872]: E0209 06:51:44.164594 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:45.165068 kubelet[1872]: E0209 06:51:45.164948 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:46.165283 kubelet[1872]: E0209 06:51:46.165166 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:47.165439 kubelet[1872]: E0209 06:51:47.165324 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:48.166602 kubelet[1872]: E0209 06:51:48.166466 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:49.086873 kubelet[1872]: E0209 06:51:49.086803 1872 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:49.092518 env[1448]: time="2024-02-09T06:51:49.092356017Z" level=info msg="StopPodSandbox for \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\"" Feb 9 06:51:49.166609 kubelet[1872]: E0209 06:51:49.166571 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:49.172343 env[1448]: 2024-02-09 06:51:49.128 [WARNING][3543] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"4c04c5c0-be88-4b2b-b529-e31e19db453c", ResourceVersion:"1680", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 50, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.25", ContainerID:"fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011", Pod:"nginx-deployment-845c78c8b9-clb94", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali79f06d70597", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:51:49.172343 env[1448]: 2024-02-09 06:51:49.129 [INFO][3543] k8s.go 578: Cleaning up netns ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:51:49.172343 env[1448]: 2024-02-09 06:51:49.129 [INFO][3543] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" iface="eth0" netns="" Feb 9 06:51:49.172343 env[1448]: 2024-02-09 06:51:49.129 [INFO][3543] k8s.go 585: Releasing IP address(es) ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:51:49.172343 env[1448]: 2024-02-09 06:51:49.129 [INFO][3543] utils.go 188: Calico CNI releasing IP address ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:51:49.172343 env[1448]: 2024-02-09 06:51:49.161 [INFO][3561] ipam_plugin.go 415: Releasing address using handleID ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" HandleID="k8s-pod-network.ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Workload="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:51:49.172343 env[1448]: 2024-02-09 06:51:49.161 [INFO][3561] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:51:49.172343 env[1448]: 2024-02-09 06:51:49.161 [INFO][3561] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:51:49.172343 env[1448]: 2024-02-09 06:51:49.169 [WARNING][3561] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" HandleID="k8s-pod-network.ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Workload="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:51:49.172343 env[1448]: 2024-02-09 06:51:49.169 [INFO][3561] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" HandleID="k8s-pod-network.ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Workload="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:51:49.172343 env[1448]: 2024-02-09 06:51:49.171 [INFO][3561] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:51:49.172343 env[1448]: 2024-02-09 06:51:49.171 [INFO][3543] k8s.go 591: Teardown processing complete. ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:51:49.172685 env[1448]: time="2024-02-09T06:51:49.172362777Z" level=info msg="TearDown network for sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\" successfully" Feb 9 06:51:49.172685 env[1448]: time="2024-02-09T06:51:49.172381926Z" level=info msg="StopPodSandbox for \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\" returns successfully" Feb 9 06:51:49.172834 env[1448]: time="2024-02-09T06:51:49.172793261Z" level=info msg="RemovePodSandbox for \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\"" Feb 9 06:51:49.172834 env[1448]: time="2024-02-09T06:51:49.172811603Z" level=info msg="Forcibly stopping sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\"" Feb 9 06:51:49.213214 env[1448]: 2024-02-09 06:51:49.195 [WARNING][3589] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"4c04c5c0-be88-4b2b-b529-e31e19db453c", ResourceVersion:"1680", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 50, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.25", ContainerID:"fe6efa00645209ce34c1e2e3b10dc52a8d939d688615d1b37e6e5eb694f45011", Pod:"nginx-deployment-845c78c8b9-clb94", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali79f06d70597", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:51:49.213214 env[1448]: 2024-02-09 06:51:49.195 [INFO][3589] k8s.go 578: Cleaning up netns ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:51:49.213214 env[1448]: 2024-02-09 06:51:49.196 [INFO][3589] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" iface="eth0" netns="" Feb 9 06:51:49.213214 env[1448]: 2024-02-09 06:51:49.196 [INFO][3589] k8s.go 585: Releasing IP address(es) ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:51:49.213214 env[1448]: 2024-02-09 06:51:49.196 [INFO][3589] utils.go 188: Calico CNI releasing IP address ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:51:49.213214 env[1448]: 2024-02-09 06:51:49.205 [INFO][3605] ipam_plugin.go 415: Releasing address using handleID ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" HandleID="k8s-pod-network.ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Workload="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:51:49.213214 env[1448]: 2024-02-09 06:51:49.205 [INFO][3605] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:51:49.213214 env[1448]: 2024-02-09 06:51:49.205 [INFO][3605] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:51:49.213214 env[1448]: 2024-02-09 06:51:49.210 [WARNING][3605] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" HandleID="k8s-pod-network.ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Workload="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:51:49.213214 env[1448]: 2024-02-09 06:51:49.210 [INFO][3605] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" HandleID="k8s-pod-network.ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Workload="10.67.80.25-k8s-nginx--deployment--845c78c8b9--clb94-eth0" Feb 9 06:51:49.213214 env[1448]: 2024-02-09 06:51:49.212 [INFO][3605] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:51:49.213214 env[1448]: 2024-02-09 06:51:49.212 [INFO][3589] k8s.go 591: Teardown processing complete. ContainerID="ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599" Feb 9 06:51:49.213214 env[1448]: time="2024-02-09T06:51:49.213194663Z" level=info msg="TearDown network for sandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\" successfully" Feb 9 06:51:49.214318 env[1448]: time="2024-02-09T06:51:49.214283468Z" level=info msg="RemovePodSandbox \"ade72127c84c02ae834c848f7548628b3e7ba656bf6cb0a93beec68fa9bb1599\" returns successfully" Feb 9 06:51:49.214616 env[1448]: time="2024-02-09T06:51:49.214573369Z" level=info msg="StopPodSandbox for \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\"" Feb 9 06:51:49.273348 env[1448]: 2024-02-09 06:51:49.236 [WARNING][3633] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25-k8s-csi--node--driver--s9m5t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"18f52d4a-0597-44e7-a214-40bf2641a612", ResourceVersion:"1660", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 49, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.25", ContainerID:"09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa", Pod:"csi-node-driver-s9m5t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali93aed6525cc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:51:49.273348 env[1448]: 2024-02-09 06:51:49.236 [INFO][3633] k8s.go 578: Cleaning up netns ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:51:49.273348 env[1448]: 2024-02-09 06:51:49.236 [INFO][3633] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" iface="eth0" netns="" Feb 9 06:51:49.273348 env[1448]: 2024-02-09 06:51:49.236 [INFO][3633] k8s.go 585: Releasing IP address(es) ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:51:49.273348 env[1448]: 2024-02-09 06:51:49.236 [INFO][3633] utils.go 188: Calico CNI releasing IP address ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:51:49.273348 env[1448]: 2024-02-09 06:51:49.249 [INFO][3648] ipam_plugin.go 415: Releasing address using handleID ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" HandleID="k8s-pod-network.6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Workload="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:51:49.273348 env[1448]: 2024-02-09 06:51:49.249 [INFO][3648] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:51:49.273348 env[1448]: 2024-02-09 06:51:49.249 [INFO][3648] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:51:49.273348 env[1448]: 2024-02-09 06:51:49.264 [WARNING][3648] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" HandleID="k8s-pod-network.6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Workload="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:51:49.273348 env[1448]: 2024-02-09 06:51:49.264 [INFO][3648] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" HandleID="k8s-pod-network.6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Workload="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:51:49.273348 env[1448]: 2024-02-09 06:51:49.268 [INFO][3648] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:51:49.273348 env[1448]: 2024-02-09 06:51:49.270 [INFO][3633] k8s.go 591: Teardown processing complete. ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:51:49.274825 env[1448]: time="2024-02-09T06:51:49.273395513Z" level=info msg="TearDown network for sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\" successfully" Feb 9 06:51:49.274825 env[1448]: time="2024-02-09T06:51:49.273456052Z" level=info msg="StopPodSandbox for \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\" returns successfully" Feb 9 06:51:49.274825 env[1448]: time="2024-02-09T06:51:49.274289901Z" level=info msg="RemovePodSandbox for \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\"" Feb 9 06:51:49.274825 env[1448]: time="2024-02-09T06:51:49.274370620Z" level=info msg="Forcibly stopping sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\"" Feb 9 06:51:49.400382 env[1448]: 2024-02-09 06:51:49.347 [WARNING][3681] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25-k8s-csi--node--driver--s9m5t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"18f52d4a-0597-44e7-a214-40bf2641a612", ResourceVersion:"1660", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 49, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.25", ContainerID:"09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa", Pod:"csi-node-driver-s9m5t", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali93aed6525cc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:51:49.400382 env[1448]: 2024-02-09 06:51:49.348 [INFO][3681] k8s.go 578: Cleaning up netns ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:51:49.400382 env[1448]: 2024-02-09 06:51:49.348 [INFO][3681] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" iface="eth0" netns="" Feb 9 06:51:49.400382 env[1448]: 2024-02-09 06:51:49.348 [INFO][3681] k8s.go 585: Releasing IP address(es) ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:51:49.400382 env[1448]: 2024-02-09 06:51:49.348 [INFO][3681] utils.go 188: Calico CNI releasing IP address ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:51:49.400382 env[1448]: 2024-02-09 06:51:49.381 [INFO][3701] ipam_plugin.go 415: Releasing address using handleID ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" HandleID="k8s-pod-network.6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Workload="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:51:49.400382 env[1448]: 2024-02-09 06:51:49.381 [INFO][3701] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:51:49.400382 env[1448]: 2024-02-09 06:51:49.381 [INFO][3701] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:51:49.400382 env[1448]: 2024-02-09 06:51:49.394 [WARNING][3701] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" HandleID="k8s-pod-network.6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Workload="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:51:49.400382 env[1448]: 2024-02-09 06:51:49.394 [INFO][3701] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" HandleID="k8s-pod-network.6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Workload="10.67.80.25-k8s-csi--node--driver--s9m5t-eth0" Feb 9 06:51:49.400382 env[1448]: 2024-02-09 06:51:49.396 [INFO][3701] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:51:49.400382 env[1448]: 2024-02-09 06:51:49.398 [INFO][3681] k8s.go 591: Teardown processing complete. ContainerID="6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c" Feb 9 06:51:49.402031 env[1448]: time="2024-02-09T06:51:49.400437713Z" level=info msg="TearDown network for sandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\" successfully" Feb 9 06:51:49.403587 env[1448]: time="2024-02-09T06:51:49.403523055Z" level=info msg="RemovePodSandbox \"6a895d86fae74199bdad5b8a5c873d5c8704702d0c6534a0c498bdab188a195c\" returns successfully" Feb 9 06:51:50.167470 kubelet[1872]: E0209 06:51:50.167345 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:51.168303 kubelet[1872]: E0209 06:51:51.168178 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:52.169357 kubelet[1872]: E0209 06:51:52.169257 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:53.156761 systemd[1]: Started sshd@12-139.178.90.101:22-74.121.149.150:53682.service. Feb 9 06:51:53.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-74.121.149.150:53682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:53.170366 kubelet[1872]: E0209 06:51:53.170327 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:53.247679 kernel: audit: type=1130 audit(1707461513.155:778): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-74.121.149.150:53682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:51:54.171369 kubelet[1872]: E0209 06:51:54.171241 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:55.171527 kubelet[1872]: E0209 06:51:55.171403 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:56.171929 kubelet[1872]: E0209 06:51:56.171812 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:57.173167 kubelet[1872]: E0209 06:51:57.173061 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:57.954976 sshd[3721]: Invalid user zhangsan from 74.121.149.150 port 53682 Feb 9 06:51:57.960997 sshd[3721]: pam_faillock(sshd:auth): User unknown Feb 9 06:51:57.961967 sshd[3721]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:51:57.962056 sshd[3721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.121.149.150 Feb 9 06:51:57.963200 sshd[3721]: pam_faillock(sshd:auth): User unknown Feb 9 06:51:57.961000 audit[3721]: USER_AUTH pid=3721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zhangsan" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 06:51:58.055580 kernel: audit: type=1100 audit(1707461517.961:779): pid=3721 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="zhangsan" exe="/usr/sbin/sshd" hostname=74.121.149.150 addr=74.121.149.150 terminal=ssh res=failed' Feb 9 06:51:58.173418 kubelet[1872]: E0209 06:51:58.173206 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:59.173889 kubelet[1872]: E0209 06:51:59.173769 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:51:59.951867 sshd[3721]: Failed password for invalid user zhangsan from 74.121.149.150 port 53682 ssh2 Feb 9 06:52:00.156429 sshd[3721]: Received disconnect from 74.121.149.150 port 53682:11: Bye Bye [preauth] Feb 9 06:52:00.156429 sshd[3721]: Disconnected from invalid user zhangsan 74.121.149.150 port 53682 [preauth] Feb 9 06:52:00.158997 systemd[1]: sshd@12-139.178.90.101:22-74.121.149.150:53682.service: Deactivated successfully. Feb 9 06:52:00.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-74.121.149.150:53682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:00.173953 kubelet[1872]: E0209 06:52:00.173940 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:00.249491 kernel: audit: type=1131 audit(1707461520.158:780): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.101:22-74.121.149.150:53682 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:01.175223 kubelet[1872]: E0209 06:52:01.175105 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:02.175377 kubelet[1872]: E0209 06:52:02.175253 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:03.176160 kubelet[1872]: E0209 06:52:03.176036 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:04.176464 kubelet[1872]: E0209 06:52:04.176343 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:05.177287 kubelet[1872]: E0209 06:52:05.177161 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:06.178366 kubelet[1872]: E0209 06:52:06.178287 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:07.178620 kubelet[1872]: E0209 06:52:07.178514 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:08.179108 kubelet[1872]: E0209 06:52:08.179026 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:09.086245 kubelet[1872]: E0209 06:52:09.086130 1872 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:09.179318 kubelet[1872]: E0209 06:52:09.179208 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:10.180196 kubelet[1872]: E0209 06:52:10.180115 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:11.181189 kubelet[1872]: E0209 06:52:11.181079 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:12.181929 kubelet[1872]: E0209 06:52:12.181859 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:13.182260 kubelet[1872]: E0209 06:52:13.182139 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:14.183004 kubelet[1872]: E0209 06:52:14.182886 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:15.183753 kubelet[1872]: E0209 06:52:15.183642 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:16.184618 kubelet[1872]: E0209 06:52:16.184513 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:17.185926 kubelet[1872]: E0209 06:52:17.185805 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:18.186957 kubelet[1872]: E0209 06:52:18.186826 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:19.187604 kubelet[1872]: E0209 06:52:19.187472 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:20.188361 kubelet[1872]: E0209 06:52:20.188246 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:21.188765 kubelet[1872]: E0209 06:52:21.188635 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:22.188995 kubelet[1872]: E0209 06:52:22.188833 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:22.880835 systemd[1]: Started sshd@13-139.178.90.101:22-144.91.92.112:42882.service. Feb 9 06:52:22.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-144.91.92.112:42882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:22.972680 kernel: audit: type=1130 audit(1707461542.879:781): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-144.91.92.112:42882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:23.189434 kubelet[1872]: E0209 06:52:23.189325 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:23.795105 sshd[3777]: Invalid user newuser from 144.91.92.112 port 42882 Feb 9 06:52:23.801274 sshd[3777]: pam_faillock(sshd:auth): User unknown Feb 9 06:52:23.802257 sshd[3777]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:52:23.802348 sshd[3777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.92.112 Feb 9 06:52:23.803401 sshd[3777]: pam_faillock(sshd:auth): User unknown Feb 9 06:52:23.802000 audit[3777]: USER_AUTH pid=3777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="newuser" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 06:52:23.895675 kernel: audit: type=1100 audit(1707461543.802:782): pid=3777 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="newuser" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 06:52:24.190699 kubelet[1872]: E0209 06:52:24.190588 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:25.191636 kubelet[1872]: E0209 06:52:25.191581 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:26.192055 kubelet[1872]: E0209 06:52:26.191946 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:26.364313 sshd[3777]: Failed password for invalid user newuser from 144.91.92.112 port 42882 ssh2 Feb 9 06:52:27.192224 kubelet[1872]: E0209 06:52:27.192167 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:27.899915 sshd[3777]: Received disconnect from 144.91.92.112 port 42882:11: Bye Bye [preauth] Feb 9 06:52:27.899915 sshd[3777]: Disconnected from invalid user newuser 144.91.92.112 port 42882 [preauth] Feb 9 06:52:27.902450 systemd[1]: sshd@13-139.178.90.101:22-144.91.92.112:42882.service: Deactivated successfully. Feb 9 06:52:27.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-144.91.92.112:42882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:27.994663 kernel: audit: type=1131 audit(1707461547.901:783): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.101:22-144.91.92.112:42882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:52:28.193563 kubelet[1872]: E0209 06:52:28.193333 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:29.085937 kubelet[1872]: E0209 06:52:29.085838 1872 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:29.194138 kubelet[1872]: E0209 06:52:29.194071 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:30.194868 kubelet[1872]: E0209 06:52:30.194750 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:31.195565 kubelet[1872]: E0209 06:52:31.195448 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:32.196254 kubelet[1872]: E0209 06:52:32.196137 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:33.196891 kubelet[1872]: E0209 06:52:33.196775 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:34.197831 kubelet[1872]: E0209 06:52:34.197704 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:35.198992 kubelet[1872]: E0209 06:52:35.198923 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:36.199884 kubelet[1872]: E0209 06:52:36.199762 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:37.200887 kubelet[1872]: E0209 06:52:37.200770 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:38.201183 kubelet[1872]: E0209 06:52:38.201068 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:39.202426 kubelet[1872]: E0209 06:52:39.202310 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:40.202851 kubelet[1872]: E0209 06:52:40.202748 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:41.203994 kubelet[1872]: E0209 06:52:41.203874 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:42.205221 kubelet[1872]: E0209 06:52:42.205107 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:43.206128 kubelet[1872]: E0209 06:52:43.206013 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:44.207080 kubelet[1872]: E0209 06:52:44.206957 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:45.207883 kubelet[1872]: E0209 06:52:45.207764 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:46.208460 kubelet[1872]: E0209 06:52:46.208340 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:47.208796 kubelet[1872]: E0209 06:52:47.208677 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:48.209980 kubelet[1872]: E0209 06:52:48.209860 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:49.085967 kubelet[1872]: E0209 06:52:49.085849 1872 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:49.210147 kubelet[1872]: E0209 06:52:49.210040 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:50.210908 kubelet[1872]: E0209 06:52:50.210833 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:51.211624 kubelet[1872]: E0209 06:52:51.211505 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:52.212659 kubelet[1872]: E0209 06:52:52.212538 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:53.212938 kubelet[1872]: E0209 06:52:53.212832 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:54.213128 kubelet[1872]: E0209 06:52:54.213020 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:55.213519 kubelet[1872]: E0209 06:52:55.213389 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:56.214306 kubelet[1872]: E0209 06:52:56.214198 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:57.214770 kubelet[1872]: E0209 06:52:57.214653 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:58.215521 kubelet[1872]: E0209 06:52:58.215393 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:52:59.216707 kubelet[1872]: E0209 06:52:59.216585 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:00.217101 kubelet[1872]: E0209 06:53:00.217021 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:01.217812 kubelet[1872]: E0209 06:53:01.217734 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:02.218359 kubelet[1872]: E0209 06:53:02.218289 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:03.219025 kubelet[1872]: E0209 06:53:03.218942 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:04.219342 kubelet[1872]: E0209 06:53:04.219223 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:05.219846 kubelet[1872]: E0209 06:53:05.219734 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:06.220535 kubelet[1872]: E0209 06:53:06.220393 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:07.221089 kubelet[1872]: E0209 06:53:07.220969 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:08.221890 kubelet[1872]: E0209 06:53:08.221771 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:09.086912 kubelet[1872]: E0209 06:53:09.086789 1872 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:09.222541 kubelet[1872]: E0209 06:53:09.222414 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:10.223697 kubelet[1872]: E0209 06:53:10.223571 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:11.224721 kubelet[1872]: E0209 06:53:11.224647 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:12.225207 kubelet[1872]: E0209 06:53:12.225141 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:13.225602 kubelet[1872]: E0209 06:53:13.225500 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:14.226377 kubelet[1872]: E0209 06:53:14.226258 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:15.227040 kubelet[1872]: E0209 06:53:15.227019 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:16.227869 kubelet[1872]: E0209 06:53:16.227788 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:17.228965 kubelet[1872]: E0209 06:53:17.228894 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:18.230062 kubelet[1872]: E0209 06:53:18.229939 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:19.230986 kubelet[1872]: E0209 06:53:19.230909 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:20.231350 kubelet[1872]: E0209 06:53:20.231270 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:21.232093 kubelet[1872]: E0209 06:53:21.231963 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:22.233172 kubelet[1872]: E0209 06:53:22.233057 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:23.234322 kubelet[1872]: E0209 06:53:23.234257 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:24.235125 kubelet[1872]: E0209 06:53:24.235054 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:25.236330 kubelet[1872]: E0209 06:53:25.236277 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:26.236628 kubelet[1872]: E0209 06:53:26.236554 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:27.237170 kubelet[1872]: E0209 06:53:27.237100 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:28.238192 kubelet[1872]: E0209 06:53:28.238121 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:29.086827 kubelet[1872]: E0209 06:53:29.086758 1872 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:29.239067 kubelet[1872]: E0209 06:53:29.238998 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:30.240249 kubelet[1872]: E0209 06:53:30.240172 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:31.240890 kubelet[1872]: E0209 06:53:31.240770 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:32.241930 kubelet[1872]: E0209 06:53:32.241799 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:33.242798 kubelet[1872]: E0209 06:53:33.242675 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:34.243338 kubelet[1872]: E0209 06:53:34.243232 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:34.442137 systemd[1]: Started sshd@14-139.178.90.101:22-144.91.92.112:42934.service. Feb 9 06:53:34.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-144.91.92.112:42934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:34.534684 kernel: audit: type=1130 audit(1707461614.440:784): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-144.91.92.112:42934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:35.244138 kubelet[1872]: E0209 06:53:35.244083 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:35.388087 sshd[3862]: Invalid user xt from 144.91.92.112 port 42934 Feb 9 06:53:35.394290 sshd[3862]: pam_faillock(sshd:auth): User unknown Feb 9 06:53:35.395287 sshd[3862]: pam_unix(sshd:auth): check pass; user unknown Feb 9 06:53:35.395378 sshd[3862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.92.112 Feb 9 06:53:35.396429 sshd[3862]: pam_faillock(sshd:auth): User unknown Feb 9 06:53:35.395000 audit[3862]: USER_AUTH pid=3862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xt" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 06:53:35.488688 kernel: audit: type=1100 audit(1707461615.395:785): pid=3862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="xt" exe="/usr/sbin/sshd" hostname=144.91.92.112 addr=144.91.92.112 terminal=ssh res=failed' Feb 9 06:53:36.245062 kubelet[1872]: E0209 06:53:36.244946 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:37.246081 kubelet[1872]: E0209 06:53:37.245967 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:37.506402 sshd[3862]: Failed password for invalid user xt from 144.91.92.112 port 42934 ssh2 Feb 9 06:53:38.246774 kubelet[1872]: E0209 06:53:38.246658 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:39.246981 kubelet[1872]: E0209 06:53:39.246882 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:39.736124 sshd[3862]: Received disconnect from 144.91.92.112 port 42934:11: Bye Bye [preauth] Feb 9 06:53:39.736124 sshd[3862]: Disconnected from invalid user xt 144.91.92.112 port 42934 [preauth] Feb 9 06:53:39.738633 systemd[1]: sshd@14-139.178.90.101:22-144.91.92.112:42934.service: Deactivated successfully. Feb 9 06:53:39.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-144.91.92.112:42934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:39.831677 kernel: audit: type=1131 audit(1707461619.737:786): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.101:22-144.91.92.112:42934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 06:53:40.247866 kubelet[1872]: E0209 06:53:40.247749 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:41.248604 kubelet[1872]: E0209 06:53:41.248475 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:42.064679 update_engine[1440]: I0209 06:53:42.064550 1440 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 06:53:42.064679 update_engine[1440]: I0209 06:53:42.064633 1440 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 06:53:42.065635 update_engine[1440]: I0209 06:53:42.065279 1440 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 06:53:42.066228 update_engine[1440]: I0209 06:53:42.066138 1440 omaha_request_params.cc:62] Current group set to lts Feb 9 06:53:42.066456 update_engine[1440]: I0209 06:53:42.066427 1440 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 06:53:42.066456 update_engine[1440]: I0209 06:53:42.066447 1440 update_attempter.cc:643] Scheduling an action processor start. Feb 9 06:53:42.066709 update_engine[1440]: I0209 06:53:42.066481 1440 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 06:53:42.066709 update_engine[1440]: I0209 06:53:42.066570 1440 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 06:53:42.066937 update_engine[1440]: I0209 06:53:42.066707 1440 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 06:53:42.066937 update_engine[1440]: I0209 06:53:42.066725 1440 omaha_request_action.cc:271] Request: Feb 9 06:53:42.066937 update_engine[1440]: Feb 9 06:53:42.066937 update_engine[1440]: Feb 9 06:53:42.066937 update_engine[1440]: Feb 9 06:53:42.066937 update_engine[1440]: Feb 9 06:53:42.066937 update_engine[1440]: Feb 9 06:53:42.066937 update_engine[1440]: Feb 9 06:53:42.066937 update_engine[1440]: Feb 9 06:53:42.066937 update_engine[1440]: Feb 9 06:53:42.066937 update_engine[1440]: I0209 06:53:42.066735 1440 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 06:53:42.068037 locksmithd[1485]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 06:53:42.069820 update_engine[1440]: I0209 06:53:42.069746 1440 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 06:53:42.070004 update_engine[1440]: E0209 06:53:42.069965 1440 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 06:53:42.070167 update_engine[1440]: I0209 06:53:42.070122 1440 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 06:53:42.249095 kubelet[1872]: E0209 06:53:42.248975 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:42.910072 env[1448]: time="2024-02-09T06:53:42.910046743Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:53:42.910699 env[1448]: time="2024-02-09T06:53:42.910686694Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:53:42.911449 env[1448]: time="2024-02-09T06:53:42.911439015Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:53:42.912311 env[1448]: time="2024-02-09T06:53:42.912264769Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:53:42.912607 env[1448]: time="2024-02-09T06:53:42.912564631Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 06:53:42.913121 env[1448]: time="2024-02-09T06:53:42.913083337Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 06:53:42.913875 env[1448]: time="2024-02-09T06:53:42.913830148Z" level=info msg="CreateContainer within sandbox \"09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 06:53:42.918768 env[1448]: time="2024-02-09T06:53:42.918730909Z" level=info msg="CreateContainer within sandbox \"09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"fd393969bc8c541a371f8df4a0be9b3494cd4209ed3eb570b16b232f2bd25c40\"" Feb 9 06:53:42.919105 env[1448]: time="2024-02-09T06:53:42.919035797Z" level=info msg="StartContainer for \"fd393969bc8c541a371f8df4a0be9b3494cd4209ed3eb570b16b232f2bd25c40\"" Feb 9 06:53:42.941413 systemd[1]: Started cri-containerd-fd393969bc8c541a371f8df4a0be9b3494cd4209ed3eb570b16b232f2bd25c40.scope. Feb 9 06:53:42.946000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:42.946000 audit[3875]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3239 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:43.109318 kernel: audit: type=1400 audit(1707461622.946:787): avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.109353 kernel: audit: type=1300 audit(1707461622.946:787): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3239 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:43.109370 kernel: audit: type=1327 audit(1707461622.946:787): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333933393639626338633534316133373166386466346130626539 Feb 9 06:53:42.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333933393639626338633534316133373166386466346130626539 Feb 9 06:53:43.203313 kernel: audit: type=1400 audit(1707461622.946:788): avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:42.946000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.249093 kubelet[1872]: E0209 06:53:43.249051 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:43.267443 kernel: audit: type=1400 audit(1707461622.946:788): avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:42.946000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:42.946000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.395652 kernel: audit: type=1400 audit(1707461622.946:788): avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.395712 kernel: audit: type=1400 audit(1707461622.946:788): avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:42.946000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.401449 env[1448]: time="2024-02-09T06:53:43.401424049Z" level=info msg="StartContainer for \"fd393969bc8c541a371f8df4a0be9b3494cd4209ed3eb570b16b232f2bd25c40\" returns successfully" Feb 9 06:53:42.946000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.524949 kernel: audit: type=1400 audit(1707461622.946:788): avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.524988 kernel: audit: type=1400 audit(1707461622.946:788): avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:42.946000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:42.946000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:42.946000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:42.946000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:42.946000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:42.946000 audit: BPF prog-id=104 op=LOAD Feb 9 06:53:42.946000 audit[3875]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003925d0 items=0 ppid=3239 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:42.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333933393639626338633534316133373166386466346130626539 Feb 9 06:53:43.107000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.107000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.107000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.107000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.107000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.107000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.107000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.107000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.107000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.107000 audit: BPF prog-id=105 op=LOAD Feb 9 06:53:43.107000 audit[3875]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000392618 items=0 ppid=3239 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:43.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333933393639626338633534316133373166386466346130626539 Feb 9 06:53:43.265000 audit: BPF prog-id=105 op=UNLOAD Feb 9 06:53:43.265000 audit: BPF prog-id=104 op=UNLOAD Feb 9 06:53:43.265000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.265000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.265000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.265000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.265000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.265000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.265000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.265000 audit[3875]: AVC avc: denied { perfmon } for pid=3875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.265000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.265000 audit[3875]: AVC avc: denied { bpf } for pid=3875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:43.265000 audit: BPF prog-id=106 op=LOAD Feb 9 06:53:43.265000 audit[3875]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003926a8 items=0 ppid=3239 pid=3875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:43.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664333933393639626338633534316133373166386466346130626539 Feb 9 06:53:44.250197 kubelet[1872]: E0209 06:53:44.250098 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:45.250972 kubelet[1872]: E0209 06:53:45.250917 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:45.636094 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount787944134.mount: Deactivated successfully. Feb 9 06:53:46.251776 kubelet[1872]: E0209 06:53:46.251715 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:46.869623 env[1448]: time="2024-02-09T06:53:46.869565436Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:53:46.870263 env[1448]: time="2024-02-09T06:53:46.870220723Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:53:46.871454 env[1448]: time="2024-02-09T06:53:46.871414251Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:53:46.872291 env[1448]: time="2024-02-09T06:53:46.872242808Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:53:46.872730 env[1448]: time="2024-02-09T06:53:46.872689308Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 06:53:46.873175 env[1448]: time="2024-02-09T06:53:46.873141658Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 06:53:46.873977 env[1448]: time="2024-02-09T06:53:46.873914675Z" level=info msg="CreateContainer within sandbox \"bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 06:53:46.878363 env[1448]: time="2024-02-09T06:53:46.878326383Z" level=info msg="CreateContainer within sandbox \"bd91c95bbc49db2f0f3827cf84c2d8a6084c364024fe3ca66f09cb0aa10c3e29\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"a59cfae6773e71ee4f3b02b0a3458e663965b9083f59048943aec3104e26d400\"" Feb 9 06:53:46.878675 env[1448]: time="2024-02-09T06:53:46.878592278Z" level=info msg="StartContainer for \"a59cfae6773e71ee4f3b02b0a3458e663965b9083f59048943aec3104e26d400\"" Feb 9 06:53:46.900587 systemd[1]: Started cri-containerd-a59cfae6773e71ee4f3b02b0a3458e663965b9083f59048943aec3104e26d400.scope. Feb 9 06:53:46.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.933546 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 06:53:46.933619 kernel: audit: type=1400 audit(1707461626.904:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.062568 kernel: audit: type=1400 audit(1707461626.904:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.062596 kernel: audit: type=1400 audit(1707461626.904:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.126627 kernel: audit: type=1400 audit(1707461626.904:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.190983 kernel: audit: type=1400 audit(1707461626.904:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.252296 kubelet[1872]: E0209 06:53:47.252256 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:47.255277 kernel: audit: type=1400 audit(1707461626.904:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.383937 kernel: audit: type=1400 audit(1707461626.904:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.383968 kernel: audit: type=1400 audit(1707461626.904:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.448257 kernel: audit: type=1400 audit(1707461626.904:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.576483 kernel: audit: type=1400 audit(1707461626.997:802): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit: BPF prog-id=107 op=LOAD Feb 9 06:53:46.997000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3445 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:46.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135396366616536373733653731656534663362303262306133343538 Feb 9 06:53:46.997000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3445 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:46.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135396366616536373733653731656534663362303262306133343538 Feb 9 06:53:46.997000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:46.997000 audit: BPF prog-id=108 op=LOAD Feb 9 06:53:46.997000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003c83f0 items=0 ppid=3445 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:46.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135396366616536373733653731656534663362303262306133343538 Feb 9 06:53:47.125000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.125000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.125000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.125000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.125000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.125000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.125000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.125000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.125000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.125000 audit: BPF prog-id=109 op=LOAD Feb 9 06:53:47.125000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003c8438 items=0 ppid=3445 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:47.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135396366616536373733653731656534663362303262306133343538 Feb 9 06:53:47.253000 audit: BPF prog-id=109 op=UNLOAD Feb 9 06:53:47.253000 audit: BPF prog-id=108 op=UNLOAD Feb 9 06:53:47.253000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.253000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.253000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.253000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.253000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.253000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.253000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.253000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.253000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.253000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:47.253000 audit: BPF prog-id=110 op=LOAD Feb 9 06:53:47.253000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003c8848 items=0 ppid=3445 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:47.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135396366616536373733653731656534663362303262306133343538 Feb 9 06:53:47.595061 env[1448]: time="2024-02-09T06:53:47.594983214Z" level=info msg="StartContainer for \"a59cfae6773e71ee4f3b02b0a3458e663965b9083f59048943aec3104e26d400\" returns successfully" Feb 9 06:53:47.618000 audit[3965]: AVC avc: denied { search } for pid=3965 comm="rpcbind" name="crypto" dev="proc" ino=37940 scontext=system_u:system_r:svirt_lxc_net_t:s0:c639,c687 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 06:53:47.618000 audit[3965]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f2623c090c0 a2=0 a3=0 items=0 ppid=3947 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c639,c687 key=(null) Feb 9 06:53:47.618000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 06:53:47.637000 audit[3970]: AVC avc: denied { search } for pid=3970 comm="dbus-daemon" name="crypto" dev="proc" ino=37940 scontext=system_u:system_r:svirt_lxc_net_t:s0:c639,c687 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 06:53:47.637000 audit[3970]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fcf710f80c0 a2=0 a3=0 items=0 ppid=3947 pid=3970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c639,c687 key=(null) Feb 9 06:53:47.637000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 06:53:47.638000 audit[3971]: AVC avc: denied { watch } for pid=3971 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537998 scontext=system_u:system_r:svirt_lxc_net_t:s0:c639,c687 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c639,c687 tclass=dir permissive=0 Feb 9 06:53:47.638000 audit[3971]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55dc132e7970 a2=2c8 a3=7ffe9e4fd3ac items=0 ppid=3947 pid=3971 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c639,c687 key=(null) Feb 9 06:53:47.638000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 06:53:47.640000 audit[3972]: AVC avc: denied { read } for pid=3972 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=31263 scontext=system_u:system_r:svirt_lxc_net_t:s0:c639,c687 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 06:53:47.640000 audit[3972]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f9a35c86320 a1=80000 a2=d a3=7ffcee17ec30 items=0 ppid=3947 pid=3972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c639,c687 key=(null) Feb 9 06:53:47.640000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 06:53:47.641000 audit[3972]: AVC avc: denied { search } for pid=3972 comm="ganesha.nfsd" name="crypto" dev="proc" ino=37940 scontext=system_u:system_r:svirt_lxc_net_t:s0:c639,c687 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 06:53:47.641000 audit[3972]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f9a351da0c0 a2=0 a3=0 items=0 ppid=3947 pid=3972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c639,c687 key=(null) Feb 9 06:53:47.641000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 06:53:48.253138 kubelet[1872]: E0209 06:53:48.253034 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:48.427759 kubelet[1872]: I0209 06:53:48.427708 1872 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=3.307152263 podCreationTimestamp="2024-02-09 06:51:12 +0000 UTC" firstStartedPulling="2024-02-09 06:51:13.752441067 +0000 UTC m=+85.030781539" lastFinishedPulling="2024-02-09 06:53:46.872909883 +0000 UTC m=+238.151250357" observedRunningTime="2024-02-09 06:53:48.427103145 +0000 UTC m=+239.705443684" watchObservedRunningTime="2024-02-09 06:53:48.427621081 +0000 UTC m=+239.705961602" Feb 9 06:53:48.441000 audit[3991]: NETFILTER_CFG table=filter:78 family=2 entries=22 op=nft_register_rule pid=3991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:53:48.441000 audit[3991]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc0a8d5370 a2=0 a3=7ffc0a8d535c items=0 ppid=2107 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:48.441000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:53:48.452000 audit[3991]: NETFILTER_CFG table=nat:79 family=2 entries=104 op=nft_register_chain pid=3991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 06:53:48.452000 audit[3991]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffc0a8d5370 a2=0 a3=7ffc0a8d535c items=0 ppid=2107 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:48.452000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 06:53:49.086826 kubelet[1872]: E0209 06:53:49.086723 1872 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:49.253311 kubelet[1872]: E0209 06:53:49.253242 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:50.254444 kubelet[1872]: E0209 06:53:50.254335 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:51.255280 kubelet[1872]: E0209 06:53:51.255160 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:51.984751 update_engine[1440]: I0209 06:53:51.984558 1440 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 06:53:51.985447 update_engine[1440]: I0209 06:53:51.984934 1440 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 06:53:51.985447 update_engine[1440]: E0209 06:53:51.985121 1440 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 06:53:51.985447 update_engine[1440]: I0209 06:53:51.985272 1440 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 06:53:52.129226 env[1448]: time="2024-02-09T06:53:52.129178760Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:53:52.129782 env[1448]: time="2024-02-09T06:53:52.129739441Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:53:52.130468 env[1448]: time="2024-02-09T06:53:52.130429055Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:53:52.131231 env[1448]: time="2024-02-09T06:53:52.131181753Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:53:52.131853 env[1448]: time="2024-02-09T06:53:52.131811100Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 06:53:52.132850 env[1448]: time="2024-02-09T06:53:52.132836788Z" level=info msg="CreateContainer within sandbox \"09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 06:53:52.139071 env[1448]: time="2024-02-09T06:53:52.139024699Z" level=info msg="CreateContainer within sandbox \"09590bcf3e57fc4ac1d7b68e499d38e56ce6fd54c28b5315dbf7e7b84e7095aa\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"25b1a5dd1188bf742f63eb6ebfe631b2a50e3857fae70c756edd8c3255acb523\"" Feb 9 06:53:52.139415 env[1448]: time="2024-02-09T06:53:52.139384009Z" level=info msg="StartContainer for \"25b1a5dd1188bf742f63eb6ebfe631b2a50e3857fae70c756edd8c3255acb523\"" Feb 9 06:53:52.161462 systemd[1]: Started cri-containerd-25b1a5dd1188bf742f63eb6ebfe631b2a50e3857fae70c756edd8c3255acb523.scope. Feb 9 06:53:52.167000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.195084 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 06:53:52.195123 kernel: audit: type=1400 audit(1707461632.167:818): avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.255885 kubelet[1872]: E0209 06:53:52.255826 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:52.167000 audit[4014]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3239 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:52.355530 kernel: audit: type=1300 audit(1707461632.167:818): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3239 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:52.355560 kernel: audit: type=1327 audit(1707461632.167:818): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235623161356464313138386266373432663633656236656266653633 Feb 9 06:53:52.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235623161356464313138386266373432663633656236656266653633 Feb 9 06:53:52.167000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.515028 kernel: audit: type=1400 audit(1707461632.167:819): avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.515072 kernel: audit: type=1400 audit(1707461632.167:819): avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.167000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.579700 kernel: audit: type=1400 audit(1707461632.167:819): avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.167000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.167000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.707229 kernel: audit: type=1400 audit(1707461632.167:819): avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.707280 kernel: audit: type=1400 audit(1707461632.167:819): avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.167000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.722523 env[1448]: time="2024-02-09T06:53:52.722478078Z" level=info msg="StartContainer for \"25b1a5dd1188bf742f63eb6ebfe631b2a50e3857fae70c756edd8c3255acb523\" returns successfully" Feb 9 06:53:52.771276 kernel: audit: type=1400 audit(1707461632.167:819): avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.167000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.167000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.899328 kernel: audit: type=1400 audit(1707461632.167:819): avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.167000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.167000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.167000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.167000 audit: BPF prog-id=111 op=LOAD Feb 9 06:53:52.167000 audit[4014]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002cdf70 items=0 ppid=3239 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:52.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235623161356464313138386266373432663633656236656266653633 Feb 9 06:53:52.258000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.258000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.258000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.258000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.258000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.258000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.258000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.258000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.258000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.258000 audit: BPF prog-id=112 op=LOAD Feb 9 06:53:52.258000 audit[4014]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002cdfb8 items=0 ppid=3239 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:52.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235623161356464313138386266373432663633656236656266653633 Feb 9 06:53:52.449000 audit: BPF prog-id=112 op=UNLOAD Feb 9 06:53:52.449000 audit: BPF prog-id=111 op=UNLOAD Feb 9 06:53:52.449000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.449000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.449000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.449000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.449000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.449000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.449000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.449000 audit[4014]: AVC avc: denied { perfmon } for pid=4014 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.449000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.449000 audit[4014]: AVC avc: denied { bpf } for pid=4014 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:53:52.449000 audit: BPF prog-id=113 op=LOAD Feb 9 06:53:52.449000 audit[4014]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003ba048 items=0 ppid=3239 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:52.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235623161356464313138386266373432663633656236656266653633 Feb 9 06:53:53.256082 kubelet[1872]: E0209 06:53:53.255958 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:53.437396 kubelet[1872]: I0209 06:53:53.437279 1872 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-s9m5t" podStartSLOduration=71.508999597 podCreationTimestamp="2024-02-09 06:49:50 +0000 UTC" firstStartedPulling="2024-02-09 06:51:00.203843376 +0000 UTC m=+71.482183891" lastFinishedPulling="2024-02-09 06:53:52.13203374 +0000 UTC m=+243.410374216" observedRunningTime="2024-02-09 06:53:53.437076654 +0000 UTC m=+244.715417205" watchObservedRunningTime="2024-02-09 06:53:53.437189922 +0000 UTC m=+244.715530471" Feb 9 06:53:53.694163 kubelet[1872]: I0209 06:53:53.694075 1872 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 06:53:53.694163 kubelet[1872]: I0209 06:53:53.694147 1872 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 06:53:54.257181 kubelet[1872]: E0209 06:53:54.257064 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:55.257941 kubelet[1872]: E0209 06:53:55.257881 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:56.259167 kubelet[1872]: E0209 06:53:56.259049 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:57.171725 kubelet[1872]: I0209 06:53:57.171661 1872 topology_manager.go:212] "Topology Admit Handler" Feb 9 06:53:57.185779 systemd[1]: Created slice kubepods-besteffort-podba5b0760_ed4a_4468_a293_f3d7e00bd79d.slice. Feb 9 06:53:57.259259 kubelet[1872]: E0209 06:53:57.259191 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:57.289910 kubelet[1872]: I0209 06:53:57.289809 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-a09bbac0-f0c6-4fc6-927d-ce3360f1f04b\" (UniqueName: \"kubernetes.io/nfs/ba5b0760-ed4a-4468-a293-f3d7e00bd79d-pvc-a09bbac0-f0c6-4fc6-927d-ce3360f1f04b\") pod \"test-pod-1\" (UID: \"ba5b0760-ed4a-4468-a293-f3d7e00bd79d\") " pod="default/test-pod-1" Feb 9 06:53:57.290216 kubelet[1872]: I0209 06:53:57.289931 1872 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c8rsj\" (UniqueName: \"kubernetes.io/projected/ba5b0760-ed4a-4468-a293-f3d7e00bd79d-kube-api-access-c8rsj\") pod \"test-pod-1\" (UID: \"ba5b0760-ed4a-4468-a293-f3d7e00bd79d\") " pod="default/test-pod-1" Feb 9 06:53:57.412000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:57.440890 kernel: Failed to create system directory netfs Feb 9 06:53:57.440941 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 06:53:57.440957 kernel: audit: type=1400 audit(1707461637.412:824): avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:57.440968 kernel: Failed to create system directory netfs Feb 9 06:53:57.412000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:57.468556 kernel: audit: type=1400 audit(1707461637.412:824): avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:57.412000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:57.667555 kernel: Failed to create system directory netfs Feb 9 06:53:57.667595 kernel: audit: type=1400 audit(1707461637.412:824): avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:57.780053 kernel: Failed to create system directory netfs Feb 9 06:53:57.780086 kernel: audit: type=1400 audit(1707461637.412:824): avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:57.412000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:57.412000 audit[4063]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e66ad245e0 a1=153bc a2=55e669b3b2b0 a3=5 items=0 ppid=644 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:57.412000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 06:53:58.013249 kernel: audit: type=1300 audit(1707461637.412:824): arch=c000003e syscall=175 success=yes exit=0 a0=55e66ad245e0 a1=153bc a2=55e669b3b2b0 a3=5 items=0 ppid=644 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:58.013280 kernel: audit: type=1327 audit(1707461637.412:824): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.038604 kernel: Failed to create system directory fscache Feb 9 06:53:58.038634 kernel: audit: type=1400 audit(1707461637.892:825): avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.038648 kernel: Failed to create system directory fscache Feb 9 06:53:58.121988 kernel: audit: type=1400 audit(1707461637.892:825): avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.146959 kernel: Failed to create system directory fscache Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.230548 kernel: audit: type=1400 audit(1707461637.892:825): avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.254521 kernel: Failed to create system directory fscache Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.336578 kubelet[1872]: E0209 06:53:58.336524 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:58.360892 kernel: audit: type=1400 audit(1707461637.892:825): avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.360912 kernel: Failed to create system directory fscache Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.489429 kernel: Failed to create system directory fscache Feb 9 06:53:58.489473 kernel: Failed to create system directory fscache Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.512610 kernel: Failed to create system directory fscache Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.535387 kernel: Failed to create system directory fscache Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.557703 kernel: Failed to create system directory fscache Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.579620 kernel: Failed to create system directory fscache Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.601039 kernel: Failed to create system directory fscache Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.622021 kernel: Failed to create system directory fscache Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.642911 kernel: Failed to create system directory fscache Feb 9 06:53:57.892000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.683491 kernel: FS-Cache: Loaded Feb 9 06:53:57.892000 audit[4063]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e66af399c0 a1=4c0fc a2=55e669b3b2b0 a3=5 items=0 ppid=644 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:57.892000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.741769 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.741798 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.741816 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.760707 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.779252 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.797660 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.815765 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.833382 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.850743 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.867726 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.884328 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.900509 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.916243 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.931798 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.946984 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.961766 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.976077 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.989981 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.003457 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.016472 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.029097 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.041294 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.053144 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.064540 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.075544 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.086425 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.096844 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.106836 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.116389 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.125766 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.134779 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.143378 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.151478 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.159438 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.167031 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.174195 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.180914 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.187439 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.193983 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.200503 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.207023 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.213547 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.220070 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.226590 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.233102 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.239669 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.246178 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.258817 kernel: Failed to create system directory sunrpc Feb 9 06:53:59.258850 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.265073 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.271306 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.277530 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.283788 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.290002 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.296308 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.302544 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.308770 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.315013 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.321262 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.327503 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.333740 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.336940 kubelet[1872]: E0209 06:53:59.336898 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:53:59.339969 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.346212 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.352435 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.358678 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.364893 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.371153 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.377387 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.383595 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.389848 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.396073 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.402321 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.408529 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.414779 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.420995 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.427231 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.433457 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.439684 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.445912 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.452146 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.458383 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.464634 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.470862 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.477095 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.483326 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.489545 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.495787 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.502007 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.508233 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.514483 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.526947 kernel: Failed to create system directory sunrpc Feb 9 06:53:59.527011 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.533177 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.539407 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.545667 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.551890 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.558146 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.564398 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.570680 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.576914 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.583139 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.589371 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.595587 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.601820 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.608060 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.614290 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.620531 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.626788 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.633025 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.639272 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.645472 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.651704 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.657951 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.664206 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.670458 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.676701 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.682925 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.689202 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.695434 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.701661 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.707876 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.714132 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.720377 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.726588 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.732847 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.739119 kernel: Failed to create system directory sunrpc Feb 9 06:53:58.695000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.764809 kernel: RPC: Registered named UNIX socket transport module. Feb 9 06:53:59.764865 kernel: RPC: Registered udp transport module. Feb 9 06:53:59.764896 kernel: RPC: Registered tcp transport module. Feb 9 06:53:59.771112 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 06:53:58.695000 audit[4063]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e66af85ad0 a1=1588c4 a2=55e669b3b2b0 a3=5 items=6 ppid=644 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:58.695000 audit: CWD cwd="/" Feb 9 06:53:58.695000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:53:58.695000 audit: PATH item=1 name=(null) inode=23340 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:53:58.695000 audit: PATH item=2 name=(null) inode=23340 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:53:58.695000 audit: PATH item=3 name=(null) inode=23341 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:53:58.695000 audit: PATH item=4 name=(null) inode=23340 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:53:58.695000 audit: PATH item=5 name=(null) inode=23342 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 06:53:58.695000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.812048 kernel: Failed to create system directory nfs Feb 9 06:53:59.812074 kernel: Failed to create system directory nfs Feb 9 06:53:59.812086 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.825331 kernel: Failed to create system directory nfs Feb 9 06:53:59.825355 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.831997 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.838589 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.845206 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.851829 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.858422 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.865042 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.871646 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.878251 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.884849 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.891460 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.898087 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.911303 kernel: Failed to create system directory nfs Feb 9 06:53:59.911326 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.917882 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.924480 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.931079 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.937689 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.944266 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.950850 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.957438 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.964035 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.970617 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.977200 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.983813 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.990388 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.996991 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.003544 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.010184 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.016785 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.023374 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.029934 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.036510 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.043106 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.049678 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.056280 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.062863 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.069445 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.076027 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.082633 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.089059 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.095356 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.101661 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.107808 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.113752 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.119690 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.125613 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.131530 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.137515 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.143445 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.149375 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.155299 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.161238 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.167170 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.173099 kernel: Failed to create system directory nfs Feb 9 06:53:59.793000 audit[4063]: AVC avc: denied { confidentiality } for pid=4063 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:53:59.793000 audit[4063]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e66b128680 a1=e29dc a2=55e669b3b2b0 a3=5 items=0 ppid=644 pid=4063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:53:59.793000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 06:54:00.194557 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.230494 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.230523 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.230535 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.236816 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.243131 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.249508 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.255820 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.262145 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.268481 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.274820 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.281164 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.287503 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.293840 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.300172 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.306509 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.312845 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.319191 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.325519 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.337728 kubelet[1872]: E0209 06:54:00.337689 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:54:00.338223 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.338273 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.344548 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.350918 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.357245 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.363537 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.369916 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.376248 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.382578 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.388913 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.395242 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.401545 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.407906 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.414248 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.420537 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.426898 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.433232 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.439622 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.445956 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.452285 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.458633 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.464970 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.471288 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.477625 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.483981 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.490332 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.496702 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.503037 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.509395 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.515612 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.521655 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.527710 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.533759 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.539834 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.545906 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.551967 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.558017 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.564085 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.570110 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.576142 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.582193 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.588215 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.594234 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.600256 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.606276 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.612274 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.618285 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.624307 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.630287 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.636315 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.642309 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.648296 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.654275 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.660258 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.666252 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.672232 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.678204 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.684165 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.690154 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.696146 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.702108 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.708118 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.714103 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.720084 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.726059 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.732034 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.737998 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.743949 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.749941 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.755894 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.761837 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.767799 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.773767 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.779703 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.785596 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.791565 kernel: Failed to create system directory nfs4 Feb 9 06:54:00.210000 audit[4071]: AVC avc: denied { confidentiality } for pid=4071 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.899384 kernel: NFS: Registering the id_resolver key type Feb 9 06:54:00.899412 kernel: Key type id_resolver registered Feb 9 06:54:00.899424 kernel: Key type id_legacy registered Feb 9 06:54:00.210000 audit[4071]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f0fd846e010 a1=1d3cc4 a2=55a10e7d02b0 a3=5 items=0 ppid=644 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:00.210000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.924857 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.924915 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.924927 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.931462 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.938115 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.944754 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.951419 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.958016 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.964608 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.971213 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.977842 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.984469 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.991079 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.997673 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:01.004304 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:01.010954 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:01.017569 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:01.024298 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:01.030940 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:01.037566 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:01.044261 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:01.050893 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:01.057566 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:01.064274 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:01.070911 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:01.077542 kernel: Failed to create system directory rpcgss Feb 9 06:54:00.909000 audit[4072]: AVC avc: denied { confidentiality } for pid=4072 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 06:54:00.909000 audit[4072]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa98b602010 a1=4f524 a2=55b34e0e42b0 a3=5 items=0 ppid=644 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:00.909000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 06:54:01.108916 nfsidmap[4081]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-5a64198dec' Feb 9 06:54:01.110626 nfsidmap[4082]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-5a64198dec' Feb 9 06:54:01.122000 audit[1513]: AVC avc: denied { watch_reads } for pid=1513 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3121 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 06:54:01.122000 audit[1513]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561c4ff32030 a2=10 a3=6e1cc0f691b3ba39 items=0 ppid=1 pid=1513 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:01.122000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 06:54:01.122000 audit[1513]: AVC avc: denied { watch_reads } for pid=1513 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3121 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 06:54:01.122000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3121 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 06:54:01.122000 audit[1513]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561c4ff32030 a2=10 a3=6e1cc0f691b3ba39 items=0 ppid=1 pid=1513 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:01.122000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 06:54:01.122000 audit[1513]: AVC avc: denied { watch_reads } for pid=1513 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3121 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 06:54:01.122000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3121 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 06:54:01.122000 audit[1513]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561c4ff32030 a2=10 a3=6e1cc0f691b3ba39 items=0 ppid=1 pid=1513 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:01.122000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 06:54:01.122000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=3121 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 06:54:01.338640 kubelet[1872]: E0209 06:54:01.338440 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:54:01.391766 env[1448]: time="2024-02-09T06:54:01.391620360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ba5b0760-ed4a-4468-a293-f3d7e00bd79d,Namespace:default,Attempt:0,}" Feb 9 06:54:01.650084 systemd-networkd[1300]: cali5ec59c6bf6e: Link UP Feb 9 06:54:01.658493 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 06:54:01.658580 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 06:54:01.668149 systemd-networkd[1300]: cali5ec59c6bf6e: Gained carrier Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.478 [INFO][4084] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.25-k8s-test--pod--1-eth0 default ba5b0760-ed4a-4468-a293-f3d7e00bd79d 2084 0 2024-02-09 06:51:13 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.25 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.25-k8s-test--pod--1-" Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.479 [INFO][4084] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.25-k8s-test--pod--1-eth0" Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.611 [INFO][4106] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" HandleID="k8s-pod-network.2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" Workload="10.67.80.25-k8s-test--pod--1-eth0" Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.618 [INFO][4106] ipam_plugin.go 268: Auto assigning IP ContainerID="2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" HandleID="k8s-pod-network.2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" Workload="10.67.80.25-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033f1c0), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.25", "pod":"test-pod-1", "timestamp":"2024-02-09 06:54:01.611412646 +0000 UTC"}, Hostname:"10.67.80.25", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.618 [INFO][4106] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.618 [INFO][4106] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.618 [INFO][4106] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.25' Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.620 [INFO][4106] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" host="10.67.80.25" Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.625 [INFO][4106] ipam.go 372: Looking up existing affinities for host host="10.67.80.25" Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.629 [INFO][4106] ipam.go 489: Trying affinity for 192.168.51.192/26 host="10.67.80.25" Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.631 [INFO][4106] ipam.go 155: Attempting to load block cidr=192.168.51.192/26 host="10.67.80.25" Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.634 [INFO][4106] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.51.192/26 host="10.67.80.25" Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.634 [INFO][4106] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.51.192/26 handle="k8s-pod-network.2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" host="10.67.80.25" Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.636 [INFO][4106] ipam.go 1682: Creating new handle: k8s-pod-network.2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97 Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.640 [INFO][4106] ipam.go 1203: Writing block in order to claim IPs block=192.168.51.192/26 handle="k8s-pod-network.2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" host="10.67.80.25" Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.644 [INFO][4106] ipam.go 1216: Successfully claimed IPs: [192.168.51.196/26] block=192.168.51.192/26 handle="k8s-pod-network.2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" host="10.67.80.25" Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.644 [INFO][4106] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.51.196/26] handle="k8s-pod-network.2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" host="10.67.80.25" Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.644 [INFO][4106] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.645 [INFO][4106] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.51.196/26] IPv6=[] ContainerID="2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" HandleID="k8s-pod-network.2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" Workload="10.67.80.25-k8s-test--pod--1-eth0" Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.647 [INFO][4084] k8s.go 385: Populated endpoint ContainerID="2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.25-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ba5b0760-ed4a-4468-a293-f3d7e00bd79d", ResourceVersion:"2084", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 51, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.25", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:54:01.693825 env[1448]: 2024-02-09 06:54:01.647 [INFO][4084] k8s.go 386: Calico CNI using IPs: [192.168.51.196/32] ContainerID="2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.25-k8s-test--pod--1-eth0" Feb 9 06:54:01.694315 env[1448]: 2024-02-09 06:54:01.647 [INFO][4084] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.25-k8s-test--pod--1-eth0" Feb 9 06:54:01.694315 env[1448]: 2024-02-09 06:54:01.668 [INFO][4084] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.25-k8s-test--pod--1-eth0" Feb 9 06:54:01.694315 env[1448]: 2024-02-09 06:54:01.668 [INFO][4084] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.25-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.25-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"ba5b0760-ed4a-4468-a293-f3d7e00bd79d", ResourceVersion:"2084", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 6, 51, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.25", ContainerID:"2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.51.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"32:56:ae:2a:a7:11", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 06:54:01.694315 env[1448]: 2024-02-09 06:54:01.693 [INFO][4084] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.67.80.25-k8s-test--pod--1-eth0" Feb 9 06:54:01.699719 env[1448]: time="2024-02-09T06:54:01.699680829Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 06:54:01.699719 env[1448]: time="2024-02-09T06:54:01.699704242Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 06:54:01.699719 env[1448]: time="2024-02-09T06:54:01.699712078Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 06:54:01.699855 env[1448]: time="2024-02-09T06:54:01.699777883Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97 pid=4141 runtime=io.containerd.runc.v2 Feb 9 06:54:01.699000 audit[4142]: NETFILTER_CFG table=filter:80 family=2 entries=38 op=nft_register_chain pid=4142 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 06:54:01.699000 audit[4142]: SYSCALL arch=c000003e syscall=46 success=yes exit=19080 a0=3 a1=7ffc5330be90 a2=0 a3=7ffc5330be7c items=0 ppid=2716 pid=4142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:01.699000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 06:54:01.718810 systemd[1]: Started cri-containerd-2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97.scope. Feb 9 06:54:01.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.727000 audit: BPF prog-id=114 op=LOAD Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=4141 pid=4152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:01.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366636393966623365343638363135653366336561383461646330 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=4141 pid=4152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:01.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366636393966623365343638363135653366336561383461646330 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit: BPF prog-id=115 op=LOAD Feb 9 06:54:01.728000 audit[4152]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000253540 items=0 ppid=4141 pid=4152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:01.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366636393966623365343638363135653366336561383461646330 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit: BPF prog-id=116 op=LOAD Feb 9 06:54:01.728000 audit[4152]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000253588 items=0 ppid=4141 pid=4152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:01.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366636393966623365343638363135653366336561383461646330 Feb 9 06:54:01.728000 audit: BPF prog-id=116 op=UNLOAD Feb 9 06:54:01.728000 audit: BPF prog-id=115 op=UNLOAD Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { perfmon } for pid=4152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit[4152]: AVC avc: denied { bpf } for pid=4152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:01.728000 audit: BPF prog-id=117 op=LOAD Feb 9 06:54:01.728000 audit[4152]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000253998 items=0 ppid=4141 pid=4152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:01.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261366636393966623365343638363135653366336561383461646330 Feb 9 06:54:01.776755 env[1448]: time="2024-02-09T06:54:01.776681815Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:ba5b0760-ed4a-4468-a293-f3d7e00bd79d,Namespace:default,Attempt:0,} returns sandbox id \"2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97\"" Feb 9 06:54:01.777919 env[1448]: time="2024-02-09T06:54:01.777895205Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 06:54:01.981932 update_engine[1440]: I0209 06:54:01.981705 1440 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 06:54:01.982641 update_engine[1440]: I0209 06:54:01.982138 1440 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 06:54:01.982641 update_engine[1440]: E0209 06:54:01.982323 1440 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 06:54:01.982641 update_engine[1440]: I0209 06:54:01.982522 1440 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 06:54:02.148631 env[1448]: time="2024-02-09T06:54:02.148508108Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:54:02.150782 env[1448]: time="2024-02-09T06:54:02.150687930Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:54:02.155177 env[1448]: time="2024-02-09T06:54:02.155080519Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:54:02.159421 env[1448]: time="2024-02-09T06:54:02.159329491Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 06:54:02.161540 env[1448]: time="2024-02-09T06:54:02.161418637Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 06:54:02.165512 env[1448]: time="2024-02-09T06:54:02.165395714Z" level=info msg="CreateContainer within sandbox \"2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 06:54:02.178799 env[1448]: time="2024-02-09T06:54:02.178683206Z" level=info msg="CreateContainer within sandbox \"2a6f699fb3e468615e3f3ea84adc098d77b35b533e6309e91a3d48bef0a3fd97\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"98567b4738a05a1eda1bffacb47879c59c9a95e471a63848be188baf598ea63a\"" Feb 9 06:54:02.179478 env[1448]: time="2024-02-09T06:54:02.179410844Z" level=info msg="StartContainer for \"98567b4738a05a1eda1bffacb47879c59c9a95e471a63848be188baf598ea63a\"" Feb 9 06:54:02.214798 systemd[1]: Started cri-containerd-98567b4738a05a1eda1bffacb47879c59c9a95e471a63848be188baf598ea63a.scope. Feb 9 06:54:02.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit: BPF prog-id=118 op=LOAD Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4141 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:02.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938353637623437333861303561316564613162666661636234373837 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4141 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:02.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938353637623437333861303561316564613162666661636234373837 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit: BPF prog-id=119 op=LOAD Feb 9 06:54:02.220000 audit[4181]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d2120 items=0 ppid=4141 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:02.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938353637623437333861303561316564613162666661636234373837 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit: BPF prog-id=120 op=LOAD Feb 9 06:54:02.220000 audit[4181]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d2168 items=0 ppid=4141 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:02.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938353637623437333861303561316564613162666661636234373837 Feb 9 06:54:02.220000 audit: BPF prog-id=120 op=UNLOAD Feb 9 06:54:02.220000 audit: BPF prog-id=119 op=UNLOAD Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 06:54:02.220000 audit: BPF prog-id=121 op=LOAD Feb 9 06:54:02.220000 audit[4181]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d2578 items=0 ppid=4141 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 06:54:02.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938353637623437333861303561316564613162666661636234373837 Feb 9 06:54:02.239609 env[1448]: time="2024-02-09T06:54:02.239546146Z" level=info msg="StartContainer for \"98567b4738a05a1eda1bffacb47879c59c9a95e471a63848be188baf598ea63a\" returns successfully" Feb 9 06:54:02.339133 kubelet[1872]: E0209 06:54:02.339025 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:54:02.457848 kubelet[1872]: I0209 06:54:02.457747 1872 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=169.073477545 podCreationTimestamp="2024-02-09 06:51:13 +0000 UTC" firstStartedPulling="2024-02-09 06:54:01.777662289 +0000 UTC m=+253.056002776" lastFinishedPulling="2024-02-09 06:54:02.16184992 +0000 UTC m=+253.440190492" observedRunningTime="2024-02-09 06:54:02.457204945 +0000 UTC m=+253.735545478" watchObservedRunningTime="2024-02-09 06:54:02.457665261 +0000 UTC m=+253.736005778" Feb 9 06:54:03.184943 systemd-networkd[1300]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 06:54:03.340359 kubelet[1872]: E0209 06:54:03.340284 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:54:04.341352 kubelet[1872]: E0209 06:54:04.341270 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:54:05.341722 kubelet[1872]: E0209 06:54:05.341644 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:54:06.342235 kubelet[1872]: E0209 06:54:06.342159 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 06:54:07.342846 kubelet[1872]: E0209 06:54:07.342756 1872 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"