Feb 9 21:37:05.567040 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 21:37:05.567053 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 21:37:05.567060 kernel: BIOS-provided physical RAM map: Feb 9 21:37:05.567064 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 9 21:37:05.567068 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 9 21:37:05.567071 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 9 21:37:05.567076 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 9 21:37:05.567080 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 9 21:37:05.567084 kernel: BIOS-e820: [mem 0x0000000040400000-0x00000000820e1fff] usable Feb 9 21:37:05.567087 kernel: BIOS-e820: [mem 0x00000000820e2000-0x00000000820e2fff] ACPI NVS Feb 9 21:37:05.567092 kernel: BIOS-e820: [mem 0x00000000820e3000-0x00000000820e3fff] reserved Feb 9 21:37:05.567096 kernel: BIOS-e820: [mem 0x00000000820e4000-0x000000008afccfff] usable Feb 9 21:37:05.567100 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Feb 9 21:37:05.567103 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Feb 9 21:37:05.567108 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Feb 9 21:37:05.567113 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Feb 9 21:37:05.567118 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Feb 9 21:37:05.567122 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Feb 9 21:37:05.567126 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 9 21:37:05.567130 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 9 21:37:05.567134 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 9 21:37:05.567138 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 9 21:37:05.567142 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 9 21:37:05.567146 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Feb 9 21:37:05.567150 kernel: NX (Execute Disable) protection: active Feb 9 21:37:05.567155 kernel: SMBIOS 3.2.1 present. Feb 9 21:37:05.567159 kernel: DMI: Supermicro X11SCM-F/X11SCM-F, BIOS 1.9 09/16/2022 Feb 9 21:37:05.567164 kernel: tsc: Detected 3400.000 MHz processor Feb 9 21:37:05.567168 kernel: tsc: Detected 3399.906 MHz TSC Feb 9 21:37:05.567172 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 21:37:05.567177 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 21:37:05.567181 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Feb 9 21:37:05.567186 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 21:37:05.567190 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Feb 9 21:37:05.567194 kernel: Using GB pages for direct mapping Feb 9 21:37:05.567198 kernel: ACPI: Early table checksum verification disabled Feb 9 21:37:05.567203 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 9 21:37:05.567208 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 9 21:37:05.567212 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Feb 9 21:37:05.567216 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 9 21:37:05.567222 kernel: ACPI: FACS 0x000000008C66CF80 000040 Feb 9 21:37:05.567227 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Feb 9 21:37:05.567232 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Feb 9 21:37:05.567237 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 9 21:37:05.567242 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 9 21:37:05.567246 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 9 21:37:05.567251 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 9 21:37:05.567256 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 9 21:37:05.567260 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 9 21:37:05.567265 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:37:05.567270 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 9 21:37:05.567275 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 9 21:37:05.567279 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:37:05.567284 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:37:05.567289 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 9 21:37:05.567293 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 9 21:37:05.567298 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:37:05.567302 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 9 21:37:05.567308 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 9 21:37:05.567312 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Feb 9 21:37:05.567317 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 9 21:37:05.567321 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 9 21:37:05.567326 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 9 21:37:05.567331 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Feb 9 21:37:05.567335 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 9 21:37:05.567340 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 9 21:37:05.567345 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 9 21:37:05.567350 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 9 21:37:05.567355 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 9 21:37:05.567359 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Feb 9 21:37:05.567364 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Feb 9 21:37:05.567368 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Feb 9 21:37:05.567373 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Feb 9 21:37:05.567378 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Feb 9 21:37:05.567382 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Feb 9 21:37:05.567387 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Feb 9 21:37:05.567392 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Feb 9 21:37:05.567397 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Feb 9 21:37:05.567401 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Feb 9 21:37:05.567406 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Feb 9 21:37:05.567410 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Feb 9 21:37:05.567415 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Feb 9 21:37:05.567419 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Feb 9 21:37:05.567424 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Feb 9 21:37:05.567429 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Feb 9 21:37:05.567434 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Feb 9 21:37:05.567439 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Feb 9 21:37:05.567446 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Feb 9 21:37:05.567450 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Feb 9 21:37:05.567455 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Feb 9 21:37:05.567486 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Feb 9 21:37:05.567491 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Feb 9 21:37:05.567495 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Feb 9 21:37:05.567501 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Feb 9 21:37:05.567506 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Feb 9 21:37:05.567526 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Feb 9 21:37:05.567531 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Feb 9 21:37:05.567549 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Feb 9 21:37:05.567553 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Feb 9 21:37:05.567558 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Feb 9 21:37:05.567563 kernel: No NUMA configuration found Feb 9 21:37:05.567567 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Feb 9 21:37:05.567572 kernel: NODE_DATA(0) allocated [mem 0x86eff7000-0x86effcfff] Feb 9 21:37:05.567577 kernel: Zone ranges: Feb 9 21:37:05.567582 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 21:37:05.567587 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 21:37:05.567591 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Feb 9 21:37:05.567596 kernel: Movable zone start for each node Feb 9 21:37:05.567600 kernel: Early memory node ranges Feb 9 21:37:05.567605 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 9 21:37:05.567609 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 9 21:37:05.567614 kernel: node 0: [mem 0x0000000040400000-0x00000000820e1fff] Feb 9 21:37:05.567619 kernel: node 0: [mem 0x00000000820e4000-0x000000008afccfff] Feb 9 21:37:05.567624 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Feb 9 21:37:05.567629 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Feb 9 21:37:05.567633 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Feb 9 21:37:05.567638 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Feb 9 21:37:05.567643 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 21:37:05.567650 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 9 21:37:05.567656 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 9 21:37:05.567661 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 9 21:37:05.567666 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Feb 9 21:37:05.567672 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Feb 9 21:37:05.567677 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Feb 9 21:37:05.567682 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Feb 9 21:37:05.567687 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 9 21:37:05.567692 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 9 21:37:05.567696 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 9 21:37:05.567701 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 9 21:37:05.567707 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 9 21:37:05.567712 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 9 21:37:05.567717 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 9 21:37:05.567722 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 9 21:37:05.567727 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 9 21:37:05.567731 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 9 21:37:05.567736 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 9 21:37:05.567741 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 9 21:37:05.567746 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 9 21:37:05.567752 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 9 21:37:05.567757 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 9 21:37:05.567761 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 9 21:37:05.567766 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 9 21:37:05.567771 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 9 21:37:05.567776 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 21:37:05.567781 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 21:37:05.567786 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 21:37:05.567791 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 9 21:37:05.567797 kernel: TSC deadline timer available Feb 9 21:37:05.567802 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 9 21:37:05.567806 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Feb 9 21:37:05.567811 kernel: Booting paravirtualized kernel on bare hardware Feb 9 21:37:05.567817 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 21:37:05.567821 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 9 21:37:05.567826 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 9 21:37:05.567831 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 9 21:37:05.567836 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 9 21:37:05.567842 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Feb 9 21:37:05.567847 kernel: Policy zone: Normal Feb 9 21:37:05.567852 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 21:37:05.567857 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 21:37:05.567862 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 9 21:37:05.567867 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 9 21:37:05.567872 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 21:37:05.567877 kernel: Memory: 32724708K/33452980K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728012K reserved, 0K cma-reserved) Feb 9 21:37:05.567883 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 9 21:37:05.567888 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 21:37:05.567893 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 21:37:05.567898 kernel: rcu: Hierarchical RCU implementation. Feb 9 21:37:05.567903 kernel: rcu: RCU event tracing is enabled. Feb 9 21:37:05.567908 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 9 21:37:05.567913 kernel: Rude variant of Tasks RCU enabled. Feb 9 21:37:05.567918 kernel: Tracing variant of Tasks RCU enabled. Feb 9 21:37:05.567923 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 21:37:05.567929 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 9 21:37:05.567934 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 9 21:37:05.567939 kernel: random: crng init done Feb 9 21:37:05.567944 kernel: Console: colour dummy device 80x25 Feb 9 21:37:05.567948 kernel: printk: console [tty0] enabled Feb 9 21:37:05.567953 kernel: printk: console [ttyS1] enabled Feb 9 21:37:05.567958 kernel: ACPI: Core revision 20210730 Feb 9 21:37:05.567963 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Feb 9 21:37:05.567968 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 21:37:05.567974 kernel: DMAR: Host address width 39 Feb 9 21:37:05.567979 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 9 21:37:05.567984 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 9 21:37:05.567989 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Feb 9 21:37:05.567994 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Feb 9 21:37:05.567999 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 9 21:37:05.568004 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 9 21:37:05.568009 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 9 21:37:05.568013 kernel: x2apic enabled Feb 9 21:37:05.568019 kernel: Switched APIC routing to cluster x2apic. Feb 9 21:37:05.568024 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 9 21:37:05.568029 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 9 21:37:05.568034 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 9 21:37:05.568039 kernel: process: using mwait in idle threads Feb 9 21:37:05.568044 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 21:37:05.568049 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 21:37:05.568053 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 21:37:05.568058 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 9 21:37:05.568064 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 9 21:37:05.568069 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 21:37:05.568074 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 9 21:37:05.568079 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 9 21:37:05.568084 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 21:37:05.568088 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 21:37:05.568093 kernel: TAA: Mitigation: TSX disabled Feb 9 21:37:05.568098 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 9 21:37:05.568103 kernel: SRBDS: Mitigation: Microcode Feb 9 21:37:05.568108 kernel: GDS: Vulnerable: No microcode Feb 9 21:37:05.568113 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 21:37:05.568118 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 21:37:05.568123 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 21:37:05.568128 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 9 21:37:05.568133 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 9 21:37:05.568138 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 21:37:05.568143 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 9 21:37:05.568147 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 9 21:37:05.568152 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 9 21:37:05.568157 kernel: Freeing SMP alternatives memory: 32K Feb 9 21:37:05.568162 kernel: pid_max: default: 32768 minimum: 301 Feb 9 21:37:05.568167 kernel: LSM: Security Framework initializing Feb 9 21:37:05.568171 kernel: SELinux: Initializing. Feb 9 21:37:05.568177 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 21:37:05.568182 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 21:37:05.568187 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 9 21:37:05.568192 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 9 21:37:05.568197 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 9 21:37:05.568202 kernel: ... version: 4 Feb 9 21:37:05.568207 kernel: ... bit width: 48 Feb 9 21:37:05.568211 kernel: ... generic registers: 4 Feb 9 21:37:05.568216 kernel: ... value mask: 0000ffffffffffff Feb 9 21:37:05.568221 kernel: ... max period: 00007fffffffffff Feb 9 21:37:05.568227 kernel: ... fixed-purpose events: 3 Feb 9 21:37:05.568232 kernel: ... event mask: 000000070000000f Feb 9 21:37:05.568237 kernel: signal: max sigframe size: 2032 Feb 9 21:37:05.568242 kernel: rcu: Hierarchical SRCU implementation. Feb 9 21:37:05.568247 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 9 21:37:05.568251 kernel: smp: Bringing up secondary CPUs ... Feb 9 21:37:05.568256 kernel: x86: Booting SMP configuration: Feb 9 21:37:05.568261 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 9 21:37:05.568266 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 21:37:05.568272 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 9 21:37:05.568277 kernel: smp: Brought up 1 node, 16 CPUs Feb 9 21:37:05.568282 kernel: smpboot: Max logical packages: 1 Feb 9 21:37:05.568287 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 9 21:37:05.568292 kernel: devtmpfs: initialized Feb 9 21:37:05.568297 kernel: x86/mm: Memory block size: 128MB Feb 9 21:37:05.568302 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x820e2000-0x820e2fff] (4096 bytes) Feb 9 21:37:05.568307 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Feb 9 21:37:05.568313 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 21:37:05.568318 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 9 21:37:05.568323 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 21:37:05.568327 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 21:37:05.568332 kernel: audit: initializing netlink subsys (disabled) Feb 9 21:37:05.568337 kernel: audit: type=2000 audit(1707514620.040:1): state=initialized audit_enabled=0 res=1 Feb 9 21:37:05.568342 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 21:37:05.568347 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 21:37:05.568352 kernel: cpuidle: using governor menu Feb 9 21:37:05.568358 kernel: ACPI: bus type PCI registered Feb 9 21:37:05.568363 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 21:37:05.568368 kernel: dca service started, version 1.12.1 Feb 9 21:37:05.568373 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 9 21:37:05.568377 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 9 21:37:05.568382 kernel: PCI: Using configuration type 1 for base access Feb 9 21:37:05.568387 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 9 21:37:05.568392 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 21:37:05.568397 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 21:37:05.568403 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 21:37:05.568408 kernel: ACPI: Added _OSI(Module Device) Feb 9 21:37:05.568413 kernel: ACPI: Added _OSI(Processor Device) Feb 9 21:37:05.568417 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 21:37:05.568422 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 21:37:05.568427 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 21:37:05.568432 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 21:37:05.568437 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 21:37:05.568444 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 9 21:37:05.568449 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:37:05.568454 kernel: ACPI: SSDT 0xFFFF8AEAC0213000 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 9 21:37:05.568484 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 9 21:37:05.568489 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:37:05.568494 kernel: ACPI: SSDT 0xFFFF8AEAC1AE0400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 9 21:37:05.568515 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:37:05.568519 kernel: ACPI: SSDT 0xFFFF8AEAC1A54800 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 9 21:37:05.568524 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:37:05.568529 kernel: ACPI: SSDT 0xFFFF8AEAC1A52000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 9 21:37:05.568534 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:37:05.568539 kernel: ACPI: SSDT 0xFFFF8AEAC014D000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 9 21:37:05.568544 kernel: ACPI: Dynamic OEM Table Load: Feb 9 21:37:05.568549 kernel: ACPI: SSDT 0xFFFF8AEAC1AE4800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 9 21:37:05.568554 kernel: ACPI: Interpreter enabled Feb 9 21:37:05.568559 kernel: ACPI: PM: (supports S0 S5) Feb 9 21:37:05.568564 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 21:37:05.568569 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 9 21:37:05.568574 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 9 21:37:05.568578 kernel: HEST: Table parsing has been initialized. Feb 9 21:37:05.568584 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 9 21:37:05.568589 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 21:37:05.568594 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 9 21:37:05.568599 kernel: ACPI: PM: Power Resource [USBC] Feb 9 21:37:05.568604 kernel: ACPI: PM: Power Resource [V0PR] Feb 9 21:37:05.568609 kernel: ACPI: PM: Power Resource [V1PR] Feb 9 21:37:05.568614 kernel: ACPI: PM: Power Resource [V2PR] Feb 9 21:37:05.568619 kernel: ACPI: PM: Power Resource [WRST] Feb 9 21:37:05.568623 kernel: ACPI: PM: Power Resource [FN00] Feb 9 21:37:05.568629 kernel: ACPI: PM: Power Resource [FN01] Feb 9 21:37:05.568634 kernel: ACPI: PM: Power Resource [FN02] Feb 9 21:37:05.568639 kernel: ACPI: PM: Power Resource [FN03] Feb 9 21:37:05.568644 kernel: ACPI: PM: Power Resource [FN04] Feb 9 21:37:05.568648 kernel: ACPI: PM: Power Resource [PIN] Feb 9 21:37:05.568653 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 9 21:37:05.568718 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 9 21:37:05.568763 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 9 21:37:05.568806 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 9 21:37:05.568813 kernel: PCI host bridge to bus 0000:00 Feb 9 21:37:05.568856 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 21:37:05.568894 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 21:37:05.568931 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 21:37:05.568967 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Feb 9 21:37:05.569002 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 9 21:37:05.569041 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 9 21:37:05.569090 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 9 21:37:05.569142 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 9 21:37:05.569185 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 9 21:37:05.569232 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 9 21:37:05.569273 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Feb 9 21:37:05.569320 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 9 21:37:05.569364 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Feb 9 21:37:05.569410 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 9 21:37:05.569457 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Feb 9 21:37:05.569538 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 9 21:37:05.569584 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 9 21:37:05.569627 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Feb 9 21:37:05.569668 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Feb 9 21:37:05.569714 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 9 21:37:05.569755 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 21:37:05.569803 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 9 21:37:05.569846 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 21:37:05.569891 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 9 21:37:05.569934 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Feb 9 21:37:05.569975 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 9 21:37:05.570019 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 9 21:37:05.570060 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Feb 9 21:37:05.570102 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 9 21:37:05.570145 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 9 21:37:05.570189 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Feb 9 21:37:05.570230 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 9 21:37:05.570275 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 9 21:37:05.570316 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Feb 9 21:37:05.570356 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Feb 9 21:37:05.570398 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Feb 9 21:37:05.570438 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Feb 9 21:37:05.570526 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Feb 9 21:37:05.570568 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Feb 9 21:37:05.570610 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 9 21:37:05.570655 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 9 21:37:05.570698 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 9 21:37:05.570744 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 9 21:37:05.570786 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 9 21:37:05.570836 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 9 21:37:05.570878 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 9 21:37:05.570924 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 9 21:37:05.570967 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 9 21:37:05.571013 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Feb 9 21:37:05.571057 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Feb 9 21:37:05.571101 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 9 21:37:05.571144 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 9 21:37:05.571190 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 9 21:37:05.571238 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 9 21:37:05.571280 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Feb 9 21:37:05.571322 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 9 21:37:05.571370 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 9 21:37:05.571412 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 9 21:37:05.571487 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Feb 9 21:37:05.571562 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 9 21:37:05.571608 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Feb 9 21:37:05.571651 kernel: pci 0000:01:00.0: PME# supported from D3cold Feb 9 21:37:05.571695 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 21:37:05.571737 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 21:37:05.571786 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Feb 9 21:37:05.571829 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 9 21:37:05.571875 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Feb 9 21:37:05.571918 kernel: pci 0000:01:00.1: PME# supported from D3cold Feb 9 21:37:05.571961 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 9 21:37:05.572004 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 9 21:37:05.572047 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 21:37:05.572089 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 21:37:05.572130 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 21:37:05.572174 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 21:37:05.572224 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Feb 9 21:37:05.572269 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Feb 9 21:37:05.572313 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Feb 9 21:37:05.572356 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Feb 9 21:37:05.572399 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Feb 9 21:37:05.572441 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 21:37:05.572532 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 21:37:05.572574 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 21:37:05.572624 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 9 21:37:05.572669 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Feb 9 21:37:05.572712 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Feb 9 21:37:05.572755 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Feb 9 21:37:05.572801 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 9 21:37:05.572843 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 21:37:05.572887 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 21:37:05.572931 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 21:37:05.572974 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 21:37:05.573020 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Feb 9 21:37:05.573066 kernel: pci 0000:06:00.0: enabling Extended Tags Feb 9 21:37:05.573109 kernel: pci 0000:06:00.0: supports D1 D2 Feb 9 21:37:05.573153 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 21:37:05.573195 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 21:37:05.573237 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 21:37:05.573282 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 21:37:05.573331 kernel: pci_bus 0000:07: extended config space not accessible Feb 9 21:37:05.573381 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Feb 9 21:37:05.573428 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Feb 9 21:37:05.573526 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Feb 9 21:37:05.573572 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Feb 9 21:37:05.573652 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 21:37:05.573716 kernel: pci 0000:07:00.0: supports D1 D2 Feb 9 21:37:05.573763 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 9 21:37:05.573806 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 21:37:05.573851 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 21:37:05.573895 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 21:37:05.573902 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 9 21:37:05.573908 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 9 21:37:05.573915 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 9 21:37:05.573920 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 9 21:37:05.573925 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 9 21:37:05.573931 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 9 21:37:05.573936 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 9 21:37:05.573941 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 9 21:37:05.573946 kernel: iommu: Default domain type: Translated Feb 9 21:37:05.573952 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 21:37:05.573996 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Feb 9 21:37:05.574042 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 21:37:05.574088 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Feb 9 21:37:05.574095 kernel: vgaarb: loaded Feb 9 21:37:05.574101 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 21:37:05.574106 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it> Feb 9 21:37:05.574112 kernel: PTP clock support registered Feb 9 21:37:05.574117 kernel: PCI: Using ACPI for IRQ routing Feb 9 21:37:05.574122 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 21:37:05.574127 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 9 21:37:05.574134 kernel: e820: reserve RAM buffer [mem 0x820e2000-0x83ffffff] Feb 9 21:37:05.574139 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Feb 9 21:37:05.574144 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Feb 9 21:37:05.574149 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Feb 9 21:37:05.574154 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Feb 9 21:37:05.574160 kernel: clocksource: Switched to clocksource tsc-early Feb 9 21:37:05.574165 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 21:37:05.574170 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 21:37:05.574176 kernel: pnp: PnP ACPI init Feb 9 21:37:05.574219 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 9 21:37:05.574261 kernel: pnp 00:02: [dma 0 disabled] Feb 9 21:37:05.574302 kernel: pnp 00:03: [dma 0 disabled] Feb 9 21:37:05.574344 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 9 21:37:05.574382 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 9 21:37:05.574423 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 9 21:37:05.574501 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 9 21:37:05.574577 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 9 21:37:05.574614 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 9 21:37:05.574651 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 9 21:37:05.574689 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 9 21:37:05.574725 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 9 21:37:05.574762 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 9 21:37:05.574801 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 9 21:37:05.574841 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 9 21:37:05.574881 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 9 21:37:05.574917 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 9 21:37:05.574955 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 9 21:37:05.574991 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 9 21:37:05.575027 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 9 21:37:05.575067 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 9 21:37:05.575106 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 9 21:37:05.575114 kernel: pnp: PnP ACPI: found 10 devices Feb 9 21:37:05.575120 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 21:37:05.575125 kernel: NET: Registered PF_INET protocol family Feb 9 21:37:05.575130 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 21:37:05.575136 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 21:37:05.575141 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 21:37:05.575148 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 21:37:05.575153 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 21:37:05.575158 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 9 21:37:05.575164 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 21:37:05.575169 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 9 21:37:05.575174 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 21:37:05.575179 kernel: NET: Registered PF_XDP protocol family Feb 9 21:37:05.575222 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Feb 9 21:37:05.575266 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Feb 9 21:37:05.575309 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Feb 9 21:37:05.575353 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 21:37:05.575397 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 21:37:05.575440 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 9 21:37:05.575556 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 9 21:37:05.575598 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 9 21:37:05.575640 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Feb 9 21:37:05.575685 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 21:37:05.575726 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Feb 9 21:37:05.575769 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Feb 9 21:37:05.575811 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 9 21:37:05.575854 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Feb 9 21:37:05.575897 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Feb 9 21:37:05.575939 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 9 21:37:05.575981 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Feb 9 21:37:05.576023 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Feb 9 21:37:05.576068 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Feb 9 21:37:05.576110 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Feb 9 21:37:05.576153 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Feb 9 21:37:05.576195 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Feb 9 21:37:05.576238 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Feb 9 21:37:05.576281 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Feb 9 21:37:05.576320 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 9 21:37:05.576358 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 21:37:05.576394 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 21:37:05.576431 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 21:37:05.576502 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Feb 9 21:37:05.576560 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 9 21:37:05.576602 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Feb 9 21:37:05.576642 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 9 21:37:05.576687 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Feb 9 21:37:05.576726 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Feb 9 21:37:05.576769 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Feb 9 21:37:05.576807 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Feb 9 21:37:05.576850 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Feb 9 21:37:05.576890 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Feb 9 21:37:05.576931 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 9 21:37:05.576974 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Feb 9 21:37:05.576982 kernel: PCI: CLS 64 bytes, default 64 Feb 9 21:37:05.576987 kernel: DMAR: No ATSR found Feb 9 21:37:05.576992 kernel: DMAR: No SATC found Feb 9 21:37:05.576998 kernel: DMAR: dmar0: Using Queued invalidation Feb 9 21:37:05.577039 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 9 21:37:05.577085 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 9 21:37:05.577127 kernel: pci 0000:00:08.0: Adding to iommu group 2 Feb 9 21:37:05.577169 kernel: pci 0000:00:12.0: Adding to iommu group 3 Feb 9 21:37:05.577211 kernel: pci 0000:00:14.0: Adding to iommu group 4 Feb 9 21:37:05.577253 kernel: pci 0000:00:14.2: Adding to iommu group 4 Feb 9 21:37:05.577295 kernel: pci 0000:00:15.0: Adding to iommu group 5 Feb 9 21:37:05.577335 kernel: pci 0000:00:15.1: Adding to iommu group 5 Feb 9 21:37:05.577377 kernel: pci 0000:00:16.0: Adding to iommu group 6 Feb 9 21:37:05.577419 kernel: pci 0000:00:16.1: Adding to iommu group 6 Feb 9 21:37:05.577492 kernel: pci 0000:00:16.4: Adding to iommu group 6 Feb 9 21:37:05.577554 kernel: pci 0000:00:17.0: Adding to iommu group 7 Feb 9 21:37:05.577597 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Feb 9 21:37:05.577637 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Feb 9 21:37:05.577680 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Feb 9 21:37:05.577721 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Feb 9 21:37:05.577763 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Feb 9 21:37:05.577807 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Feb 9 21:37:05.577848 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Feb 9 21:37:05.577890 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Feb 9 21:37:05.577931 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Feb 9 21:37:05.577975 kernel: pci 0000:01:00.0: Adding to iommu group 1 Feb 9 21:37:05.578018 kernel: pci 0000:01:00.1: Adding to iommu group 1 Feb 9 21:37:05.578062 kernel: pci 0000:03:00.0: Adding to iommu group 15 Feb 9 21:37:05.578105 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 9 21:37:05.578150 kernel: pci 0000:06:00.0: Adding to iommu group 17 Feb 9 21:37:05.578196 kernel: pci 0000:07:00.0: Adding to iommu group 17 Feb 9 21:37:05.578204 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 9 21:37:05.578210 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 21:37:05.578215 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Feb 9 21:37:05.578220 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Feb 9 21:37:05.578226 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 9 21:37:05.578231 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 9 21:37:05.578237 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 9 21:37:05.578282 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 9 21:37:05.578289 kernel: Initialise system trusted keyrings Feb 9 21:37:05.578295 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 9 21:37:05.578300 kernel: Key type asymmetric registered Feb 9 21:37:05.578305 kernel: Asymmetric key parser 'x509' registered Feb 9 21:37:05.578311 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 21:37:05.578316 kernel: io scheduler mq-deadline registered Feb 9 21:37:05.578322 kernel: io scheduler kyber registered Feb 9 21:37:05.578328 kernel: io scheduler bfq registered Feb 9 21:37:05.578369 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Feb 9 21:37:05.578411 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Feb 9 21:37:05.578456 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Feb 9 21:37:05.578547 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Feb 9 21:37:05.578590 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Feb 9 21:37:05.578632 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Feb 9 21:37:05.578681 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 9 21:37:05.578689 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 9 21:37:05.578695 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 9 21:37:05.578700 kernel: pstore: Registered erst as persistent store backend Feb 9 21:37:05.578706 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 21:37:05.578711 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 21:37:05.578716 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 21:37:05.578722 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 21:37:05.578728 kernel: hpet_acpi_add: no address or irqs in _CRS Feb 9 21:37:05.578772 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 9 21:37:05.578780 kernel: i8042: PNP: No PS/2 controller found. Feb 9 21:37:05.578817 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 9 21:37:05.578855 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 9 21:37:05.578893 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-09T21:37:04 UTC (1707514624) Feb 9 21:37:05.578931 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 9 21:37:05.578938 kernel: fail to initialize ptp_kvm Feb 9 21:37:05.578945 kernel: intel_pstate: Intel P-state driver initializing Feb 9 21:37:05.578950 kernel: intel_pstate: Disabling energy efficiency optimization Feb 9 21:37:05.578956 kernel: intel_pstate: HWP enabled Feb 9 21:37:05.578961 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 9 21:37:05.578966 kernel: vesafb: scrolling: redraw Feb 9 21:37:05.578971 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 9 21:37:05.578977 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000cfa3abd5, using 768k, total 768k Feb 9 21:37:05.578982 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 21:37:05.578987 kernel: fb0: VESA VGA frame buffer device Feb 9 21:37:05.578993 kernel: NET: Registered PF_INET6 protocol family Feb 9 21:37:05.578999 kernel: Segment Routing with IPv6 Feb 9 21:37:05.579004 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 21:37:05.579009 kernel: NET: Registered PF_PACKET protocol family Feb 9 21:37:05.579014 kernel: Key type dns_resolver registered Feb 9 21:37:05.579019 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 9 21:37:05.579025 kernel: microcode: Microcode Update Driver: v2.2. Feb 9 21:37:05.579030 kernel: IPI shorthand broadcast: enabled Feb 9 21:37:05.579035 kernel: sched_clock: Marking stable (1681163790, 1334028771)->(4433084592, -1417892031) Feb 9 21:37:05.579041 kernel: registered taskstats version 1 Feb 9 21:37:05.579047 kernel: Loading compiled-in X.509 certificates Feb 9 21:37:05.579052 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 21:37:05.579057 kernel: Key type .fscrypt registered Feb 9 21:37:05.579062 kernel: Key type fscrypt-provisioning registered Feb 9 21:37:05.579067 kernel: pstore: Using crash dump compression: deflate Feb 9 21:37:05.579073 kernel: ima: Allocated hash algorithm: sha1 Feb 9 21:37:05.579078 kernel: ima: No architecture policies found Feb 9 21:37:05.579083 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 21:37:05.579089 kernel: Write protecting the kernel read-only data: 28672k Feb 9 21:37:05.579095 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 21:37:05.579100 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 21:37:05.579105 kernel: Run /init as init process Feb 9 21:37:05.579111 kernel: with arguments: Feb 9 21:37:05.579116 kernel: /init Feb 9 21:37:05.579121 kernel: with environment: Feb 9 21:37:05.579126 kernel: HOME=/ Feb 9 21:37:05.579132 kernel: TERM=linux Feb 9 21:37:05.579137 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 21:37:05.579144 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 21:37:05.579151 systemd[1]: Detected architecture x86-64. Feb 9 21:37:05.579156 systemd[1]: Running in initrd. Feb 9 21:37:05.579162 systemd[1]: No hostname configured, using default hostname. Feb 9 21:37:05.579167 systemd[1]: Hostname set to <localhost>. Feb 9 21:37:05.579172 systemd[1]: Initializing machine ID from random generator. Feb 9 21:37:05.579179 systemd[1]: Queued start job for default target initrd.target. Feb 9 21:37:05.579184 systemd[1]: Started systemd-ask-password-console.path. Feb 9 21:37:05.579190 systemd[1]: Reached target cryptsetup.target. Feb 9 21:37:05.579195 systemd[1]: Reached target ignition-diskful-subsequent.target. Feb 9 21:37:05.579200 systemd[1]: Reached target paths.target. Feb 9 21:37:05.579205 systemd[1]: Reached target slices.target. Feb 9 21:37:05.579211 systemd[1]: Reached target swap.target. Feb 9 21:37:05.579216 systemd[1]: Reached target timers.target. Feb 9 21:37:05.579223 systemd[1]: Listening on iscsid.socket. Feb 9 21:37:05.579228 systemd[1]: Listening on iscsiuio.socket. Feb 9 21:37:05.579234 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 21:37:05.579239 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 21:37:05.579245 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Feb 9 21:37:05.579250 systemd[1]: Listening on systemd-journald.socket. Feb 9 21:37:05.579255 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Feb 9 21:37:05.579261 kernel: clocksource: Switched to clocksource tsc Feb 9 21:37:05.579267 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 21:37:05.579272 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 21:37:05.579278 systemd[1]: Reached target sockets.target. Feb 9 21:37:05.579283 systemd[1]: Starting iscsiuio.service... Feb 9 21:37:05.579289 systemd[1]: Starting kmod-static-nodes.service... Feb 9 21:37:05.579294 kernel: SCSI subsystem initialized Feb 9 21:37:05.579299 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 21:37:05.579305 kernel: Loading iSCSI transport class v2.0-870. Feb 9 21:37:05.579310 systemd[1]: Starting systemd-journald.service... Feb 9 21:37:05.579316 systemd[1]: Starting systemd-modules-load.service... Feb 9 21:37:05.579324 systemd-journald[266]: Journal started Feb 9 21:37:05.579350 systemd-journald[266]: Runtime Journal (/run/log/journal/cd9884ffc38c4f05baaba1f7c061e673) is 8.0M, max 640.1M, 632.1M free. Feb 9 21:37:05.582358 systemd-modules-load[267]: Inserted module 'overlay' Feb 9 21:37:05.605771 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 21:37:05.639484 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 21:37:05.639500 systemd[1]: Started iscsiuio.service. Feb 9 21:37:05.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:05.665508 kernel: Bridge firewalling registered Feb 9 21:37:05.665523 kernel: audit: type=1130 audit(1707514625.663:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:05.665531 systemd[1]: Started systemd-journald.service. Feb 9 21:37:05.725466 systemd-modules-load[267]: Inserted module 'br_netfilter' Feb 9 21:37:05.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:05.751723 systemd[1]: Finished kmod-static-nodes.service. Feb 9 21:37:05.890156 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 21:37:05.890168 kernel: audit: type=1130 audit(1707514625.750:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:05.890175 kernel: device-mapper: uevent: version 1.0.3 Feb 9 21:37:05.890182 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 21:37:05.890188 kernel: audit: type=1130 audit(1707514625.841:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:05.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:05.842614 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 21:37:05.946929 kernel: audit: type=1130 audit(1707514625.902:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:05.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:05.892313 systemd-modules-load[267]: Inserted module 'dm_multipath' Feb 9 21:37:06.001541 kernel: audit: type=1130 audit(1707514625.955:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:05.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:05.903859 systemd[1]: Finished systemd-modules-load.service. Feb 9 21:37:06.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:06.056485 kernel: audit: type=1130 audit(1707514626.008:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:05.956724 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 21:37:06.010044 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 21:37:06.056796 systemd[1]: Starting systemd-sysctl.service... Feb 9 21:37:06.057079 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 21:37:06.059889 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 21:37:06.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:06.060631 systemd[1]: Finished systemd-sysctl.service. Feb 9 21:37:06.109522 kernel: audit: type=1130 audit(1707514626.058:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:06.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:06.123788 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 21:37:06.231579 kernel: audit: type=1130 audit(1707514626.122:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:06.231597 kernel: audit: type=1130 audit(1707514626.180:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:06.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:06.182048 systemd[1]: Starting dracut-cmdline.service... Feb 9 21:37:06.263567 kernel: iscsi: registered transport (tcp) Feb 9 21:37:06.263578 dracut-cmdline[292]: dracut-dracut-053 Feb 9 21:37:06.263578 dracut-cmdline[292]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 9 21:37:06.263578 dracut-cmdline[292]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.oem.id=packet flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 21:37:06.364507 kernel: iscsi: registered transport (qla4xxx) Feb 9 21:37:06.364606 kernel: QLogic iSCSI HBA Driver Feb 9 21:37:06.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:06.323198 systemd[1]: Finished dracut-cmdline.service. Feb 9 21:37:06.346159 systemd[1]: Starting dracut-pre-udev.service... Feb 9 21:37:06.373025 systemd[1]: Starting iscsid.service... Feb 9 21:37:06.433555 kernel: raid6: avx2x4 gen() 29687 MB/s Feb 9 21:37:06.433567 kernel: raid6: avx2x4 xor() 16722 MB/s Feb 9 21:37:06.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:06.392911 systemd[1]: Started iscsid.service. Feb 9 21:37:06.451566 iscsid[453]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 21:37:06.451566 iscsid[453]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 21:37:06.451566 iscsid[453]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.<reversed domain name>[:identifier]. Feb 9 21:37:06.451566 iscsid[453]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 21:37:06.451566 iscsid[453]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 21:37:06.451566 iscsid[453]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 21:37:06.451566 iscsid[453]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 21:37:06.619549 kernel: raid6: avx2x2 gen() 53834 MB/s Feb 9 21:37:06.619561 kernel: raid6: avx2x2 xor() 32111 MB/s Feb 9 21:37:06.619569 kernel: raid6: avx2x1 gen() 45190 MB/s Feb 9 21:37:06.619575 kernel: raid6: avx2x1 xor() 27886 MB/s Feb 9 21:37:06.619582 kernel: raid6: sse2x4 gen() 21367 MB/s Feb 9 21:37:06.661478 kernel: raid6: sse2x4 xor() 11986 MB/s Feb 9 21:37:06.696481 kernel: raid6: sse2x2 gen() 21667 MB/s Feb 9 21:37:06.731509 kernel: raid6: sse2x2 xor() 13431 MB/s Feb 9 21:37:06.764513 kernel: raid6: sse2x1 gen() 18301 MB/s Feb 9 21:37:06.817266 kernel: raid6: sse2x1 xor() 8930 MB/s Feb 9 21:37:06.817281 kernel: raid6: using algorithm avx2x2 gen() 53834 MB/s Feb 9 21:37:06.817288 kernel: raid6: .... xor() 32111 MB/s, rmw enabled Feb 9 21:37:06.835757 kernel: raid6: using avx2x2 recovery algorithm Feb 9 21:37:06.882495 kernel: xor: automatically using best checksumming function avx Feb 9 21:37:06.961486 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 21:37:06.966806 systemd[1]: Finished dracut-pre-udev.service. Feb 9 21:37:06.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:06.974000 audit: BPF prog-id=6 op=LOAD Feb 9 21:37:06.974000 audit: BPF prog-id=7 op=LOAD Feb 9 21:37:06.976410 systemd[1]: Starting systemd-udevd.service... Feb 9 21:37:06.984127 systemd-udevd[471]: Using default interface naming scheme 'v252'. Feb 9 21:37:07.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:06.991788 systemd[1]: Started systemd-udevd.service. Feb 9 21:37:07.032578 dracut-pre-trigger[483]: rd.md=0: removing MD RAID activation Feb 9 21:37:07.008092 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 21:37:07.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:07.037038 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 21:37:07.049672 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 21:37:07.136537 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 21:37:07.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:07.151791 systemd[1]: Starting dracut-initqueue.service... Feb 9 21:37:07.220562 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 21:37:07.220582 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 21:37:07.220590 kernel: AES CTR mode by8 optimization enabled Feb 9 21:37:07.220597 kernel: ACPI: bus type USB registered Feb 9 21:37:07.220603 kernel: libata version 3.00 loaded. Feb 9 21:37:07.227448 kernel: usbcore: registered new interface driver usbfs Feb 9 21:37:07.263242 kernel: usbcore: registered new interface driver hub Feb 9 21:37:07.263258 kernel: usbcore: registered new device driver usb Feb 9 21:37:07.323542 kernel: mlx5_core 0000:01:00.0: firmware version: 14.28.2006 Feb 9 21:37:07.323683 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 21:37:07.358866 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 9 21:37:07.358884 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 9 21:37:07.360503 kernel: ahci 0000:00:17.0: version 3.0 Feb 9 21:37:07.397403 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 21:37:07.397478 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Feb 9 21:37:07.397530 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 9 21:37:07.397578 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 9 21:37:07.400449 kernel: pps pps0: new PPS source ptp0 Feb 9 21:37:07.400524 kernel: igb 0000:03:00.0: added PHC on eth0 Feb 9 21:37:07.400582 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 21:37:07.400633 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d8:82 Feb 9 21:37:07.400683 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Feb 9 21:37:07.400730 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 21:37:07.436498 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 9 21:37:07.451503 kernel: pps pps1: new PPS source ptp1 Feb 9 21:37:07.451573 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 9 21:37:07.454466 kernel: scsi host0: ahci Feb 9 21:37:07.454536 kernel: scsi host1: ahci Feb 9 21:37:07.454591 kernel: scsi host2: ahci Feb 9 21:37:07.454644 kernel: scsi host3: ahci Feb 9 21:37:07.454705 kernel: scsi host4: ahci Feb 9 21:37:07.454771 kernel: scsi host5: ahci Feb 9 21:37:07.454831 kernel: scsi host6: ahci Feb 9 21:37:07.454900 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 132 Feb 9 21:37:07.454907 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 132 Feb 9 21:37:07.454914 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 132 Feb 9 21:37:07.454920 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 132 Feb 9 21:37:07.454926 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 132 Feb 9 21:37:07.454932 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 132 Feb 9 21:37:07.454940 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 132 Feb 9 21:37:07.483214 kernel: igb 0000:04:00.0: added PHC on eth1 Feb 9 21:37:07.483289 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 9 21:37:07.515021 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 9 21:37:07.515092 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 9 21:37:07.531969 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:70:d8:83 Feb 9 21:37:07.563451 kernel: hub 1-0:1.0: USB hub found Feb 9 21:37:07.563531 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Feb 9 21:37:07.584449 kernel: hub 1-0:1.0: 16 ports detected Feb 9 21:37:07.584523 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 21:37:07.588465 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 9 21:37:07.601449 kernel: hub 2-0:1.0: USB hub found Feb 9 21:37:07.601527 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 21:37:07.791299 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 9 21:37:07.791318 kernel: hub 2-0:1.0: 10 ports detected Feb 9 21:37:07.791390 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 21:37:07.791451 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 9 21:37:07.801448 kernel: mlx5_core 0000:01:00.1: firmware version: 14.28.2006 Feb 9 21:37:07.801522 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 9 21:37:07.821103 kernel: usb: port power management may be unreliable Feb 9 21:37:07.821501 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 9 21:37:07.846502 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 9 21:37:07.846529 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 21:37:07.992447 kernel: hub 1-14:1.0: USB hub found Feb 9 21:37:07.992532 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 9 21:37:08.039488 kernel: hub 1-14:1.0: 4 ports detected Feb 9 21:37:08.039577 kernel: ata1.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 9 21:37:08.096498 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 9 21:37:08.096566 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 9 21:37:08.143490 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 21:37:08.143564 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 9 21:37:08.207448 kernel: ata2.00: ATA-10: Micron_5200_MTFDDAK480TDN, D1MU020, max UDMA/133 Feb 9 21:37:08.237742 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 21:37:08.237757 kernel: ata1.00: Features: NCQ-prio Feb 9 21:37:08.269500 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 9 21:37:08.269516 kernel: ata2.00: Features: NCQ-prio Feb 9 21:37:08.286510 kernel: ata1.00: configured for UDMA/133 Feb 9 21:37:08.286542 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 9 21:37:08.304520 kernel: ata2.00: configured for UDMA/133 Feb 9 21:37:08.318495 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5200_MTFD U020 PQ: 0 ANSI: 5 Feb 9 21:37:08.353535 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Feb 9 21:37:08.353610 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 9 21:37:08.371448 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 9 21:37:08.412214 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 21:37:08.412238 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Feb 9 21:37:08.412347 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 21:37:08.412363 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 21:37:08.412461 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 9 21:37:08.412560 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 21:37:08.412620 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 21:37:08.412674 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 9 21:37:08.412736 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 21:37:08.412788 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 21:37:08.414449 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 21:37:08.414462 kernel: ata1.00: Enabling discard_zeroes_data Feb 9 21:37:08.414469 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 21:37:08.551473 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 21:37:08.551488 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 9 21:37:08.647178 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 9 21:37:08.647254 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 9 21:37:08.647311 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 21:37:08.682778 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 21:37:08.698148 kernel: ata2.00: Enabling discard_zeroes_data Feb 9 21:37:08.713450 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 9 21:37:08.732449 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth2 Feb 9 21:37:08.736619 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 21:37:08.844579 kernel: usbcore: registered new interface driver usbhid Feb 9 21:37:08.844596 kernel: BTRFS: device label OEM devid 1 transid 19 /dev/sda6 scanned by (udev-worker) (529) Feb 9 21:37:08.844603 kernel: usbhid: USB HID core driver Feb 9 21:37:08.844610 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 9 21:37:08.844616 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth0 Feb 9 21:37:08.803559 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 21:37:08.862143 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 21:37:08.900462 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 21:37:08.985683 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 9 21:37:08.985768 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 9 21:37:08.985777 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 9 21:37:08.977693 systemd[1]: Reached target initrd-root-device.target. Feb 9 21:37:08.994933 systemd[1]: Starting disk-uuid.service... Feb 9 21:37:09.013737 systemd[1]: Finished dracut-initqueue.service. Feb 9 21:37:09.083615 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 9 21:37:09.083627 kernel: audit: type=1130 audit(1707514629.020:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.021698 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 21:37:09.181497 kernel: audit: type=1130 audit(1707514629.089:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.181509 kernel: audit: type=1131 audit(1707514629.089:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.021742 systemd[1]: Finished disk-uuid.service. Feb 9 21:37:09.090708 systemd[1]: Reached target local-fs-pre.target. Feb 9 21:37:09.189656 systemd[1]: Reached target local-fs.target. Feb 9 21:37:09.189691 systemd[1]: Reached target remote-fs-pre.target. Feb 9 21:37:09.217647 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 21:37:09.217685 systemd[1]: Reached target remote-fs.target. Feb 9 21:37:09.239638 systemd[1]: Reached target sysinit.target. Feb 9 21:37:09.256570 systemd[1]: Reached target basic.target. Feb 9 21:37:09.274520 systemd[1]: Starting dracut-pre-mount.service... Feb 9 21:37:09.326568 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 21:37:09.287962 systemd[1]: Starting verity-setup.service... Feb 9 21:37:09.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.315710 systemd[1]: Finished dracut-pre-mount.service. Feb 9 21:37:09.336011 systemd[1]: Starting systemd-fsck-root.service... Feb 9 21:37:09.384503 kernel: audit: type=1130 audit(1707514629.333:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.385097 systemd[1]: Found device dev-mapper-usr.device. Feb 9 21:37:09.385450 systemd[1]: Mounting sysusr-usr.mount... Feb 9 21:37:09.385604 systemd[1]: Finished verity-setup.service. Feb 9 21:37:09.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.392938 systemd-fsck[720]: ROOT: clean, 631/553520 files, 110552/553472 blocks Feb 9 21:37:09.462564 kernel: audit: type=1130 audit(1707514629.384:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.452839 systemd[1]: Finished systemd-fsck-root.service. Feb 9 21:37:09.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.485999 systemd[1]: Mounting sysroot.mount... Feb 9 21:37:09.579631 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 21:37:09.579662 kernel: audit: type=1130 audit(1707514629.484:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.579680 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 21:37:09.573968 systemd[1]: Mounted sysusr-usr.mount. Feb 9 21:37:09.587768 systemd[1]: Mounted sysroot.mount. Feb 9 21:37:09.601812 systemd[1]: Reached target initrd-root-fs.target. Feb 9 21:37:09.618412 systemd[1]: Mounting sysroot-usr.mount... Feb 9 21:37:09.633675 systemd[1]: Mounted sysroot-usr.mount. Feb 9 21:37:09.650904 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 21:37:09.660942 systemd[1]: Starting initrd-setup-root.service... Feb 9 21:37:09.766723 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 21:37:09.766736 kernel: BTRFS info (device sda6): using free space tree Feb 9 21:37:09.766743 kernel: BTRFS info (device sda6): has skinny extents Feb 9 21:37:09.766750 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 21:37:09.758726 systemd[1]: Finished initrd-setup-root.service. Feb 9 21:37:09.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.776868 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 21:37:09.844694 kernel: audit: type=1130 audit(1707514629.774:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.837072 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 21:37:09.853826 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 21:37:09.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.928693 initrd-setup-root-after-ignition[803]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 21:37:09.950651 kernel: audit: type=1130 audit(1707514629.872:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.873868 systemd[1]: Reached target ignition-subsequent.target. Feb 9 21:37:09.937157 systemd[1]: Starting initrd-parse-etc.service... Feb 9 21:37:10.080367 kernel: audit: type=1130 audit(1707514629.971:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.080377 kernel: audit: type=1131 audit(1707514629.971:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:09.955623 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 21:37:09.955665 systemd[1]: Finished initrd-parse-etc.service. Feb 9 21:37:09.992772 systemd[1]: Reached target initrd-fs.target. Feb 9 21:37:10.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.088656 systemd[1]: Reached target initrd.target. Feb 9 21:37:10.088787 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 21:37:10.089123 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 21:37:10.109872 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 21:37:10.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.126075 systemd[1]: Starting initrd-cleanup.service... Feb 9 21:37:10.142979 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 21:37:10.154777 systemd[1]: Stopped target timers.target. Feb 9 21:37:10.173960 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 21:37:10.174200 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 21:37:10.191383 systemd[1]: Stopped target initrd.target. Feb 9 21:37:10.205092 systemd[1]: Stopped target basic.target. Feb 9 21:37:10.220113 systemd[1]: Stopped target ignition-subsequent.target. Feb 9 21:37:10.236104 systemd[1]: Stopped target ignition-diskful-subsequent.target. Feb 9 21:37:10.253069 systemd[1]: Stopped target initrd-root-device.target. Feb 9 21:37:10.271076 systemd[1]: Stopped target paths.target. Feb 9 21:37:10.285087 systemd[1]: Stopped target remote-fs.target. Feb 9 21:37:10.301087 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 21:37:10.317083 systemd[1]: Stopped target slices.target. Feb 9 21:37:10.332097 systemd[1]: Stopped target sockets.target. Feb 9 21:37:10.349081 systemd[1]: Stopped target sysinit.target. Feb 9 21:37:10.366097 systemd[1]: Stopped target local-fs.target. Feb 9 21:37:10.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.382086 systemd[1]: Stopped target local-fs-pre.target. Feb 9 21:37:10.398085 systemd[1]: Stopped target swap.target. Feb 9 21:37:10.414030 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 21:37:10.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.414269 systemd[1]: Closed iscsid.socket. Feb 9 21:37:10.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.428127 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 21:37:10.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.428354 systemd[1]: Closed iscsiuio.socket. Feb 9 21:37:10.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.442104 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 21:37:10.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.442417 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 21:37:10.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.458308 systemd[1]: Stopped target cryptsetup.target. Feb 9 21:37:10.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.473984 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 21:37:10.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.477655 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 21:37:10.489005 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 21:37:10.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.489331 systemd[1]: Stopped dracut-initqueue.service. Feb 9 21:37:10.506196 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 21:37:10.506543 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 21:37:10.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.524160 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 21:37:10.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.524491 systemd[1]: Stopped initrd-setup-root.service. Feb 9 21:37:10.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.539166 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 21:37:10.539498 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 21:37:10.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.556156 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 21:37:10.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.556484 systemd[1]: Stopped systemd-sysctl.service. Feb 9 21:37:10.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:10.572252 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 21:37:10.572592 systemd[1]: Stopped systemd-modules-load.service. Feb 9 21:37:10.588135 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 21:37:10.588461 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 21:37:10.604186 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 21:37:10.604518 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 21:37:10.619436 systemd[1]: Stopping systemd-udevd.service... Feb 9 21:37:10.906472 systemd-journald[266]: Received SIGTERM from PID 1 (systemd). Feb 9 21:37:10.906515 iscsid[453]: iscsid shutting down. Feb 9 21:37:10.637221 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 21:37:10.637630 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 21:37:10.637692 systemd[1]: Stopped systemd-udevd.service. Feb 9 21:37:10.644571 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 21:37:10.644632 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 21:37:10.666623 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 21:37:10.666732 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 21:37:10.681628 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 21:37:10.681694 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 21:37:10.699949 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 21:37:10.700081 systemd[1]: Stopped dracut-cmdline.service. Feb 9 21:37:10.716831 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 21:37:10.716967 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 21:37:10.737546 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 21:37:10.750621 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 21:37:10.750760 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 21:37:10.769647 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 21:37:10.769845 systemd[1]: Finished initrd-cleanup.service. Feb 9 21:37:10.784157 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 21:37:10.784347 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 21:37:10.802677 systemd[1]: Reached target initrd-switch-root.target. Feb 9 21:37:10.817331 systemd[1]: Starting initrd-switch-root.service... Feb 9 21:37:10.854940 systemd[1]: Switching root. Feb 9 21:37:10.907256 systemd-journald[266]: Journal stopped Feb 9 21:37:14.952903 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 21:37:14.952917 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 21:37:14.952925 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 21:37:14.952931 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 21:37:14.952936 kernel: SELinux: policy capability open_perms=1 Feb 9 21:37:14.952941 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 21:37:14.952947 kernel: SELinux: policy capability always_check_network=0 Feb 9 21:37:14.952953 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 21:37:14.952958 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 21:37:14.952964 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 21:37:14.952970 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 21:37:14.952976 systemd[1]: Successfully loaded SELinux policy in 307.492ms. Feb 9 21:37:14.952983 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 5.701ms. Feb 9 21:37:14.953004 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 21:37:14.953012 systemd[1]: Detected architecture x86-64. Feb 9 21:37:14.953018 systemd[1]: Detected first boot. Feb 9 21:37:14.953023 systemd[1]: Hostname set to <ci-3510.3.2-a-2e8c459cb4>. Feb 9 21:37:14.953029 systemd[1]: Initializing machine ID from random generator. Feb 9 21:37:14.953036 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 21:37:14.953041 systemd[1]: Populated /etc with preset unit settings. Feb 9 21:37:14.953048 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 21:37:14.953055 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 21:37:14.953062 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 21:37:14.953068 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 21:37:14.953074 systemd[1]: Stopped iscsid.service. Feb 9 21:37:14.953080 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 21:37:14.953086 systemd[1]: Stopped initrd-switch-root.service. Feb 9 21:37:14.953093 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 21:37:14.953100 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 21:37:14.953105 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 21:37:14.953112 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 21:37:14.953117 systemd[1]: Created slice system-getty.slice. Feb 9 21:37:14.953123 systemd[1]: Created slice system-modprobe.slice. Feb 9 21:37:14.953129 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 21:37:14.953136 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 21:37:14.953142 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 21:37:14.953149 systemd[1]: Created slice user.slice. Feb 9 21:37:14.953155 systemd[1]: Started systemd-ask-password-console.path. Feb 9 21:37:14.953161 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 21:37:14.953167 systemd[1]: Set up automount boot.automount. Feb 9 21:37:14.953175 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 21:37:14.953181 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 21:37:14.953187 systemd[1]: Stopped target initrd-fs.target. Feb 9 21:37:14.953193 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 21:37:14.953201 systemd[1]: Reached target integritysetup.target. Feb 9 21:37:14.953208 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 21:37:14.953214 systemd[1]: Reached target remote-fs.target. Feb 9 21:37:14.953220 systemd[1]: Reached target slices.target. Feb 9 21:37:14.953226 systemd[1]: Reached target swap.target. Feb 9 21:37:14.953232 systemd[1]: Reached target torcx.target. Feb 9 21:37:14.953239 systemd[1]: Reached target veritysetup.target. Feb 9 21:37:14.953245 systemd[1]: Listening on systemd-coredump.socket. Feb 9 21:37:14.953253 systemd[1]: Listening on systemd-initctl.socket. Feb 9 21:37:14.953259 systemd[1]: Listening on systemd-networkd.socket. Feb 9 21:37:14.953265 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 21:37:14.953272 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 21:37:14.953278 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 21:37:14.953284 systemd[1]: Mounting dev-hugepages.mount... Feb 9 21:37:14.953292 systemd[1]: Mounting dev-mqueue.mount... Feb 9 21:37:14.953298 systemd[1]: Mounting media.mount... Feb 9 21:37:14.953305 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 21:37:14.953311 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 21:37:14.953317 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 21:37:14.953324 systemd[1]: Mounting tmp.mount... Feb 9 21:37:14.953330 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 21:37:14.953337 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 21:37:14.953343 systemd[1]: Starting kmod-static-nodes.service... Feb 9 21:37:14.953351 systemd[1]: Starting modprobe@configfs.service... Feb 9 21:37:14.953357 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 21:37:14.953364 systemd[1]: Starting modprobe@drm.service... Feb 9 21:37:14.953370 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 21:37:14.953376 systemd[1]: Starting modprobe@fuse.service... Feb 9 21:37:14.953382 kernel: fuse: init (API version 7.34) Feb 9 21:37:14.953389 systemd[1]: Starting modprobe@loop.service... Feb 9 21:37:14.953395 kernel: loop: module loaded Feb 9 21:37:14.953402 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 21:37:14.953409 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 21:37:14.953415 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 21:37:14.953422 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 21:37:14.953428 kernel: kauditd_printk_skb: 49 callbacks suppressed Feb 9 21:37:14.953434 kernel: audit: type=1131 audit(1707514634.595:71): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:14.953440 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 21:37:14.953449 kernel: audit: type=1131 audit(1707514634.682:72): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:14.953456 systemd[1]: Stopped systemd-journald.service. Feb 9 21:37:14.953485 kernel: audit: type=1130 audit(1707514634.746:73): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:14.953491 kernel: audit: type=1131 audit(1707514634.746:74): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:14.953511 kernel: audit: type=1334 audit(1707514634.831:75): prog-id=13 op=LOAD Feb 9 21:37:14.953518 kernel: audit: type=1334 audit(1707514634.849:76): prog-id=14 op=LOAD Feb 9 21:37:14.953523 kernel: audit: type=1334 audit(1707514634.867:77): prog-id=15 op=LOAD Feb 9 21:37:14.953529 kernel: audit: type=1334 audit(1707514634.885:78): prog-id=11 op=UNLOAD Feb 9 21:37:14.953535 systemd[1]: Starting systemd-journald.service... Feb 9 21:37:14.953542 kernel: audit: type=1334 audit(1707514634.885:79): prog-id=12 op=UNLOAD Feb 9 21:37:14.953548 systemd[1]: Starting systemd-modules-load.service... Feb 9 21:37:14.953555 kernel: audit: type=1305 audit(1707514634.949:80): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 21:37:14.953563 systemd-journald[943]: Journal started Feb 9 21:37:14.953588 systemd-journald[943]: Runtime Journal (/run/log/journal/7ceacabeb9194f4d8f74bf6be2ef9ebd) is 8.0M, max 640.1M, 632.1M free. Feb 9 21:37:11.421000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 21:37:11.688000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 21:37:11.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 21:37:11.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 21:37:11.690000 audit: BPF prog-id=8 op=LOAD Feb 9 21:37:11.690000 audit: BPF prog-id=8 op=UNLOAD Feb 9 21:37:11.690000 audit: BPF prog-id=9 op=LOAD Feb 9 21:37:11.690000 audit: BPF prog-id=9 op=UNLOAD Feb 9 21:37:11.759000 audit[836]: AVC avc: denied { associate } for pid=836 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 21:37:11.759000 audit[836]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=819 pid=836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:11.759000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 21:37:11.784000 audit[836]: AVC avc: denied { associate } for pid=836 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 21:37:11.784000 audit[836]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b9 a2=1ed a3=0 items=2 ppid=819 pid=836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:11.784000 audit: CWD cwd="/" Feb 9 21:37:11.784000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:11.784000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:11.784000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 21:37:13.299000 audit: BPF prog-id=10 op=LOAD Feb 9 21:37:13.299000 audit: BPF prog-id=3 op=UNLOAD Feb 9 21:37:13.299000 audit: BPF prog-id=11 op=LOAD Feb 9 21:37:13.299000 audit: BPF prog-id=12 op=LOAD Feb 9 21:37:13.299000 audit: BPF prog-id=4 op=UNLOAD Feb 9 21:37:13.299000 audit: BPF prog-id=5 op=UNLOAD Feb 9 21:37:13.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:13.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:13.349000 audit: BPF prog-id=10 op=UNLOAD Feb 9 21:37:13.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:13.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:13.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:14.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:14.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:14.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:14.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:14.831000 audit: BPF prog-id=13 op=LOAD Feb 9 21:37:14.849000 audit: BPF prog-id=14 op=LOAD Feb 9 21:37:14.867000 audit: BPF prog-id=15 op=LOAD Feb 9 21:37:14.885000 audit: BPF prog-id=11 op=UNLOAD Feb 9 21:37:14.885000 audit: BPF prog-id=12 op=UNLOAD Feb 9 21:37:14.949000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 21:37:11.759051 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 21:37:13.298704 systemd[1]: Queued start job for default target multi-user.target. Feb 9 21:37:11.759437 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 21:37:13.298711 systemd[1]: Unnecessary job was removed for dev-sda6.device. Feb 9 21:37:11.759460 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 21:37:13.301677 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 21:37:11.759484 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 21:37:13.301741 systemd[1]: Stopped iscsiuio.service. Feb 9 21:37:11.759518 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 21:37:13.308814 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 21:37:11.759543 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 21:37:11.759554 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 21:37:11.759722 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 21:37:11.759755 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 21:37:11.759766 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 21:37:11.760307 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 21:37:11.760340 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 21:37:11.760356 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 21:37:11.760369 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 21:37:11.760383 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 21:37:11.760395 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 21:37:12.954657 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:12Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 21:37:12.954795 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:12Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 21:37:12.954849 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:12Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 21:37:12.954943 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:12Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 21:37:12.954973 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:12Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 21:37:12.955008 /usr/lib/systemd/system-generators/torcx-generator[836]: time="2024-02-09T21:37:12Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 21:37:14.949000 audit[943]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff465e1150 a2=4000 a3=7fff465e11ec items=0 ppid=1 pid=943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:14.949000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 21:37:15.031623 systemd[1]: Starting systemd-network-generator.service... Feb 9 21:37:15.058480 systemd[1]: Starting systemd-remount-fs.service... Feb 9 21:37:15.085493 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 21:37:15.128255 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 21:37:15.128278 systemd[1]: Stopped verity-setup.service. Feb 9 21:37:15.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.173483 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 21:37:15.193614 systemd[1]: Started systemd-journald.service. Feb 9 21:37:15.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.201081 systemd[1]: Mounted dev-hugepages.mount. Feb 9 21:37:15.208710 systemd[1]: Mounted dev-mqueue.mount. Feb 9 21:37:15.215704 systemd[1]: Mounted media.mount. Feb 9 21:37:15.222705 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 21:37:15.231686 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 21:37:15.240679 systemd[1]: Mounted tmp.mount. Feb 9 21:37:15.247757 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 21:37:15.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.255776 systemd[1]: Finished kmod-static-nodes.service. Feb 9 21:37:15.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.264789 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 21:37:15.264893 systemd[1]: Finished modprobe@configfs.service. Feb 9 21:37:15.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.273872 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 21:37:15.274003 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 21:37:15.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.283989 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 21:37:15.284171 systemd[1]: Finished modprobe@drm.service. Feb 9 21:37:15.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.293214 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 21:37:15.293511 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 21:37:15.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.302251 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 21:37:15.302570 systemd[1]: Finished modprobe@fuse.service. Feb 9 21:37:15.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.311247 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 21:37:15.311560 systemd[1]: Finished modprobe@loop.service. Feb 9 21:37:15.318000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.320273 systemd[1]: Finished systemd-modules-load.service. Feb 9 21:37:15.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.329244 systemd[1]: Finished systemd-network-generator.service. Feb 9 21:37:15.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.338221 systemd[1]: Finished systemd-remount-fs.service. Feb 9 21:37:15.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.347235 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 21:37:15.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.357891 systemd[1]: Reached target network-pre.target. Feb 9 21:37:15.369282 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 21:37:15.380141 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 21:37:15.386697 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 21:37:15.387685 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 21:37:15.395041 systemd[1]: Starting systemd-journal-flush.service... Feb 9 21:37:15.398707 systemd-journald[943]: Time spent on flushing to /var/log/journal/7ceacabeb9194f4d8f74bf6be2ef9ebd is 10.445ms for 1259 entries. Feb 9 21:37:15.398707 systemd-journald[943]: System Journal (/var/log/journal/7ceacabeb9194f4d8f74bf6be2ef9ebd) is 8.0M, max 195.6M, 187.6M free. Feb 9 21:37:15.432974 systemd-journald[943]: Received client request to flush runtime journal. Feb 9 21:37:15.410543 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 21:37:15.411009 systemd[1]: Starting systemd-random-seed.service... Feb 9 21:37:15.426568 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 21:37:15.427065 systemd[1]: Starting systemd-sysctl.service... Feb 9 21:37:15.434218 systemd[1]: Starting systemd-sysusers.service... Feb 9 21:37:15.441155 systemd[1]: Starting systemd-udev-settle.service... Feb 9 21:37:15.448543 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 21:37:15.456639 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 21:37:15.464685 systemd[1]: Finished systemd-journal-flush.service. Feb 9 21:37:15.471000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.472728 systemd[1]: Finished systemd-random-seed.service. Feb 9 21:37:15.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.480648 systemd[1]: Finished systemd-sysctl.service. Feb 9 21:37:15.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.488784 systemd[1]: Finished systemd-sysusers.service. Feb 9 21:37:15.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.497658 systemd[1]: Reached target first-boot-complete.target. Feb 9 21:37:15.505783 udevadm[961]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 21:37:15.686051 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 21:37:15.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.693000 audit: BPF prog-id=16 op=LOAD Feb 9 21:37:15.693000 audit: BPF prog-id=17 op=LOAD Feb 9 21:37:15.693000 audit: BPF prog-id=6 op=UNLOAD Feb 9 21:37:15.694000 audit: BPF prog-id=7 op=UNLOAD Feb 9 21:37:15.695808 systemd[1]: Starting systemd-udevd.service... Feb 9 21:37:15.707482 systemd-udevd[962]: Using default interface naming scheme 'v252'. Feb 9 21:37:15.726095 systemd[1]: Started systemd-udevd.service. Feb 9 21:37:15.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.736678 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 9 21:37:15.736000 audit: BPF prog-id=18 op=LOAD Feb 9 21:37:15.737940 systemd[1]: Starting systemd-networkd.service... Feb 9 21:37:15.778671 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 9 21:37:15.778726 kernel: ACPI: button: Sleep Button [SLPB] Feb 9 21:37:15.780671 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 21:37:15.799744 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 21:37:15.799797 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 21:37:15.819548 kernel: ACPI: button: Power Button [PWRF] Feb 9 21:37:15.773000 audit[1029]: AVC avc: denied { confidentiality } for pid=1029 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 21:37:15.854000 audit: BPF prog-id=19 op=LOAD Feb 9 21:37:15.854000 audit: BPF prog-id=20 op=LOAD Feb 9 21:37:15.854000 audit: BPF prog-id=21 op=LOAD Feb 9 21:37:15.856203 systemd[1]: Starting systemd-userdbd.service... Feb 9 21:37:15.856450 kernel: IPMI message handler: version 39.2 Feb 9 21:37:15.881399 systemd[1]: Started systemd-userdbd.service. Feb 9 21:37:15.773000 audit[1029]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55baf03799d0 a1=4d8bc a2=7f92ea2f1bc5 a3=5 items=42 ppid=962 pid=1029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:15.773000 audit: CWD cwd="/" Feb 9 21:37:15.773000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=1 name=(null) inode=19543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=2 name=(null) inode=19543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=3 name=(null) inode=19544 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=4 name=(null) inode=19543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=5 name=(null) inode=19545 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=6 name=(null) inode=19543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=7 name=(null) inode=19546 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=8 name=(null) inode=19546 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=9 name=(null) inode=19547 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=10 name=(null) inode=19546 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=11 name=(null) inode=19548 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=12 name=(null) inode=19546 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=13 name=(null) inode=19549 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=14 name=(null) inode=19546 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=15 name=(null) inode=19550 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=16 name=(null) inode=19546 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=17 name=(null) inode=19551 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=18 name=(null) inode=19543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=19 name=(null) inode=19552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=20 name=(null) inode=19552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=21 name=(null) inode=19553 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=22 name=(null) inode=19552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=23 name=(null) inode=19554 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=24 name=(null) inode=19552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=25 name=(null) inode=19555 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=26 name=(null) inode=19552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=27 name=(null) inode=19556 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=28 name=(null) inode=19552 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=29 name=(null) inode=19557 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=30 name=(null) inode=19543 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=31 name=(null) inode=19558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=32 name=(null) inode=19558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=33 name=(null) inode=19559 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=34 name=(null) inode=19558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=35 name=(null) inode=19560 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=36 name=(null) inode=19558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=37 name=(null) inode=19561 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=38 name=(null) inode=19558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=39 name=(null) inode=19562 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=40 name=(null) inode=19558 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PATH item=41 name=(null) inode=19563 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:37:15.773000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 21:37:15.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:15.901455 kernel: ipmi device interface Feb 9 21:37:15.921458 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 9 21:37:15.921654 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 9 21:37:15.962453 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 9 21:37:15.980452 kernel: ipmi_si: IPMI System Interface driver Feb 9 21:37:15.980504 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 9 21:37:15.980601 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 9 21:37:16.018578 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 9 21:37:16.078781 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 9 21:37:16.078809 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 9 21:37:16.078825 kernel: iTCO_vendor_support: vendor-support=0 Feb 9 21:37:16.115452 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 9 21:37:16.155453 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 9 21:37:16.198606 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Feb 9 21:37:16.198730 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Feb 9 21:37:16.198798 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 9 21:37:16.216547 systemd-networkd[1013]: bond0: netdev ready Feb 9 21:37:16.218523 systemd-networkd[1013]: lo: Link UP Feb 9 21:37:16.218526 systemd-networkd[1013]: lo: Gained carrier Feb 9 21:37:16.218830 systemd-networkd[1013]: Enumeration completed Feb 9 21:37:16.218917 systemd[1]: Started systemd-networkd.service. Feb 9 21:37:16.219111 systemd-networkd[1013]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 9 21:37:16.219871 systemd-networkd[1013]: enp1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:97:f6:b1.network. Feb 9 21:37:16.220451 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 9 21:37:16.220469 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 9 21:37:16.254000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:16.295451 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 9 21:37:16.326451 kernel: intel_rapl_common: Found RAPL domain package Feb 9 21:37:16.326486 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Feb 9 21:37:16.326577 kernel: intel_rapl_common: Found RAPL domain core Feb 9 21:37:16.326600 kernel: intel_rapl_common: Found RAPL domain dram Feb 9 21:37:16.447456 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 21:37:16.447669 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 9 21:37:16.464460 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Feb 9 21:37:16.485171 systemd-networkd[1013]: enp1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:97:f6:b0.network. Feb 9 21:37:16.502520 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 9 21:37:16.549448 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 21:37:16.677479 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 9 21:37:16.708483 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Feb 9 21:37:16.731501 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Feb 9 21:37:16.754449 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 9 21:37:16.756406 systemd-networkd[1013]: bond0: Link UP Feb 9 21:37:16.756659 systemd-networkd[1013]: enp1s0f1np1: Link UP Feb 9 21:37:16.756837 systemd-networkd[1013]: enp1s0f0np0: Link UP Feb 9 21:37:16.756995 systemd-networkd[1013]: enp1s0f1np1: Gained carrier Feb 9 21:37:16.758000 systemd-networkd[1013]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:97:f6:b0.network. Feb 9 21:37:16.809026 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 21:37:16.809083 kernel: bond0: active interface up! Feb 9 21:37:16.885628 systemd-networkd[1013]: bond0: Gained carrier Feb 9 21:37:16.885722 systemd-networkd[1013]: enp1s0f0np0: Gained carrier Feb 9 21:37:16.893691 systemd-networkd[1013]: enp1s0f1np1: Link DOWN Feb 9 21:37:16.893693 systemd-networkd[1013]: enp1s0f1np1: Lost carrier Feb 9 21:37:16.899725 systemd[1]: Finished systemd-udev-settle.service. Feb 9 21:37:16.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:16.908222 systemd[1]: Starting lvm2-activation-early.service... Feb 9 21:37:16.923863 lvm[1066]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 21:37:16.935506 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:16.958485 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:16.980479 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.002488 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.003947 systemd[1]: Finished lvm2-activation-early.service. Feb 9 21:37:17.023491 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:17.039588 systemd[1]: Reached target cryptsetup.target. Feb 9 21:37:17.045518 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.062131 systemd[1]: Starting lvm2-activation.service... Feb 9 21:37:17.064277 lvm[1068]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 21:37:17.066448 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.088526 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.109497 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.129504 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.148483 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.148949 systemd[1]: Finished lvm2-activation.service. Feb 9 21:37:17.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:17.165588 systemd[1]: Reached target local-fs-pre.target. Feb 9 21:37:17.169574 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.186540 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 21:37:17.186555 systemd[1]: Reached target local-fs.target. Feb 9 21:37:17.188449 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.206519 systemd[1]: Reached target machines.target. Feb 9 21:37:17.208468 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.226172 systemd[1]: Starting ldconfig.service... Feb 9 21:37:17.228541 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.244072 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 21:37:17.244092 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 21:37:17.244861 systemd[1]: Starting systemd-boot-update.service... Feb 9 21:37:17.249521 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.264948 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 21:37:17.268504 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.286483 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.287084 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 21:37:17.287214 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 21:37:17.287242 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 21:37:17.287780 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 21:37:17.288016 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1070 (bootctl) Feb 9 21:37:17.288664 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 21:37:17.306448 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.327534 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.328340 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Feb 9 21:37:17.340483 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Feb 9 21:37:17.343109 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 21:37:17.344009 systemd-networkd[1013]: enp1s0f1np1: Link UP Feb 9 21:37:17.344013 systemd-networkd[1013]: enp1s0f1np1: Gained carrier Feb 9 21:37:17.346994 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 21:37:17.353594 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 21:37:17.356450 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Feb 9 21:37:17.386511 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 9 21:37:17.388295 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 21:37:17.388636 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 21:37:17.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:17.388782 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 21:37:17.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:17.480318 systemd-fsck[1078]: fsck.fat 4.2 (2021-01-31) Feb 9 21:37:17.480318 systemd-fsck[1078]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 21:37:17.481958 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 21:37:17.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:17.500330 systemd[1]: Mounting boot.mount... Feb 9 21:37:17.504449 kernel: bond0: (slave enp1s0f1np1): link status up again after 100 ms Feb 9 21:37:17.521448 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 9 21:37:17.527834 systemd[1]: Mounted boot.mount. Feb 9 21:37:17.546255 systemd[1]: Finished systemd-boot-update.service. Feb 9 21:37:17.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:17.575494 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 21:37:17.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:17.584316 systemd[1]: Starting audit-rules.service... Feb 9 21:37:17.587428 ldconfig[1069]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 21:37:17.592115 systemd[1]: Starting clean-ca-certificates.service... Feb 9 21:37:17.602052 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 21:37:17.602000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 21:37:17.602000 audit[1102]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc1993f30 a2=420 a3=0 items=0 ppid=1085 pid=1102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:17.602000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 21:37:17.603852 augenrules[1102]: No rules Feb 9 21:37:17.612406 systemd[1]: Starting systemd-resolved.service... Feb 9 21:37:17.621437 systemd[1]: Starting systemd-timesyncd.service... Feb 9 21:37:17.630004 systemd[1]: Starting systemd-update-utmp.service... Feb 9 21:37:17.636798 systemd[1]: Finished ldconfig.service. Feb 9 21:37:17.643653 systemd[1]: Finished audit-rules.service. Feb 9 21:37:17.650631 systemd[1]: Finished clean-ca-certificates.service. Feb 9 21:37:17.658640 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 21:37:17.670268 systemd[1]: Starting systemd-update-done.service... Feb 9 21:37:17.677519 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 21:37:17.677899 systemd[1]: Finished systemd-update-done.service. Feb 9 21:37:17.686242 systemd[1]: Finished systemd-update-utmp.service. Feb 9 21:37:17.696295 systemd[1]: Started systemd-timesyncd.service. Feb 9 21:37:17.698703 systemd-resolved[1107]: Positive Trust Anchors: Feb 9 21:37:17.698708 systemd-resolved[1107]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 21:37:17.698728 systemd-resolved[1107]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 21:37:17.704720 systemd[1]: Reached target time-set.target. Feb 9 21:37:17.717714 systemd-resolved[1107]: Using system hostname 'ci-3510.3.2-a-2e8c459cb4'. Feb 9 21:37:17.718798 systemd[1]: Started systemd-resolved.service. Feb 9 21:37:17.726557 systemd[1]: Reached target network.target. Feb 9 21:37:17.734524 systemd[1]: Reached target nss-lookup.target. Feb 9 21:37:17.742522 systemd[1]: Reached target sysinit.target. Feb 9 21:37:17.750550 systemd[1]: Started motdgen.path. Feb 9 21:37:17.757532 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 21:37:17.767584 systemd[1]: Started logrotate.timer. Feb 9 21:37:17.774554 systemd[1]: Started mdadm.timer. Feb 9 21:37:17.781517 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 21:37:17.789513 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 21:37:17.789529 systemd[1]: Reached target paths.target. Feb 9 21:37:17.796513 systemd[1]: Reached target timers.target. Feb 9 21:37:17.803628 systemd[1]: Listening on dbus.socket. Feb 9 21:37:17.811034 systemd[1]: Starting docker.socket... Feb 9 21:37:17.818818 systemd[1]: Listening on sshd.socket. Feb 9 21:37:17.825565 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 21:37:17.825780 systemd[1]: Listening on docker.socket. Feb 9 21:37:17.832560 systemd[1]: Reached target sockets.target. Feb 9 21:37:17.840511 systemd[1]: Reached target basic.target. Feb 9 21:37:17.847531 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 21:37:17.847545 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 21:37:17.847980 systemd[1]: Starting containerd.service... Feb 9 21:37:17.854927 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 21:37:17.863987 systemd[1]: Starting coreos-metadata.service... Feb 9 21:37:17.870970 systemd[1]: Starting dbus.service... Feb 9 21:37:17.877137 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 21:37:17.882795 jq[1121]: false Feb 9 21:37:17.884043 systemd[1]: Starting extend-filesystems.service... Feb 9 21:37:17.890492 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 21:37:17.891224 systemd[1]: Starting motdgen.service... Feb 9 21:37:17.891758 dbus-daemon[1120]: [system] SELinux support is enabled Feb 9 21:37:17.892829 extend-filesystems[1124]: Found sda Feb 9 21:37:17.919086 extend-filesystems[1124]: Found sda1 Feb 9 21:37:17.919086 extend-filesystems[1124]: Found sda2 Feb 9 21:37:17.919086 extend-filesystems[1124]: Found sda3 Feb 9 21:37:17.919086 extend-filesystems[1124]: Found usr Feb 9 21:37:17.919086 extend-filesystems[1124]: Found sda4 Feb 9 21:37:17.919086 extend-filesystems[1124]: Found sda6 Feb 9 21:37:17.919086 extend-filesystems[1124]: Found sda7 Feb 9 21:37:17.919086 extend-filesystems[1124]: Found sda9 Feb 9 21:37:17.919086 extend-filesystems[1124]: Checking size of /dev/sda9 Feb 9 21:37:17.919086 extend-filesystems[1124]: Resized partition /dev/sda9 Feb 9 21:37:18.051597 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 9 21:37:17.898046 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 21:37:18.051694 coreos-metadata[1116]: Feb 09 21:37:17.913 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 21:37:18.051803 coreos-metadata[1117]: Feb 09 21:37:17.915 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 9 21:37:18.051888 extend-filesystems[1138]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 21:37:17.927311 systemd[1]: Starting prepare-critools.service... Feb 9 21:37:17.946050 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 21:37:17.960033 systemd[1]: Starting sshd-keygen.service... Feb 9 21:37:17.974869 systemd[1]: Starting systemd-logind.service... Feb 9 21:37:17.987480 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 21:37:17.988064 systemd[1]: Starting tcsd.service... Feb 9 21:37:18.066910 update_engine[1154]: I0209 21:37:18.049312 1154 main.cc:92] Flatcar Update Engine starting Feb 9 21:37:18.066910 update_engine[1154]: I0209 21:37:18.052598 1154 update_check_scheduler.cc:74] Next update check in 8m59s Feb 9 21:37:17.995632 systemd-logind[1152]: Watching system buttons on /dev/input/event3 (Power Button) Feb 9 21:37:18.067134 jq[1155]: true Feb 9 21:37:17.995641 systemd-logind[1152]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 21:37:17.995650 systemd-logind[1152]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 9 21:37:18.067370 tar[1157]: ./ Feb 9 21:37:18.067370 tar[1157]: ./loopback Feb 9 21:37:17.995798 systemd-logind[1152]: New seat seat0. Feb 9 21:37:17.999781 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 21:37:18.000119 systemd[1]: Starting update-engine.service... Feb 9 21:37:18.014187 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 21:37:18.028929 systemd[1]: Started dbus.service. Feb 9 21:37:18.045345 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 21:37:18.045459 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 21:37:18.045605 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 21:37:18.045681 systemd[1]: Finished motdgen.service. Feb 9 21:37:18.059178 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 21:37:18.059271 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 21:37:18.078280 tar[1158]: crictl Feb 9 21:37:18.078686 dbus-daemon[1120]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 21:37:18.078996 jq[1161]: false Feb 9 21:37:18.079441 systemd[1]: update-ssh-keys-after-ignition.service: Skipped due to 'exec-condition'. Feb 9 21:37:18.079540 systemd[1]: Condition check resulted in update-ssh-keys-after-ignition.service being skipped. Feb 9 21:37:18.083576 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 9 21:37:18.083663 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 9 21:37:18.083731 systemd[1]: Started systemd-logind.service. Feb 9 21:37:18.087275 env[1162]: time="2024-02-09T21:37:18.087246214Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 21:37:18.089561 tar[1157]: ./bandwidth Feb 9 21:37:18.097590 systemd[1]: Started update-engine.service. Feb 9 21:37:18.098535 env[1162]: time="2024-02-09T21:37:18.098516649Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 21:37:18.098593 env[1162]: time="2024-02-09T21:37:18.098584090Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 21:37:18.099288 env[1162]: time="2024-02-09T21:37:18.099271127Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 21:37:18.099288 env[1162]: time="2024-02-09T21:37:18.099286629Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 21:37:18.099406 env[1162]: time="2024-02-09T21:37:18.099395759Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 21:37:18.099435 env[1162]: time="2024-02-09T21:37:18.099406294Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 21:37:18.099435 env[1162]: time="2024-02-09T21:37:18.099413566Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 21:37:18.099435 env[1162]: time="2024-02-09T21:37:18.099418894Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 21:37:18.099516 env[1162]: time="2024-02-09T21:37:18.099503904Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 21:37:18.099643 env[1162]: time="2024-02-09T21:37:18.099633237Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 21:37:18.099717 env[1162]: time="2024-02-09T21:37:18.099704057Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 21:37:18.099745 env[1162]: time="2024-02-09T21:37:18.099719116Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 21:37:18.099770 env[1162]: time="2024-02-09T21:37:18.099749366Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 21:37:18.099770 env[1162]: time="2024-02-09T21:37:18.099756088Z" level=info msg="metadata content store policy set" policy=shared Feb 9 21:37:18.107714 systemd[1]: Started locksmithd.service. Feb 9 21:37:18.114596 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 21:37:18.114722 systemd[1]: Reached target system-config.target. Feb 9 21:37:18.122525 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 21:37:18.122593 systemd[1]: Reached target user-config.target. Feb 9 21:37:18.122696 env[1162]: time="2024-02-09T21:37:18.122675922Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 21:37:18.122726 env[1162]: time="2024-02-09T21:37:18.122706648Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 21:37:18.122726 env[1162]: time="2024-02-09T21:37:18.122718709Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 21:37:18.122764 env[1162]: time="2024-02-09T21:37:18.122736602Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 21:37:18.122764 env[1162]: time="2024-02-09T21:37:18.122747785Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 21:37:18.122764 env[1162]: time="2024-02-09T21:37:18.122755093Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 21:37:18.122814 env[1162]: time="2024-02-09T21:37:18.122765187Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 21:37:18.122814 env[1162]: time="2024-02-09T21:37:18.122776018Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 21:37:18.122814 env[1162]: time="2024-02-09T21:37:18.122783835Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 21:37:18.122814 env[1162]: time="2024-02-09T21:37:18.122791491Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 21:37:18.122814 env[1162]: time="2024-02-09T21:37:18.122801428Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 21:37:18.122814 env[1162]: time="2024-02-09T21:37:18.122808540Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 21:37:18.122908 env[1162]: time="2024-02-09T21:37:18.122874703Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 21:37:18.122936 env[1162]: time="2024-02-09T21:37:18.122928420Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 21:37:18.123092 env[1162]: time="2024-02-09T21:37:18.123081573Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 21:37:18.123116 env[1162]: time="2024-02-09T21:37:18.123104406Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 21:37:18.123133 env[1162]: time="2024-02-09T21:37:18.123114763Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 21:37:18.123151 env[1162]: time="2024-02-09T21:37:18.123142700Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 21:37:18.123167 env[1162]: time="2024-02-09T21:37:18.123150865Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 21:37:18.123167 env[1162]: time="2024-02-09T21:37:18.123158406Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 21:37:18.123167 env[1162]: time="2024-02-09T21:37:18.123165193Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 21:37:18.123212 env[1162]: time="2024-02-09T21:37:18.123171627Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 21:37:18.123212 env[1162]: time="2024-02-09T21:37:18.123178104Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 21:37:18.123212 env[1162]: time="2024-02-09T21:37:18.123184400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 21:37:18.123212 env[1162]: time="2024-02-09T21:37:18.123190502Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 21:37:18.123212 env[1162]: time="2024-02-09T21:37:18.123199582Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 21:37:18.123294 env[1162]: time="2024-02-09T21:37:18.123265685Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 21:37:18.123294 env[1162]: time="2024-02-09T21:37:18.123276477Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 21:37:18.123294 env[1162]: time="2024-02-09T21:37:18.123283517Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 21:37:18.123294 env[1162]: time="2024-02-09T21:37:18.123291103Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 21:37:18.123357 env[1162]: time="2024-02-09T21:37:18.123299490Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 21:37:18.123357 env[1162]: time="2024-02-09T21:37:18.123305999Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 21:37:18.123357 env[1162]: time="2024-02-09T21:37:18.123316049Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 21:37:18.123357 env[1162]: time="2024-02-09T21:37:18.123336440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 21:37:18.123514 env[1162]: time="2024-02-09T21:37:18.123453571Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 21:37:18.123514 env[1162]: time="2024-02-09T21:37:18.123488440Z" level=info msg="Connect containerd service" Feb 9 21:37:18.123514 env[1162]: time="2024-02-09T21:37:18.123509030Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 21:37:18.126525 env[1162]: time="2024-02-09T21:37:18.124107708Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 21:37:18.126525 env[1162]: time="2024-02-09T21:37:18.124193583Z" level=info msg="Start subscribing containerd event" Feb 9 21:37:18.126525 env[1162]: time="2024-02-09T21:37:18.124225117Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 21:37:18.126525 env[1162]: time="2024-02-09T21:37:18.124230736Z" level=info msg="Start recovering state" Feb 9 21:37:18.126525 env[1162]: time="2024-02-09T21:37:18.124250221Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 21:37:18.126525 env[1162]: time="2024-02-09T21:37:18.124273338Z" level=info msg="containerd successfully booted in 0.037399s" Feb 9 21:37:18.126525 env[1162]: time="2024-02-09T21:37:18.124278774Z" level=info msg="Start event monitor" Feb 9 21:37:18.126525 env[1162]: time="2024-02-09T21:37:18.124292851Z" level=info msg="Start snapshots syncer" Feb 9 21:37:18.126525 env[1162]: time="2024-02-09T21:37:18.124300320Z" level=info msg="Start cni network conf syncer for default" Feb 9 21:37:18.126525 env[1162]: time="2024-02-09T21:37:18.124306856Z" level=info msg="Start streaming server" Feb 9 21:37:18.126681 tar[1157]: ./ptp Feb 9 21:37:18.132297 systemd[1]: Started containerd.service. Feb 9 21:37:18.155709 tar[1157]: ./vlan Feb 9 21:37:18.181385 locksmithd[1179]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 21:37:18.183448 tar[1157]: ./host-device Feb 9 21:37:18.209757 tar[1157]: ./tuning Feb 9 21:37:18.232414 tar[1157]: ./vrf Feb 9 21:37:18.257064 tar[1157]: ./sbr Feb 9 21:37:18.280289 tar[1157]: ./tap Feb 9 21:37:18.307724 tar[1157]: ./dhcp Feb 9 21:37:18.368510 systemd-networkd[1013]: bond0: Gained IPv6LL Feb 9 21:37:18.368827 systemd-timesyncd[1108]: Network configuration changed, trying to establish connection. Feb 9 21:37:18.383165 tar[1157]: ./static Feb 9 21:37:18.395462 systemd[1]: Finished prepare-critools.service. Feb 9 21:37:18.403560 tar[1157]: ./firewall Feb 9 21:37:18.433018 tar[1157]: ./macvlan Feb 9 21:37:18.460081 tar[1157]: ./dummy Feb 9 21:37:18.486632 tar[1157]: ./bridge Feb 9 21:37:18.496674 systemd-timesyncd[1108]: Network configuration changed, trying to establish connection. Feb 9 21:37:18.496763 systemd-timesyncd[1108]: Network configuration changed, trying to establish connection. Feb 9 21:37:18.519620 tar[1157]: ./ipvlan Feb 9 21:37:18.546008 tar[1157]: ./portmap Feb 9 21:37:18.571667 tar[1157]: ./host-local Feb 9 21:37:18.587493 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 9 21:37:18.616812 extend-filesystems[1138]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 21:37:18.616812 extend-filesystems[1138]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 9 21:37:18.616812 extend-filesystems[1138]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 9 21:37:18.653712 extend-filesystems[1124]: Resized filesystem in /dev/sda9 Feb 9 21:37:18.653712 extend-filesystems[1124]: Found sdb Feb 9 21:37:18.617366 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 21:37:18.670774 sshd_keygen[1151]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 21:37:18.617456 systemd[1]: Finished extend-filesystems.service. Feb 9 21:37:18.647971 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 21:37:18.662902 systemd[1]: Finished sshd-keygen.service. Feb 9 21:37:18.686109 systemd[1]: Starting issuegen.service... Feb 9 21:37:18.703976 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 21:37:18.704336 systemd[1]: Finished issuegen.service. Feb 9 21:37:18.719229 systemd[1]: Starting systemd-user-sessions.service... Feb 9 21:37:18.723630 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 9 21:37:18.731786 systemd[1]: Finished systemd-user-sessions.service. Feb 9 21:37:18.742309 systemd[1]: Started getty@tty1.service. Feb 9 21:37:18.750321 systemd[1]: Started serial-getty@ttyS1.service. Feb 9 21:37:18.758727 systemd[1]: Reached target getty.target. Feb 9 21:37:18.818485 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 9 21:37:19.686451 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 9 21:37:23.769634 login[1205]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 21:37:23.776524 systemd[1]: Created slice user-500.slice. Feb 9 21:37:23.777088 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 21:37:23.777314 login[1204]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 21:37:23.778102 systemd-logind[1152]: New session 1 of user core. Feb 9 21:37:23.780194 systemd-logind[1152]: New session 2 of user core. Feb 9 21:37:23.782380 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 21:37:23.783058 systemd[1]: Starting user@500.service... Feb 9 21:37:23.784937 (systemd)[1214]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:37:23.870809 systemd[1214]: Queued start job for default target default.target. Feb 9 21:37:23.871040 systemd[1214]: Reached target paths.target. Feb 9 21:37:23.871052 systemd[1214]: Reached target sockets.target. Feb 9 21:37:23.871060 systemd[1214]: Reached target timers.target. Feb 9 21:37:23.871067 systemd[1214]: Reached target basic.target. Feb 9 21:37:23.871085 systemd[1214]: Reached target default.target. Feb 9 21:37:23.871098 systemd[1214]: Startup finished in 83ms. Feb 9 21:37:23.871145 systemd[1]: Started user@500.service. Feb 9 21:37:23.871690 systemd[1]: Started session-1.scope. Feb 9 21:37:23.872031 systemd[1]: Started session-2.scope. Feb 9 21:37:24.065943 coreos-metadata[1117]: Feb 09 21:37:24.065 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 21:37:24.066731 coreos-metadata[1116]: Feb 09 21:37:24.065 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Feb 9 21:37:24.886503 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Feb 9 21:37:24.886656 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Feb 9 21:37:25.066339 coreos-metadata[1117]: Feb 09 21:37:25.066 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 21:37:25.067118 coreos-metadata[1116]: Feb 09 21:37:25.066 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Feb 9 21:37:25.095138 coreos-metadata[1117]: Feb 09 21:37:25.095 INFO Fetch successful Feb 9 21:37:25.095234 coreos-metadata[1116]: Feb 09 21:37:25.095 INFO Fetch successful Feb 9 21:37:25.117373 systemd[1]: Finished coreos-metadata.service. Feb 9 21:37:25.118207 systemd[1]: Started packet-phone-home.service. Feb 9 21:37:25.118748 unknown[1116]: wrote ssh authorized keys file for user: core Feb 9 21:37:25.124643 curl[1236]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 9 21:37:25.124643 curl[1236]: Dload Upload Total Spent Left Speed Feb 9 21:37:25.137717 update-ssh-keys[1237]: Updated "/home/core/.ssh/authorized_keys" Feb 9 21:37:25.137860 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 21:37:25.138020 systemd[1]: Reached target multi-user.target. Feb 9 21:37:25.138651 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 21:37:25.142686 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 21:37:25.142762 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 21:37:25.142915 systemd[1]: Startup finished in 1.850s (kernel) + 6.259s (initrd) + 14.051s (userspace) = 22.161s. Feb 9 21:37:25.310865 curl[1236]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Feb 9 21:37:25.313304 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 9 21:37:33.438232 systemd[1]: Created slice system-sshd.slice. Feb 9 21:37:33.438862 systemd[1]: Started sshd@0-139.178.90.113:22-139.178.89.65:55426.service. Feb 9 21:37:33.481669 sshd[1240]: Accepted publickey for core from 139.178.89.65 port 55426 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:37:33.482328 sshd[1240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:37:33.484716 systemd-logind[1152]: New session 3 of user core. Feb 9 21:37:33.485100 systemd[1]: Started session-3.scope. Feb 9 21:37:33.534521 systemd[1]: Started sshd@1-139.178.90.113:22-139.178.89.65:55432.service. Feb 9 21:37:33.565599 sshd[1245]: Accepted publickey for core from 139.178.89.65 port 55432 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:37:33.566286 sshd[1245]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:37:33.568468 systemd-logind[1152]: New session 4 of user core. Feb 9 21:37:33.568995 systemd[1]: Started session-4.scope. Feb 9 21:37:33.618834 sshd[1245]: pam_unix(sshd:session): session closed for user core Feb 9 21:37:33.620959 systemd[1]: sshd@1-139.178.90.113:22-139.178.89.65:55432.service: Deactivated successfully. Feb 9 21:37:33.621397 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 21:37:33.621927 systemd-logind[1152]: Session 4 logged out. Waiting for processes to exit. Feb 9 21:37:33.622605 systemd[1]: Started sshd@2-139.178.90.113:22-139.178.89.65:55448.service. Feb 9 21:37:33.623293 systemd-logind[1152]: Removed session 4. Feb 9 21:37:33.655744 sshd[1251]: Accepted publickey for core from 139.178.89.65 port 55448 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:37:33.656507 sshd[1251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:37:33.659115 systemd-logind[1152]: New session 5 of user core. Feb 9 21:37:33.659603 systemd[1]: Started session-5.scope. Feb 9 21:37:33.709777 sshd[1251]: pam_unix(sshd:session): session closed for user core Feb 9 21:37:33.714044 systemd[1]: sshd@2-139.178.90.113:22-139.178.89.65:55448.service: Deactivated successfully. Feb 9 21:37:33.715246 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 21:37:33.716537 systemd-logind[1152]: Session 5 logged out. Waiting for processes to exit. Feb 9 21:37:33.718538 systemd[1]: Started sshd@3-139.178.90.113:22-139.178.89.65:55456.service. Feb 9 21:37:33.720731 systemd-logind[1152]: Removed session 5. Feb 9 21:37:33.810007 sshd[1257]: Accepted publickey for core from 139.178.89.65 port 55456 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:37:33.811554 sshd[1257]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:37:33.816556 systemd-logind[1152]: New session 6 of user core. Feb 9 21:37:33.817717 systemd[1]: Started session-6.scope. Feb 9 21:37:33.878481 sshd[1257]: pam_unix(sshd:session): session closed for user core Feb 9 21:37:33.879920 systemd[1]: sshd@3-139.178.90.113:22-139.178.89.65:55456.service: Deactivated successfully. Feb 9 21:37:33.880213 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 21:37:33.880484 systemd-logind[1152]: Session 6 logged out. Waiting for processes to exit. Feb 9 21:37:33.880985 systemd[1]: Started sshd@4-139.178.90.113:22-139.178.89.65:55460.service. Feb 9 21:37:33.881355 systemd-logind[1152]: Removed session 6. Feb 9 21:37:33.912502 sshd[1263]: Accepted publickey for core from 139.178.89.65 port 55460 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:37:33.913441 sshd[1263]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:37:33.916529 systemd-logind[1152]: New session 7 of user core. Feb 9 21:37:33.917270 systemd[1]: Started session-7.scope. Feb 9 21:37:34.012894 sudo[1266]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 21:37:34.013428 sudo[1266]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 21:37:34.030854 dbus-daemon[1120]: \xd0̈́^\u000fV: received setenforce notice (enforcing=-47007504) Feb 9 21:37:34.035247 sudo[1266]: pam_unix(sudo:session): session closed for user root Feb 9 21:37:34.040100 sshd[1263]: pam_unix(sshd:session): session closed for user core Feb 9 21:37:34.046381 systemd[1]: sshd@4-139.178.90.113:22-139.178.89.65:55460.service: Deactivated successfully. Feb 9 21:37:34.047857 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 21:37:34.049483 systemd-logind[1152]: Session 7 logged out. Waiting for processes to exit. Feb 9 21:37:34.051832 systemd[1]: Started sshd@5-139.178.90.113:22-139.178.89.65:55464.service. Feb 9 21:37:34.053909 systemd-logind[1152]: Removed session 7. Feb 9 21:37:34.105590 sshd[1270]: Accepted publickey for core from 139.178.89.65 port 55464 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:37:34.106251 sshd[1270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:37:34.108516 systemd-logind[1152]: New session 8 of user core. Feb 9 21:37:34.108918 systemd[1]: Started session-8.scope. Feb 9 21:37:34.159065 sudo[1274]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 21:37:34.159273 sudo[1274]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 21:37:34.162449 sudo[1274]: pam_unix(sudo:session): session closed for user root Feb 9 21:37:34.167813 sudo[1273]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 21:37:34.168096 sudo[1273]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 21:37:34.184940 systemd[1]: Stopping audit-rules.service... Feb 9 21:37:34.185000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 21:37:34.187803 auditctl[1277]: No rules Feb 9 21:37:34.188531 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 21:37:34.188937 systemd[1]: Stopped audit-rules.service. Feb 9 21:37:34.192460 systemd[1]: Starting audit-rules.service... Feb 9 21:37:34.193321 kernel: kauditd_printk_skb: 95 callbacks suppressed Feb 9 21:37:34.193562 kernel: audit: type=1305 audit(1707514654.185:127): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 21:37:34.205347 augenrules[1294]: No rules Feb 9 21:37:34.205641 systemd[1]: Finished audit-rules.service. Feb 9 21:37:34.206043 sudo[1273]: pam_unix(sudo:session): session closed for user root Feb 9 21:37:34.206775 sshd[1270]: pam_unix(sshd:session): session closed for user core Feb 9 21:37:34.208178 systemd[1]: sshd@5-139.178.90.113:22-139.178.89.65:55464.service: Deactivated successfully. Feb 9 21:37:34.185000 audit[1277]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffde203eb90 a2=420 a3=0 items=0 ppid=1 pid=1277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:34.208478 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 21:37:34.208974 systemd-logind[1152]: Session 8 logged out. Waiting for processes to exit. Feb 9 21:37:34.209450 systemd[1]: Started sshd@6-139.178.90.113:22-139.178.89.65:55476.service. Feb 9 21:37:34.210009 systemd-logind[1152]: Removed session 8. Feb 9 21:37:34.239908 kernel: audit: type=1300 audit(1707514654.185:127): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffde203eb90 a2=420 a3=0 items=0 ppid=1 pid=1277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:34.239962 kernel: audit: type=1327 audit(1707514654.185:127): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 21:37:34.185000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 21:37:34.249431 kernel: audit: type=1131 audit(1707514654.187:128): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:34.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:34.271906 kernel: audit: type=1130 audit(1707514654.204:129): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:34.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:34.274225 sshd[1300]: Accepted publickey for core from 139.178.89.65 port 55476 ssh2: RSA SHA256:ya3CuIx5HRXQ7ikfrirbGy0PeU2mVoIERJKJ2pM2LHs Feb 9 21:37:34.275759 sshd[1300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 21:37:34.278110 systemd-logind[1152]: New session 9 of user core. Feb 9 21:37:34.278498 systemd[1]: Started session-9.scope. Feb 9 21:37:34.294385 kernel: audit: type=1106 audit(1707514654.204:130): pid=1273 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:37:34.204000 audit[1273]: USER_END pid=1273 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:37:34.320384 kernel: audit: type=1104 audit(1707514654.204:131): pid=1273 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:37:34.204000 audit[1273]: CRED_DISP pid=1273 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:37:34.325867 sudo[1303]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 21:37:34.325972 sudo[1303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 21:37:34.343940 kernel: audit: type=1106 audit(1707514654.205:132): pid=1270 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:37:34.205000 audit[1270]: USER_END pid=1270 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:37:34.375940 kernel: audit: type=1104 audit(1707514654.206:133): pid=1270 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:37:34.206000 audit[1270]: CRED_DISP pid=1270 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:37:34.401795 kernel: audit: type=1131 audit(1707514654.206:134): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.90.113:22-139.178.89.65:55464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:34.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.90.113:22-139.178.89.65:55464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:34.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.113:22-139.178.89.65:55476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:34.272000 audit[1300]: USER_ACCT pid=1300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:37:34.274000 audit[1300]: CRED_ACQ pid=1300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:37:34.274000 audit[1300]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf6e2bac0 a2=3 a3=0 items=0 ppid=1 pid=1300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:34.274000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 21:37:34.280000 audit[1300]: USER_START pid=1300 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:37:34.280000 audit[1302]: CRED_ACQ pid=1302 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:37:34.324000 audit[1303]: USER_ACCT pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:37:34.324000 audit[1303]: CRED_REFR pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:37:34.325000 audit[1303]: USER_START pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:37:38.335012 systemd[1]: Reloading. Feb 9 21:37:38.366409 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T21:37:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 21:37:38.366427 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-09T21:37:38Z" level=info msg="torcx already run" Feb 9 21:37:38.419807 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 21:37:38.419814 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 21:37:38.430652 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit: BPF prog-id=29 op=LOAD Feb 9 21:37:38.473000 audit: BPF prog-id=24 op=UNLOAD Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit: BPF prog-id=30 op=LOAD Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.473000 audit: BPF prog-id=31 op=LOAD Feb 9 21:37:38.473000 audit: BPF prog-id=25 op=UNLOAD Feb 9 21:37:38.473000 audit: BPF prog-id=26 op=UNLOAD Feb 9 21:37:38.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.475000 audit: BPF prog-id=32 op=LOAD Feb 9 21:37:38.475000 audit: BPF prog-id=18 op=UNLOAD Feb 9 21:37:38.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.475000 audit: BPF prog-id=33 op=LOAD Feb 9 21:37:38.475000 audit: BPF prog-id=27 op=UNLOAD Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit: BPF prog-id=34 op=LOAD Feb 9 21:37:38.476000 audit: BPF prog-id=22 op=UNLOAD Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.476000 audit: BPF prog-id=35 op=LOAD Feb 9 21:37:38.476000 audit: BPF prog-id=23 op=UNLOAD Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit: BPF prog-id=36 op=LOAD Feb 9 21:37:38.477000 audit: BPF prog-id=19 op=UNLOAD Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit: BPF prog-id=37 op=LOAD Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.477000 audit: BPF prog-id=38 op=LOAD Feb 9 21:37:38.477000 audit: BPF prog-id=20 op=UNLOAD Feb 9 21:37:38.477000 audit: BPF prog-id=21 op=UNLOAD Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit: BPF prog-id=39 op=LOAD Feb 9 21:37:38.478000 audit: BPF prog-id=13 op=UNLOAD Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit: BPF prog-id=40 op=LOAD Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit: BPF prog-id=41 op=LOAD Feb 9 21:37:38.479000 audit: BPF prog-id=14 op=UNLOAD Feb 9 21:37:38.479000 audit: BPF prog-id=15 op=UNLOAD Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit: BPF prog-id=42 op=LOAD Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:38.479000 audit: BPF prog-id=43 op=LOAD Feb 9 21:37:38.479000 audit: BPF prog-id=16 op=UNLOAD Feb 9 21:37:38.479000 audit: BPF prog-id=17 op=UNLOAD Feb 9 21:37:38.484174 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 21:37:38.487926 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 21:37:38.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:38.488163 systemd[1]: Reached target network-online.target. Feb 9 21:37:38.488795 systemd[1]: Started kubelet.service. Feb 9 21:37:38.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:39.086186 kubelet[1390]: E0209 21:37:39.086065 1390 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 21:37:39.089676 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 21:37:39.089894 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 21:37:39.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 21:37:39.350735 systemd[1]: Stopped kubelet.service. Feb 9 21:37:39.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:39.356405 kernel: kauditd_printk_skb: 186 callbacks suppressed Feb 9 21:37:39.356488 kernel: audit: type=1130 audit(1707514659.349:319): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:39.358582 systemd[1]: Reloading. Feb 9 21:37:39.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:39.395311 /usr/lib/systemd/system-generators/torcx-generator[1486]: time="2024-02-09T21:37:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 21:37:39.395328 /usr/lib/systemd/system-generators/torcx-generator[1486]: time="2024-02-09T21:37:39Z" level=info msg="torcx already run" Feb 9 21:37:39.417267 kernel: audit: type=1131 audit(1707514659.349:320): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:39.443455 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 21:37:39.443462 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 21:37:39.454377 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 21:37:39.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.609412 kernel: audit: type=1400 audit(1707514659.497:321): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.609466 kernel: audit: type=1400 audit(1707514659.497:322): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.609553 kernel: audit: type=1400 audit(1707514659.497:323): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.724110 kernel: audit: type=1400 audit(1707514659.497:324): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.724191 kernel: audit: type=1400 audit(1707514659.497:325): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.846086 kernel: audit: type=1400 audit(1707514659.497:326): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.846124 kernel: audit: type=1400 audit(1707514659.497:327): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.973283 kernel: audit: type=1400 audit(1707514659.497:328): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.664000 audit: BPF prog-id=44 op=LOAD Feb 9 21:37:39.664000 audit: BPF prog-id=29 op=UNLOAD Feb 9 21:37:39.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.844000 audit: BPF prog-id=45 op=LOAD Feb 9 21:37:39.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.971000 audit: BPF prog-id=46 op=LOAD Feb 9 21:37:39.971000 audit: BPF prog-id=30 op=UNLOAD Feb 9 21:37:39.971000 audit: BPF prog-id=31 op=UNLOAD Feb 9 21:37:39.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.972000 audit: BPF prog-id=47 op=LOAD Feb 9 21:37:39.972000 audit: BPF prog-id=32 op=UNLOAD Feb 9 21:37:39.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.973000 audit: BPF prog-id=48 op=LOAD Feb 9 21:37:39.973000 audit: BPF prog-id=33 op=UNLOAD Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit: BPF prog-id=49 op=LOAD Feb 9 21:37:39.974000 audit: BPF prog-id=34 op=UNLOAD Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.974000 audit: BPF prog-id=50 op=LOAD Feb 9 21:37:39.974000 audit: BPF prog-id=35 op=UNLOAD Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit: BPF prog-id=51 op=LOAD Feb 9 21:37:39.975000 audit: BPF prog-id=36 op=UNLOAD Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit: BPF prog-id=52 op=LOAD Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.975000 audit: BPF prog-id=53 op=LOAD Feb 9 21:37:39.975000 audit: BPF prog-id=37 op=UNLOAD Feb 9 21:37:39.975000 audit: BPF prog-id=38 op=UNLOAD Feb 9 21:37:39.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit: BPF prog-id=54 op=LOAD Feb 9 21:37:39.977000 audit: BPF prog-id=39 op=UNLOAD Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit: BPF prog-id=55 op=LOAD Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit: BPF prog-id=56 op=LOAD Feb 9 21:37:39.977000 audit: BPF prog-id=40 op=UNLOAD Feb 9 21:37:39.977000 audit: BPF prog-id=41 op=UNLOAD Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit: BPF prog-id=57 op=LOAD Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:39.977000 audit: BPF prog-id=58 op=LOAD Feb 9 21:37:39.977000 audit: BPF prog-id=42 op=UNLOAD Feb 9 21:37:39.977000 audit: BPF prog-id=43 op=UNLOAD Feb 9 21:37:39.985397 systemd[1]: Started kubelet.service. Feb 9 21:37:39.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:40.015737 kubelet[1542]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 21:37:40.015737 kubelet[1542]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 21:37:40.015737 kubelet[1542]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 21:37:40.015949 kubelet[1542]: I0209 21:37:40.015776 1542 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 21:37:40.232641 kubelet[1542]: I0209 21:37:40.232571 1542 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 21:37:40.232641 kubelet[1542]: I0209 21:37:40.232586 1542 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 21:37:40.232724 kubelet[1542]: I0209 21:37:40.232719 1542 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 21:37:40.245000 kubelet[1542]: I0209 21:37:40.244964 1542 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 21:37:40.264409 kubelet[1542]: I0209 21:37:40.264364 1542 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 21:37:40.265130 kubelet[1542]: I0209 21:37:40.265090 1542 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 21:37:40.265130 kubelet[1542]: I0209 21:37:40.265125 1542 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.1} GracePeriod:0s MinReclaim:<nil>} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity:<nil> Percentage:0.05} GracePeriod:0s MinReclaim:<nil>} {Signal:imagefs.available Operator:LessThan Value:{Quantity:<nil> Percentage:0.15} GracePeriod:0s MinReclaim:<nil>}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 21:37:40.266013 kubelet[1542]: I0209 21:37:40.265902 1542 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 21:37:40.266013 kubelet[1542]: I0209 21:37:40.265950 1542 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 21:37:40.266288 kubelet[1542]: I0209 21:37:40.266282 1542 state_mem.go:36] "Initialized new in-memory state store" Feb 9 21:37:40.273546 kubelet[1542]: I0209 21:37:40.273538 1542 kubelet.go:405] "Attempting to sync node with API server" Feb 9 21:37:40.273579 kubelet[1542]: I0209 21:37:40.273548 1542 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 21:37:40.273964 kubelet[1542]: I0209 21:37:40.273925 1542 kubelet.go:309] "Adding apiserver pod source" Feb 9 21:37:40.273964 kubelet[1542]: I0209 21:37:40.273945 1542 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 21:37:40.273964 kubelet[1542]: E0209 21:37:40.273953 1542 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:40.274031 kubelet[1542]: E0209 21:37:40.273984 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:40.276495 kubelet[1542]: I0209 21:37:40.276486 1542 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 21:37:40.278680 kubelet[1542]: W0209 21:37:40.278637 1542 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 21:37:40.280218 kubelet[1542]: I0209 21:37:40.280182 1542 server.go:1168] "Started kubelet" Feb 9 21:37:40.280254 kubelet[1542]: I0209 21:37:40.280245 1542 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 21:37:40.280276 kubelet[1542]: I0209 21:37:40.280264 1542 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 21:37:40.280394 kubelet[1542]: E0209 21:37:40.280385 1542 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 21:37:40.280427 kubelet[1542]: E0209 21:37:40.280400 1542 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 21:37:40.282000 audit[1542]: AVC avc: denied { mac_admin } for pid=1542 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:40.282000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 21:37:40.282000 audit[1542]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011c0ab0 a1=c0011c2648 a2=c0011c0a80 a3=25 items=0 ppid=1 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.282000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 21:37:40.282000 audit[1542]: AVC avc: denied { mac_admin } for pid=1542 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:40.282000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 21:37:40.282000 audit[1542]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0011e42c0 a1=c0011c2660 a2=c0011c0b40 a3=25 items=0 ppid=1 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.282000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 21:37:40.284783 kubelet[1542]: I0209 21:37:40.284389 1542 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 21:37:40.284783 kubelet[1542]: I0209 21:37:40.284420 1542 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 21:37:40.284783 kubelet[1542]: I0209 21:37:40.284477 1542 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 21:37:40.284783 kubelet[1542]: I0209 21:37:40.284504 1542 server.go:461] "Adding debug handlers to kubelet server" Feb 9 21:37:40.284783 kubelet[1542]: I0209 21:37:40.284710 1542 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 21:37:40.284953 kubelet[1542]: I0209 21:37:40.284862 1542 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 21:37:40.289275 kubelet[1542]: E0209 21:37:40.289262 1542 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.67.80.21\" not found" node="10.67.80.21" Feb 9 21:37:40.298221 kubelet[1542]: I0209 21:37:40.298205 1542 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 21:37:40.298221 kubelet[1542]: I0209 21:37:40.298218 1542 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 21:37:40.298349 kubelet[1542]: I0209 21:37:40.298230 1542 state_mem.go:36] "Initialized new in-memory state store" Feb 9 21:37:40.299167 kubelet[1542]: I0209 21:37:40.299157 1542 policy_none.go:49] "None policy: Start" Feb 9 21:37:40.299495 kubelet[1542]: I0209 21:37:40.299459 1542 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 21:37:40.299495 kubelet[1542]: I0209 21:37:40.299471 1542 state_mem.go:35] "Initializing new in-memory state store" Feb 9 21:37:40.303724 systemd[1]: Created slice kubepods.slice. Feb 9 21:37:40.304000 audit[1567]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:37:40.304000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffff24aa4e0 a2=0 a3=7ffff24aa4cc items=0 ppid=1542 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 21:37:40.305905 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 21:37:40.304000 audit[1571]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1571 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:37:40.304000 audit[1571]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffce89a5fc0 a2=0 a3=7ffce89a5fac items=0 ppid=1542 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 21:37:40.307752 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 21:37:40.317054 kubelet[1542]: I0209 21:37:40.317018 1542 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 21:37:40.317054 kubelet[1542]: I0209 21:37:40.317046 1542 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 21:37:40.315000 audit[1542]: AVC avc: denied { mac_admin } for pid=1542 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:40.315000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 21:37:40.315000 audit[1542]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00123adb0 a1=c0012cd068 a2=c00123ad80 a3=25 items=0 ppid=1 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.315000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 21:37:40.317212 kubelet[1542]: I0209 21:37:40.317139 1542 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 21:37:40.317402 kubelet[1542]: E0209 21:37:40.317394 1542 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.80.21\" not found" Feb 9 21:37:40.305000 audit[1573]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:37:40.305000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc6507ed80 a2=0 a3=7ffc6507ed6c items=0 ppid=1542 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.305000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 21:37:40.332000 audit[1578]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1578 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:37:40.332000 audit[1578]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd68391ac0 a2=0 a3=7ffd68391aac items=0 ppid=1542 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.332000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 21:37:40.366000 audit[1583]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1583 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:37:40.366000 audit[1583]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff390fb560 a2=0 a3=7fff390fb54c items=0 ppid=1542 pid=1583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 21:37:40.367926 kubelet[1542]: I0209 21:37:40.367871 1542 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 21:37:40.366000 audit[1584]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1584 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:37:40.366000 audit[1584]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe1c30b350 a2=0 a3=7ffe1c30b33c items=0 ppid=1542 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.366000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 21:37:40.368586 kubelet[1542]: I0209 21:37:40.368556 1542 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 21:37:40.368586 kubelet[1542]: I0209 21:37:40.368575 1542 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 21:37:40.367000 audit[1585]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1585 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:37:40.367000 audit[1585]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff411e9740 a2=0 a3=7fff411e972c items=0 ppid=1542 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 21:37:40.368738 kubelet[1542]: I0209 21:37:40.368594 1542 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 21:37:40.368738 kubelet[1542]: E0209 21:37:40.368630 1542 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 21:37:40.367000 audit[1586]: NETFILTER_CFG table=mangle:9 family=10 entries=1 op=nft_register_chain pid=1586 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:37:40.367000 audit[1586]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8b001ff0 a2=0 a3=7ffd8b001fdc items=0 ppid=1542 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 21:37:40.367000 audit[1587]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1587 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:37:40.367000 audit[1587]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcb65d1dd0 a2=0 a3=7ffcb65d1dbc items=0 ppid=1542 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 21:37:40.368000 audit[1588]: NETFILTER_CFG table=nat:11 family=10 entries=2 op=nft_register_chain pid=1588 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:37:40.368000 audit[1588]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdeb9fa070 a2=0 a3=7ffdeb9fa05c items=0 ppid=1542 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 21:37:40.368000 audit[1589]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1589 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:37:40.368000 audit[1589]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5cf58800 a2=0 a3=7fff5cf587ec items=0 ppid=1542 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 21:37:40.369000 audit[1590]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1590 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:37:40.369000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe6dc28af0 a2=0 a3=7ffe6dc28adc items=0 ppid=1542 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:40.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 21:37:40.385896 kubelet[1542]: I0209 21:37:40.385855 1542 kubelet_node_status.go:70] "Attempting to register node" node="10.67.80.21" Feb 9 21:37:40.392423 kubelet[1542]: I0209 21:37:40.392381 1542 kubelet_node_status.go:73] "Successfully registered node" node="10.67.80.21" Feb 9 21:37:40.407942 kubelet[1542]: I0209 21:37:40.407894 1542 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 21:37:40.408614 env[1162]: time="2024-02-09T21:37:40.408531859Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 21:37:40.409315 kubelet[1542]: I0209 21:37:40.408957 1542 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 21:37:41.234906 kubelet[1542]: I0209 21:37:41.234837 1542 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 21:37:41.235855 kubelet[1542]: W0209 21:37:41.235233 1542 reflector.go:456] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.RuntimeClass ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Feb 9 21:37:41.235855 kubelet[1542]: W0209 21:37:41.235258 1542 reflector.go:456] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.CSIDriver ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Feb 9 21:37:41.235855 kubelet[1542]: W0209 21:37:41.235333 1542 reflector.go:456] vendor/k8s.io/client-go/informers/factory.go:150: watch of *v1.Service ended with: very short watch: vendor/k8s.io/client-go/informers/factory.go:150: Unexpected watch close - watch lasted less than a second and no items received Feb 9 21:37:41.274624 kubelet[1542]: E0209 21:37:41.274531 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:41.274624 kubelet[1542]: I0209 21:37:41.274535 1542 apiserver.go:52] "Watching apiserver" Feb 9 21:37:41.280409 kubelet[1542]: I0209 21:37:41.280329 1542 topology_manager.go:212] "Topology Admit Handler" Feb 9 21:37:41.280601 kubelet[1542]: I0209 21:37:41.280559 1542 topology_manager.go:212] "Topology Admit Handler" Feb 9 21:37:41.280700 kubelet[1542]: I0209 21:37:41.280663 1542 topology_manager.go:212] "Topology Admit Handler" Feb 9 21:37:41.282467 kubelet[1542]: E0209 21:37:41.282371 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:37:41.288263 kubelet[1542]: I0209 21:37:41.288252 1542 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 21:37:41.289614 systemd[1]: Created slice kubepods-besteffort-pod504d220f_f653_4a9e_a19c_0518eda514c8.slice. Feb 9 21:37:41.290511 kubelet[1542]: I0209 21:37:41.290501 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/504d220f-f653-4a9e-a19c-0518eda514c8-xtables-lock\") pod \"kube-proxy-jqdqw\" (UID: \"504d220f-f653-4a9e-a19c-0518eda514c8\") " pod="kube-system/kube-proxy-jqdqw" Feb 9 21:37:41.290550 kubelet[1542]: I0209 21:37:41.290522 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/504d220f-f653-4a9e-a19c-0518eda514c8-lib-modules\") pod \"kube-proxy-jqdqw\" (UID: \"504d220f-f653-4a9e-a19c-0518eda514c8\") " pod="kube-system/kube-proxy-jqdqw" Feb 9 21:37:41.290550 kubelet[1542]: I0209 21:37:41.290547 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b4a7695f-bd57-4b5e-9f75-2d2547f2f573-node-certs\") pod \"calico-node-fkdg5\" (UID: \"b4a7695f-bd57-4b5e-9f75-2d2547f2f573\") " pod="calico-system/calico-node-fkdg5" Feb 9 21:37:41.290597 kubelet[1542]: I0209 21:37:41.290577 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b4a7695f-bd57-4b5e-9f75-2d2547f2f573-var-run-calico\") pod \"calico-node-fkdg5\" (UID: \"b4a7695f-bd57-4b5e-9f75-2d2547f2f573\") " pod="calico-system/calico-node-fkdg5" Feb 9 21:37:41.290597 kubelet[1542]: I0209 21:37:41.290592 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f2szf\" (UniqueName: \"kubernetes.io/projected/b4a7695f-bd57-4b5e-9f75-2d2547f2f573-kube-api-access-f2szf\") pod \"calico-node-fkdg5\" (UID: \"b4a7695f-bd57-4b5e-9f75-2d2547f2f573\") " pod="calico-system/calico-node-fkdg5" Feb 9 21:37:41.290654 kubelet[1542]: I0209 21:37:41.290604 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/dfb34e95-52fb-45cb-bba0-97a341a445ca-varrun\") pod \"csi-node-driver-wqwwd\" (UID: \"dfb34e95-52fb-45cb-bba0-97a341a445ca\") " pod="calico-system/csi-node-driver-wqwwd" Feb 9 21:37:41.290654 kubelet[1542]: I0209 21:37:41.290619 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/dfb34e95-52fb-45cb-bba0-97a341a445ca-kubelet-dir\") pod \"csi-node-driver-wqwwd\" (UID: \"dfb34e95-52fb-45cb-bba0-97a341a445ca\") " pod="calico-system/csi-node-driver-wqwwd" Feb 9 21:37:41.290654 kubelet[1542]: I0209 21:37:41.290647 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-txqhb\" (UniqueName: \"kubernetes.io/projected/dfb34e95-52fb-45cb-bba0-97a341a445ca-kube-api-access-txqhb\") pod \"csi-node-driver-wqwwd\" (UID: \"dfb34e95-52fb-45cb-bba0-97a341a445ca\") " pod="calico-system/csi-node-driver-wqwwd" Feb 9 21:37:41.290723 kubelet[1542]: I0209 21:37:41.290674 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2tx2m\" (UniqueName: \"kubernetes.io/projected/504d220f-f653-4a9e-a19c-0518eda514c8-kube-api-access-2tx2m\") pod \"kube-proxy-jqdqw\" (UID: \"504d220f-f653-4a9e-a19c-0518eda514c8\") " pod="kube-system/kube-proxy-jqdqw" Feb 9 21:37:41.290723 kubelet[1542]: I0209 21:37:41.290715 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b4a7695f-bd57-4b5e-9f75-2d2547f2f573-cni-bin-dir\") pod \"calico-node-fkdg5\" (UID: \"b4a7695f-bd57-4b5e-9f75-2d2547f2f573\") " pod="calico-system/calico-node-fkdg5" Feb 9 21:37:41.290764 kubelet[1542]: I0209 21:37:41.290728 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b4a7695f-bd57-4b5e-9f75-2d2547f2f573-cni-log-dir\") pod \"calico-node-fkdg5\" (UID: \"b4a7695f-bd57-4b5e-9f75-2d2547f2f573\") " pod="calico-system/calico-node-fkdg5" Feb 9 21:37:41.290764 kubelet[1542]: I0209 21:37:41.290739 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/504d220f-f653-4a9e-a19c-0518eda514c8-kube-proxy\") pod \"kube-proxy-jqdqw\" (UID: \"504d220f-f653-4a9e-a19c-0518eda514c8\") " pod="kube-system/kube-proxy-jqdqw" Feb 9 21:37:41.290764 kubelet[1542]: I0209 21:37:41.290753 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b4a7695f-bd57-4b5e-9f75-2d2547f2f573-xtables-lock\") pod \"calico-node-fkdg5\" (UID: \"b4a7695f-bd57-4b5e-9f75-2d2547f2f573\") " pod="calico-system/calico-node-fkdg5" Feb 9 21:37:41.290846 kubelet[1542]: I0209 21:37:41.290767 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b4a7695f-bd57-4b5e-9f75-2d2547f2f573-policysync\") pod \"calico-node-fkdg5\" (UID: \"b4a7695f-bd57-4b5e-9f75-2d2547f2f573\") " pod="calico-system/calico-node-fkdg5" Feb 9 21:37:41.290846 kubelet[1542]: I0209 21:37:41.290779 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b4a7695f-bd57-4b5e-9f75-2d2547f2f573-tigera-ca-bundle\") pod \"calico-node-fkdg5\" (UID: \"b4a7695f-bd57-4b5e-9f75-2d2547f2f573\") " pod="calico-system/calico-node-fkdg5" Feb 9 21:37:41.290846 kubelet[1542]: I0209 21:37:41.290791 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b4a7695f-bd57-4b5e-9f75-2d2547f2f573-var-lib-calico\") pod \"calico-node-fkdg5\" (UID: \"b4a7695f-bd57-4b5e-9f75-2d2547f2f573\") " pod="calico-system/calico-node-fkdg5" Feb 9 21:37:41.290846 kubelet[1542]: I0209 21:37:41.290829 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b4a7695f-bd57-4b5e-9f75-2d2547f2f573-flexvol-driver-host\") pod \"calico-node-fkdg5\" (UID: \"b4a7695f-bd57-4b5e-9f75-2d2547f2f573\") " pod="calico-system/calico-node-fkdg5" Feb 9 21:37:41.290930 kubelet[1542]: I0209 21:37:41.290850 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b4a7695f-bd57-4b5e-9f75-2d2547f2f573-lib-modules\") pod \"calico-node-fkdg5\" (UID: \"b4a7695f-bd57-4b5e-9f75-2d2547f2f573\") " pod="calico-system/calico-node-fkdg5" Feb 9 21:37:41.290930 kubelet[1542]: I0209 21:37:41.290863 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b4a7695f-bd57-4b5e-9f75-2d2547f2f573-cni-net-dir\") pod \"calico-node-fkdg5\" (UID: \"b4a7695f-bd57-4b5e-9f75-2d2547f2f573\") " pod="calico-system/calico-node-fkdg5" Feb 9 21:37:41.290930 kubelet[1542]: I0209 21:37:41.290877 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/dfb34e95-52fb-45cb-bba0-97a341a445ca-socket-dir\") pod \"csi-node-driver-wqwwd\" (UID: \"dfb34e95-52fb-45cb-bba0-97a341a445ca\") " pod="calico-system/csi-node-driver-wqwwd" Feb 9 21:37:41.290930 kubelet[1542]: I0209 21:37:41.290890 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/dfb34e95-52fb-45cb-bba0-97a341a445ca-registration-dir\") pod \"csi-node-driver-wqwwd\" (UID: \"dfb34e95-52fb-45cb-bba0-97a341a445ca\") " pod="calico-system/csi-node-driver-wqwwd" Feb 9 21:37:41.290930 kubelet[1542]: I0209 21:37:41.290901 1542 reconciler.go:41] "Reconciler: start to sync state" Feb 9 21:37:41.317399 systemd[1]: Created slice kubepods-besteffort-podb4a7695f_bd57_4b5e_9f75_2d2547f2f573.slice. Feb 9 21:37:41.393966 kubelet[1542]: E0209 21:37:41.393893 1542 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 21:37:41.393966 kubelet[1542]: W0209 21:37:41.393959 1542 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 21:37:41.394361 kubelet[1542]: E0209 21:37:41.394029 1542 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 21:37:41.394602 kubelet[1542]: E0209 21:37:41.394574 1542 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 21:37:41.394716 kubelet[1542]: W0209 21:37:41.394600 1542 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 21:37:41.394716 kubelet[1542]: E0209 21:37:41.394645 1542 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 21:37:41.395498 kubelet[1542]: E0209 21:37:41.395430 1542 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 21:37:41.395498 kubelet[1542]: W0209 21:37:41.395488 1542 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 21:37:41.395748 kubelet[1542]: E0209 21:37:41.395531 1542 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 21:37:41.398023 kubelet[1542]: E0209 21:37:41.397973 1542 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 21:37:41.398023 kubelet[1542]: W0209 21:37:41.397995 1542 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 21:37:41.398023 kubelet[1542]: E0209 21:37:41.398020 1542 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 21:37:41.409296 kubelet[1542]: E0209 21:37:41.409287 1542 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 21:37:41.409296 kubelet[1542]: W0209 21:37:41.409294 1542 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 21:37:41.409367 kubelet[1542]: E0209 21:37:41.409305 1542 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 21:37:41.409428 kubelet[1542]: E0209 21:37:41.409420 1542 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 21:37:41.409465 kubelet[1542]: W0209 21:37:41.409429 1542 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 21:37:41.409465 kubelet[1542]: E0209 21:37:41.409447 1542 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 21:37:41.409641 kubelet[1542]: E0209 21:37:41.409604 1542 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 21:37:41.409641 kubelet[1542]: W0209 21:37:41.409611 1542 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 21:37:41.409641 kubelet[1542]: E0209 21:37:41.409619 1542 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 21:37:41.529346 sudo[1303]: pam_unix(sudo:session): session closed for user root Feb 9 21:37:41.527000 audit[1303]: USER_END pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:37:41.528000 audit[1303]: CRED_DISP pid=1303 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 21:37:41.532230 sshd[1300]: pam_unix(sshd:session): session closed for user core Feb 9 21:37:41.533000 audit[1300]: USER_END pid=1300 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:37:41.533000 audit[1300]: CRED_DISP pid=1300 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Feb 9 21:37:41.538215 systemd[1]: sshd@6-139.178.90.113:22-139.178.89.65:55476.service: Deactivated successfully. Feb 9 21:37:41.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.90.113:22-139.178.89.65:55476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:37:41.539926 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 21:37:41.541617 systemd-logind[1152]: Session 9 logged out. Waiting for processes to exit. Feb 9 21:37:41.543696 systemd-logind[1152]: Removed session 9. Feb 9 21:37:41.613662 env[1162]: time="2024-02-09T21:37:41.613538881Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jqdqw,Uid:504d220f-f653-4a9e-a19c-0518eda514c8,Namespace:kube-system,Attempt:0,}" Feb 9 21:37:41.622681 env[1162]: time="2024-02-09T21:37:41.622568901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fkdg5,Uid:b4a7695f-bd57-4b5e-9f75-2d2547f2f573,Namespace:calico-system,Attempt:0,}" Feb 9 21:37:42.275348 kubelet[1542]: E0209 21:37:42.275233 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:42.318279 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount422994705.mount: Deactivated successfully. Feb 9 21:37:42.319852 env[1162]: time="2024-02-09T21:37:42.319806127Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:37:42.320703 env[1162]: time="2024-02-09T21:37:42.320665626Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:37:42.321402 env[1162]: time="2024-02-09T21:37:42.321361182Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:37:42.322125 env[1162]: time="2024-02-09T21:37:42.322085533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:37:42.322466 env[1162]: time="2024-02-09T21:37:42.322425890Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:37:42.323643 env[1162]: time="2024-02-09T21:37:42.323604649Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:37:42.324847 env[1162]: time="2024-02-09T21:37:42.324807940Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:37:42.325199 env[1162]: time="2024-02-09T21:37:42.325154749Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:37:42.331045 env[1162]: time="2024-02-09T21:37:42.331016012Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:37:42.331045 env[1162]: time="2024-02-09T21:37:42.331038081Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:37:42.331045 env[1162]: time="2024-02-09T21:37:42.331045682Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:37:42.331146 env[1162]: time="2024-02-09T21:37:42.331107318Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cafcda5ab59fb20e1cb30015c8b48353a1e1d5b1022889eec88f36d56f93de7d pid=1620 runtime=io.containerd.runc.v2 Feb 9 21:37:42.331433 env[1162]: time="2024-02-09T21:37:42.331410143Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:37:42.331433 env[1162]: time="2024-02-09T21:37:42.331427055Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:37:42.331491 env[1162]: time="2024-02-09T21:37:42.331434038Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:37:42.331601 env[1162]: time="2024-02-09T21:37:42.331506613Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d0bf8cd9c8ad799d192e14443b37e8591b054590431b870586504d8dff1ce1f9 pid=1628 runtime=io.containerd.runc.v2 Feb 9 21:37:42.336876 systemd[1]: Started cri-containerd-d0bf8cd9c8ad799d192e14443b37e8591b054590431b870586504d8dff1ce1f9.scope. Feb 9 21:37:42.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit: BPF prog-id=59 op=LOAD Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1628 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:42.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430626638636439633861643739396431393265313434343362333765 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1628 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:42.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430626638636439633861643739396431393265313434343362333765 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit: BPF prog-id=60 op=LOAD Feb 9 21:37:42.341000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001ad8e0 items=0 ppid=1628 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:42.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430626638636439633861643739396431393265313434343362333765 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit: BPF prog-id=61 op=LOAD Feb 9 21:37:42.341000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001ad928 items=0 ppid=1628 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:42.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430626638636439633861643739396431393265313434343362333765 Feb 9 21:37:42.341000 audit: BPF prog-id=61 op=UNLOAD Feb 9 21:37:42.341000 audit: BPF prog-id=60 op=UNLOAD Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { perfmon } for pid=1642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit[1642]: AVC avc: denied { bpf } for pid=1642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.341000 audit: BPF prog-id=62 op=LOAD Feb 9 21:37:42.341000 audit[1642]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0001add38 items=0 ppid=1628 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:42.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430626638636439633861643739396431393265313434343362333765 Feb 9 21:37:42.348372 systemd[1]: Started cri-containerd-cafcda5ab59fb20e1cb30015c8b48353a1e1d5b1022889eec88f36d56f93de7d.scope. Feb 9 21:37:42.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit: BPF prog-id=63 op=LOAD Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=1620 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:42.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361666364613561623539666232306531636233303031356338623438 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=c items=0 ppid=1620 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:42.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361666364613561623539666232306531636233303031356338623438 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit: BPF prog-id=64 op=LOAD Feb 9 21:37:42.353000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c000202e80 items=0 ppid=1620 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:42.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361666364613561623539666232306531636233303031356338623438 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit: BPF prog-id=65 op=LOAD Feb 9 21:37:42.353000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c000202ec8 items=0 ppid=1620 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:42.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361666364613561623539666232306531636233303031356338623438 Feb 9 21:37:42.353000 audit: BPF prog-id=65 op=UNLOAD Feb 9 21:37:42.353000 audit: BPF prog-id=64 op=UNLOAD Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { perfmon } for pid=1641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit[1641]: AVC avc: denied { bpf } for pid=1641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:37:42.353000 audit: BPF prog-id=66 op=LOAD Feb 9 21:37:42.353000 audit[1641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c0002032d8 items=0 ppid=1620 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:37:42.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361666364613561623539666232306531636233303031356338623438 Feb 9 21:37:42.360401 env[1162]: time="2024-02-09T21:37:42.360374623Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fkdg5,Uid:b4a7695f-bd57-4b5e-9f75-2d2547f2f573,Namespace:calico-system,Attempt:0,} returns sandbox id \"d0bf8cd9c8ad799d192e14443b37e8591b054590431b870586504d8dff1ce1f9\"" Feb 9 21:37:42.362158 env[1162]: time="2024-02-09T21:37:42.362141903Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 21:37:42.373119 env[1162]: time="2024-02-09T21:37:42.373078551Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jqdqw,Uid:504d220f-f653-4a9e-a19c-0518eda514c8,Namespace:kube-system,Attempt:0,} returns sandbox id \"cafcda5ab59fb20e1cb30015c8b48353a1e1d5b1022889eec88f36d56f93de7d\"" Feb 9 21:37:43.276505 kubelet[1542]: E0209 21:37:43.276395 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:43.370104 kubelet[1542]: E0209 21:37:43.370030 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:37:44.277555 kubelet[1542]: E0209 21:37:44.277470 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:45.278719 kubelet[1542]: E0209 21:37:45.278648 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:45.369595 kubelet[1542]: E0209 21:37:45.369524 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:37:45.565294 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3784972321.mount: Deactivated successfully. Feb 9 21:37:46.279401 kubelet[1542]: E0209 21:37:46.279298 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:47.280552 kubelet[1542]: E0209 21:37:47.280475 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:47.369435 kubelet[1542]: E0209 21:37:47.369326 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:37:48.281439 kubelet[1542]: E0209 21:37:48.281366 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:48.679526 systemd-timesyncd[1108]: Contacted time server [2606:82c0:24::e]:123 (2.flatcar.pool.ntp.org). Feb 9 21:37:48.679675 systemd-timesyncd[1108]: Initial clock synchronization to Fri 2024-02-09 21:37:48.753760 UTC. Feb 9 21:37:49.281885 kubelet[1542]: E0209 21:37:49.281737 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:49.370047 kubelet[1542]: E0209 21:37:49.369944 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:37:50.282638 kubelet[1542]: E0209 21:37:50.282560 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:51.283327 kubelet[1542]: E0209 21:37:51.283252 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:51.369175 kubelet[1542]: E0209 21:37:51.369059 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:37:52.284482 kubelet[1542]: E0209 21:37:52.284377 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:53.285159 kubelet[1542]: E0209 21:37:53.285075 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:53.369413 kubelet[1542]: E0209 21:37:53.369331 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:37:54.286383 kubelet[1542]: E0209 21:37:54.286303 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:55.287676 kubelet[1542]: E0209 21:37:55.287572 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:55.369397 kubelet[1542]: E0209 21:37:55.369321 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:37:56.287841 kubelet[1542]: E0209 21:37:56.287737 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:57.288331 kubelet[1542]: E0209 21:37:57.288215 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:57.370093 kubelet[1542]: E0209 21:37:57.369978 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:37:58.288793 kubelet[1542]: E0209 21:37:58.288684 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:59.289087 kubelet[1542]: E0209 21:37:59.288982 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:37:59.369589 kubelet[1542]: E0209 21:37:59.369483 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:00.274263 kubelet[1542]: E0209 21:38:00.274161 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:00.290004 kubelet[1542]: E0209 21:38:00.289892 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:01.290196 kubelet[1542]: E0209 21:38:01.290089 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:01.369962 kubelet[1542]: E0209 21:38:01.369869 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:02.290655 kubelet[1542]: E0209 21:38:02.290567 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:03.003358 update_engine[1154]: I0209 21:38:03.003235 1154 update_attempter.cc:509] Updating boot flags... Feb 9 21:38:03.291010 kubelet[1542]: E0209 21:38:03.290816 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:03.370071 kubelet[1542]: E0209 21:38:03.369998 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:04.292062 kubelet[1542]: E0209 21:38:04.291985 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:05.292657 kubelet[1542]: E0209 21:38:05.292530 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:05.369955 kubelet[1542]: E0209 21:38:05.369864 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:06.051890 env[1162]: time="2024-02-09T21:38:06.051845626Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:06.053260 env[1162]: time="2024-02-09T21:38:06.053245036Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:06.054699 env[1162]: time="2024-02-09T21:38:06.054643968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:06.056052 env[1162]: time="2024-02-09T21:38:06.055997876Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:06.056766 env[1162]: time="2024-02-09T21:38:06.056709407Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 21:38:06.057213 env[1162]: time="2024-02-09T21:38:06.057172449Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 21:38:06.057966 env[1162]: time="2024-02-09T21:38:06.057925590Z" level=info msg="CreateContainer within sandbox \"d0bf8cd9c8ad799d192e14443b37e8591b054590431b870586504d8dff1ce1f9\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 21:38:06.062914 env[1162]: time="2024-02-09T21:38:06.062865365Z" level=info msg="CreateContainer within sandbox \"d0bf8cd9c8ad799d192e14443b37e8591b054590431b870586504d8dff1ce1f9\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ee01eced5caa8e41abc87a3f34abf5623affabe0a5f36fb224132288c0b6770f\"" Feb 9 21:38:06.063243 env[1162]: time="2024-02-09T21:38:06.063184705Z" level=info msg="StartContainer for \"ee01eced5caa8e41abc87a3f34abf5623affabe0a5f36fb224132288c0b6770f\"" Feb 9 21:38:06.091468 systemd[1]: Started cri-containerd-ee01eced5caa8e41abc87a3f34abf5623affabe0a5f36fb224132288c0b6770f.scope. Feb 9 21:38:06.097000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.125819 kernel: kauditd_printk_skb: 332 callbacks suppressed Feb 9 21:38:06.125897 kernel: audit: type=1400 audit(1707514686.097:550): avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.097000 audit[1713]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1628 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:06.286035 kernel: audit: type=1300 audit(1707514686.097:550): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1628 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:06.286071 kernel: audit: type=1327 audit(1707514686.097:550): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565303165636564356361613865343161626338376133663334616266 Feb 9 21:38:06.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565303165636564356361613865343161626338376133663334616266 Feb 9 21:38:06.293229 kubelet[1542]: E0209 21:38:06.293218 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:06.379470 kernel: audit: type=1400 audit(1707514686.097:551): avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.097000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.443105 kernel: audit: type=1400 audit(1707514686.097:551): avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.097000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.506687 kernel: audit: type=1400 audit(1707514686.097:551): avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.097000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.570186 kernel: audit: type=1400 audit(1707514686.097:551): avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.097000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.097000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.698035 kernel: audit: type=1400 audit(1707514686.097:551): avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.698098 kernel: audit: type=1400 audit(1707514686.097:551): avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.097000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.712040 env[1162]: time="2024-02-09T21:38:06.712018424Z" level=info msg="StartContainer for \"ee01eced5caa8e41abc87a3f34abf5623affabe0a5f36fb224132288c0b6770f\" returns successfully" Feb 9 21:38:06.097000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.762288 systemd[1]: cri-containerd-ee01eced5caa8e41abc87a3f34abf5623affabe0a5f36fb224132288c0b6770f.scope: Deactivated successfully. Feb 9 21:38:06.785891 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ee01eced5caa8e41abc87a3f34abf5623affabe0a5f36fb224132288c0b6770f-rootfs.mount: Deactivated successfully. Feb 9 21:38:06.825966 kernel: audit: type=1400 audit(1707514686.097:551): avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.097000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.097000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.097000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.097000 audit: BPF prog-id=67 op=LOAD Feb 9 21:38:06.097000 audit[1713]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003244b0 items=0 ppid=1628 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:06.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565303165636564356361613865343161626338376133663334616266 Feb 9 21:38:06.284000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.284000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.284000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.284000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.284000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.284000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.284000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.284000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.284000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.284000 audit: BPF prog-id=68 op=LOAD Feb 9 21:38:06.284000 audit[1713]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003244f8 items=0 ppid=1628 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:06.284000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565303165636564356361613865343161626338376133663334616266 Feb 9 21:38:06.441000 audit: BPF prog-id=68 op=UNLOAD Feb 9 21:38:06.441000 audit: BPF prog-id=67 op=UNLOAD Feb 9 21:38:06.441000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.441000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.441000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.441000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.441000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.441000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.441000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.441000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.441000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.441000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:06.441000 audit: BPF prog-id=69 op=LOAD Feb 9 21:38:06.441000 audit[1713]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000324588 items=0 ppid=1628 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:06.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565303165636564356361613865343161626338376133663334616266 Feb 9 21:38:06.838000 audit: BPF prog-id=69 op=UNLOAD Feb 9 21:38:06.908598 env[1162]: time="2024-02-09T21:38:06.908566651Z" level=info msg="shim disconnected" id=ee01eced5caa8e41abc87a3f34abf5623affabe0a5f36fb224132288c0b6770f Feb 9 21:38:06.908702 env[1162]: time="2024-02-09T21:38:06.908600722Z" level=warning msg="cleaning up after shim disconnected" id=ee01eced5caa8e41abc87a3f34abf5623affabe0a5f36fb224132288c0b6770f namespace=k8s.io Feb 9 21:38:06.908702 env[1162]: time="2024-02-09T21:38:06.908611520Z" level=info msg="cleaning up dead shim" Feb 9 21:38:06.925226 env[1162]: time="2024-02-09T21:38:06.925178901Z" level=warning msg="cleanup warnings time=\"2024-02-09T21:38:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1750 runtime=io.containerd.runc.v2\n" Feb 9 21:38:07.122693 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1164933680.mount: Deactivated successfully. Feb 9 21:38:07.293481 kubelet[1542]: E0209 21:38:07.293460 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:07.369150 kubelet[1542]: E0209 21:38:07.369108 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:07.458998 env[1162]: time="2024-02-09T21:38:07.458915444Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:07.459471 env[1162]: time="2024-02-09T21:38:07.459410892Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:07.460147 env[1162]: time="2024-02-09T21:38:07.460108840Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:07.461207 env[1162]: time="2024-02-09T21:38:07.461167155Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:07.461369 env[1162]: time="2024-02-09T21:38:07.461318463Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 9 21:38:07.461745 env[1162]: time="2024-02-09T21:38:07.461693458Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 21:38:07.462399 env[1162]: time="2024-02-09T21:38:07.462385741Z" level=info msg="CreateContainer within sandbox \"cafcda5ab59fb20e1cb30015c8b48353a1e1d5b1022889eec88f36d56f93de7d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 21:38:07.467511 env[1162]: time="2024-02-09T21:38:07.467446857Z" level=info msg="CreateContainer within sandbox \"cafcda5ab59fb20e1cb30015c8b48353a1e1d5b1022889eec88f36d56f93de7d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"cf2e696a310ebf73f36d962487d8f819a85a1f7f8310842b0f3831839a380053\"" Feb 9 21:38:07.467747 env[1162]: time="2024-02-09T21:38:07.467710016Z" level=info msg="StartContainer for \"cf2e696a310ebf73f36d962487d8f819a85a1f7f8310842b0f3831839a380053\"" Feb 9 21:38:07.488471 systemd[1]: Started cri-containerd-cf2e696a310ebf73f36d962487d8f819a85a1f7f8310842b0f3831839a380053.scope. Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1620 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366326536393661333130656266373366333664393632343837643866 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit: BPF prog-id=70 op=LOAD Feb 9 21:38:07.494000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002e3c70 items=0 ppid=1620 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366326536393661333130656266373366333664393632343837643866 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit: BPF prog-id=71 op=LOAD Feb 9 21:38:07.494000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002e3cb8 items=0 ppid=1620 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366326536393661333130656266373366333664393632343837643866 Feb 9 21:38:07.494000 audit: BPF prog-id=71 op=UNLOAD Feb 9 21:38:07.494000 audit: BPF prog-id=70 op=UNLOAD Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { perfmon } for pid=1775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit[1775]: AVC avc: denied { bpf } for pid=1775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:07.494000 audit: BPF prog-id=72 op=LOAD Feb 9 21:38:07.494000 audit[1775]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002e3d48 items=0 ppid=1620 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366326536393661333130656266373366333664393632343837643866 Feb 9 21:38:07.502721 env[1162]: time="2024-02-09T21:38:07.502693360Z" level=info msg="StartContainer for \"cf2e696a310ebf73f36d962487d8f819a85a1f7f8310842b0f3831839a380053\" returns successfully" Feb 9 21:38:07.535000 audit[1837]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1837 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.535000 audit[1837]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6e8bdee0 a2=0 a3=7ffc6e8bdecc items=0 ppid=1786 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.535000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 21:38:07.535000 audit[1838]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.535000 audit[1838]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb28a8a50 a2=0 a3=7ffcb28a8a3c items=0 ppid=1786 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.535000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 21:38:07.536000 audit[1839]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.536000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea5021640 a2=0 a3=7ffea502162c items=0 ppid=1786 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 21:38:07.536000 audit[1841]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.536000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd855812e0 a2=0 a3=7ffd855812cc items=0 ppid=1786 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 21:38:07.537000 audit[1842]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.537000 audit[1842]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc20bf5d0 a2=0 a3=7ffdc20bf5bc items=0 ppid=1786 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.537000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 21:38:07.537000 audit[1843]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1843 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.537000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3a4088d0 a2=0 a3=7ffe3a4088bc items=0 ppid=1786 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 21:38:07.641000 audit[1844]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1844 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.641000 audit[1844]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd61764af0 a2=0 a3=7ffd61764adc items=0 ppid=1786 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.641000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 21:38:07.648000 audit[1846]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.648000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc3f4cf690 a2=0 a3=7ffc3f4cf67c items=0 ppid=1786 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.648000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 21:38:07.656000 audit[1849]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.656000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe26cd8490 a2=0 a3=7ffe26cd847c items=0 ppid=1786 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.656000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 21:38:07.659000 audit[1850]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.659000 audit[1850]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde500a450 a2=0 a3=7ffde500a43c items=0 ppid=1786 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.659000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 21:38:07.665000 audit[1852]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1852 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.665000 audit[1852]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcd7c45d30 a2=0 a3=7ffcd7c45d1c items=0 ppid=1786 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 21:38:07.668000 audit[1853]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1853 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.668000 audit[1853]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec36001d0 a2=0 a3=7ffec36001bc items=0 ppid=1786 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.668000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 21:38:07.674000 audit[1855]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1855 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.674000 audit[1855]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc082dec10 a2=0 a3=7ffc082debfc items=0 ppid=1786 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.674000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 21:38:07.682000 audit[1858]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1858 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.682000 audit[1858]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea5164b70 a2=0 a3=7ffea5164b5c items=0 ppid=1786 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.682000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 21:38:07.685000 audit[1859]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.685000 audit[1859]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdf54b6d20 a2=0 a3=7ffdf54b6d0c items=0 ppid=1786 pid=1859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 21:38:07.690000 audit[1861]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1861 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.690000 audit[1861]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff4fb961e0 a2=0 a3=7fff4fb961cc items=0 ppid=1786 pid=1861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.690000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 21:38:07.693000 audit[1862]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1862 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.693000 audit[1862]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe45fd7ee0 a2=0 a3=7ffe45fd7ecc items=0 ppid=1786 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.693000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 21:38:07.699000 audit[1864]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1864 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.699000 audit[1864]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea6c73680 a2=0 a3=7ffea6c7366c items=0 ppid=1786 pid=1864 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.699000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 21:38:07.707000 audit[1867]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1867 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.707000 audit[1867]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb5ad3c90 a2=0 a3=7fffb5ad3c7c items=0 ppid=1786 pid=1867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 21:38:07.714000 audit[1870]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1870 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.714000 audit[1870]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff44191270 a2=0 a3=7fff4419125c items=0 ppid=1786 pid=1870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.714000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 21:38:07.714000 audit[1871]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.714000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc612a2570 a2=0 a3=7ffc612a255c items=0 ppid=1786 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.714000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 21:38:07.715000 audit[1873]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.715000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe992f3540 a2=0 a3=7ffe992f352c items=0 ppid=1786 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.715000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 21:38:07.740000 audit[1878]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1878 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.740000 audit[1878]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe89413970 a2=0 a3=7ffe8941395c items=0 ppid=1786 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 21:38:07.744000 audit[1883]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.744000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3d910910 a2=0 a3=7ffc3d9108fc items=0 ppid=1786 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.744000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 21:38:07.745000 audit[1885]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 21:38:07.745000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcb257a8f0 a2=0 a3=7ffcb257a8dc items=0 ppid=1786 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.745000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 21:38:07.751000 audit[1887]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:38:07.751000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffcec2820a0 a2=0 a3=7ffcec28208c items=0 ppid=1786 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.751000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:38:07.760000 audit[1887]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:38:07.760000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffcec2820a0 a2=0 a3=7ffcec28208c items=0 ppid=1786 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:38:07.765000 audit[1893]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.765000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffef791a680 a2=0 a3=7ffef791a66c items=0 ppid=1786 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.765000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 21:38:07.767000 audit[1895]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.767000 audit[1895]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd4c33eb80 a2=0 a3=7ffd4c33eb6c items=0 ppid=1786 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.767000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 21:38:07.770000 audit[1898]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1898 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.770000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffebdeaeeb0 a2=0 a3=7ffebdeaee9c items=0 ppid=1786 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 21:38:07.770000 audit[1899]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1899 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.770000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe566df640 a2=0 a3=7ffe566df62c items=0 ppid=1786 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.770000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 21:38:07.772000 audit[1901]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1901 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.772000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe56290190 a2=0 a3=7ffe5629017c items=0 ppid=1786 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.772000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 21:38:07.773000 audit[1902]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1902 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.773000 audit[1902]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2c976750 a2=0 a3=7ffc2c97673c items=0 ppid=1786 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.773000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 21:38:07.775000 audit[1904]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.775000 audit[1904]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc45c7d3d0 a2=0 a3=7ffc45c7d3bc items=0 ppid=1786 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.775000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 21:38:07.777000 audit[1907]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.777000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff8b4b2920 a2=0 a3=7fff8b4b290c items=0 ppid=1786 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.777000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 21:38:07.778000 audit[1908]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.778000 audit[1908]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe08ed0c20 a2=0 a3=7ffe08ed0c0c items=0 ppid=1786 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.778000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 21:38:07.780000 audit[1910]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1910 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.780000 audit[1910]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff2944fc20 a2=0 a3=7fff2944fc0c items=0 ppid=1786 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.780000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 21:38:07.781000 audit[1911]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1911 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.781000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2d723f40 a2=0 a3=7ffd2d723f2c items=0 ppid=1786 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.781000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 21:38:07.784000 audit[1913]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1913 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.784000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffcd35a820 a2=0 a3=7fffcd35a80c items=0 ppid=1786 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.784000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 21:38:07.787000 audit[1916]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1916 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.787000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffbce2fd60 a2=0 a3=7fffbce2fd4c items=0 ppid=1786 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 21:38:07.791000 audit[1919]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.791000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa0770e10 a2=0 a3=7fffa0770dfc items=0 ppid=1786 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 21:38:07.792000 audit[1920]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.792000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff46b9c3d0 a2=0 a3=7fff46b9c3bc items=0 ppid=1786 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.792000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 21:38:07.794000 audit[1922]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.794000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffffcfbf820 a2=0 a3=7ffffcfbf80c items=0 ppid=1786 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.794000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 21:38:07.799000 audit[1925]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.799000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc7f2bfd10 a2=0 a3=7ffc7f2bfcfc items=0 ppid=1786 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.799000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 21:38:07.800000 audit[1926]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.800000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcdba6270 a2=0 a3=7fffcdba625c items=0 ppid=1786 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.800000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 21:38:07.804000 audit[1928]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.804000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe2ab055a0 a2=0 a3=7ffe2ab0558c items=0 ppid=1786 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.804000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 21:38:07.809000 audit[1931]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=1931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.809000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff79a7bec0 a2=0 a3=7fff79a7beac items=0 ppid=1786 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.809000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 21:38:07.811000 audit[1932]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=1932 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.811000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffda3cc7d0 a2=0 a3=7fffda3cc7bc items=0 ppid=1786 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.811000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 21:38:07.814000 audit[1934]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=1934 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 21:38:07.814000 audit[1934]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffded8c6640 a2=0 a3=7ffded8c662c items=0 ppid=1786 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 21:38:07.819000 audit[1936]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1936 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 21:38:07.819000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd1c206d30 a2=0 a3=7ffd1c206d1c items=0 ppid=1786 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.819000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:38:07.819000 audit[1936]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 21:38:07.819000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd1c206d30 a2=0 a3=7ffd1c206d1c items=0 ppid=1786 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:07.819000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:38:08.294141 kubelet[1542]: E0209 21:38:08.294038 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:08.444190 kubelet[1542]: I0209 21:38:08.444095 1542 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-jqdqw" podStartSLOduration=3.3565963229999998 podCreationTimestamp="2024-02-09 21:37:40 +0000 UTC" firstStartedPulling="2024-02-09 21:37:42.374057499 +0000 UTC m=+2.386829820" lastFinishedPulling="2024-02-09 21:38:07.461464611 +0000 UTC m=+27.474236926" observedRunningTime="2024-02-09 21:38:08.443783558 +0000 UTC m=+28.456555941" watchObservedRunningTime="2024-02-09 21:38:08.444003429 +0000 UTC m=+28.456775786" Feb 9 21:38:09.295157 kubelet[1542]: E0209 21:38:09.295055 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:09.369997 kubelet[1542]: E0209 21:38:09.369896 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:10.295435 kubelet[1542]: E0209 21:38:10.295370 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:10.868507 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount30381586.mount: Deactivated successfully. Feb 9 21:38:11.295961 kubelet[1542]: E0209 21:38:11.295860 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:11.369776 kubelet[1542]: E0209 21:38:11.369679 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:12.296101 kubelet[1542]: E0209 21:38:12.295995 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:13.296433 kubelet[1542]: E0209 21:38:13.296314 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:13.369711 kubelet[1542]: E0209 21:38:13.369601 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:14.296786 kubelet[1542]: E0209 21:38:14.296681 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:15.297027 kubelet[1542]: E0209 21:38:15.296928 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:15.369213 kubelet[1542]: E0209 21:38:15.369135 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:16.297478 kubelet[1542]: E0209 21:38:16.297358 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:17.298481 kubelet[1542]: E0209 21:38:17.298367 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:17.369858 kubelet[1542]: E0209 21:38:17.369757 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:18.299187 kubelet[1542]: E0209 21:38:18.299111 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:19.299486 kubelet[1542]: E0209 21:38:19.299371 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:19.369585 kubelet[1542]: E0209 21:38:19.369490 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:20.274131 kubelet[1542]: E0209 21:38:20.274032 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:20.300007 kubelet[1542]: E0209 21:38:20.299893 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:21.301070 kubelet[1542]: E0209 21:38:21.300957 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:21.369532 kubelet[1542]: E0209 21:38:21.369467 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:22.301551 kubelet[1542]: E0209 21:38:22.301484 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:23.302237 kubelet[1542]: E0209 21:38:23.302218 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:23.369541 kubelet[1542]: E0209 21:38:23.369512 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:23.827061 env[1162]: time="2024-02-09T21:38:23.827037825Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:23.827707 env[1162]: time="2024-02-09T21:38:23.827682157Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:23.828874 env[1162]: time="2024-02-09T21:38:23.828813468Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:23.829832 env[1162]: time="2024-02-09T21:38:23.829784323Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:23.830277 env[1162]: time="2024-02-09T21:38:23.830232578Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 21:38:23.831363 env[1162]: time="2024-02-09T21:38:23.831298501Z" level=info msg="CreateContainer within sandbox \"d0bf8cd9c8ad799d192e14443b37e8591b054590431b870586504d8dff1ce1f9\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 21:38:23.836183 env[1162]: time="2024-02-09T21:38:23.836140010Z" level=info msg="CreateContainer within sandbox \"d0bf8cd9c8ad799d192e14443b37e8591b054590431b870586504d8dff1ce1f9\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8029f7be40fcda873e2bb5a89e87c1d3301285f13b3e514a6dfaf29c8ea7f294\"" Feb 9 21:38:23.836432 env[1162]: time="2024-02-09T21:38:23.836401476Z" level=info msg="StartContainer for \"8029f7be40fcda873e2bb5a89e87c1d3301285f13b3e514a6dfaf29c8ea7f294\"" Feb 9 21:38:23.856977 systemd[1]: Started cri-containerd-8029f7be40fcda873e2bb5a89e87c1d3301285f13b3e514a6dfaf29c8ea7f294.scope. Feb 9 21:38:23.864000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:23.891995 kernel: kauditd_printk_skb: 230 callbacks suppressed Feb 9 21:38:23.892055 kernel: audit: type=1400 audit(1707514703.864:614): avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:23.864000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1628 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:24.052155 kernel: audit: type=1300 audit(1707514703.864:614): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1628 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:24.052187 kernel: audit: type=1327 audit(1707514703.864:614): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323966376265343066636461383733653262623561383965383763 Feb 9 21:38:23.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323966376265343066636461383733653262623561383965383763 Feb 9 21:38:24.147358 kernel: audit: type=1400 audit(1707514703.864:615): avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:23.864000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:23.864000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.276338 kernel: audit: type=1400 audit(1707514703.864:615): avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.276368 kernel: audit: type=1400 audit(1707514703.864:615): avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:23.864000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.302692 kubelet[1542]: E0209 21:38:24.302654 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:24.339883 kernel: audit: type=1400 audit(1707514703.864:615): avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:23.864000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.403850 kernel: audit: type=1400 audit(1707514703.864:615): avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:23.864000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.467810 kernel: audit: type=1400 audit(1707514703.864:615): avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:23.864000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.469166 env[1162]: time="2024-02-09T21:38:24.469143746Z" level=info msg="StartContainer for \"8029f7be40fcda873e2bb5a89e87c1d3301285f13b3e514a6dfaf29c8ea7f294\" returns successfully" Feb 9 21:38:24.531810 kernel: audit: type=1400 audit(1707514703.864:615): avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:23.864000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:23.864000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:23.864000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:23.864000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:23.864000 audit: BPF prog-id=73 op=LOAD Feb 9 21:38:23.864000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002c1ca0 items=0 ppid=1628 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:23.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323966376265343066636461383733653262623561383965383763 Feb 9 21:38:24.051000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.051000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.051000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.051000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.051000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.051000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.051000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.051000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.051000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.051000 audit: BPF prog-id=74 op=LOAD Feb 9 21:38:24.051000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002c1ce8 items=0 ppid=1628 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:24.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323966376265343066636461383733653262623561383965383763 Feb 9 21:38:24.211000 audit: BPF prog-id=74 op=UNLOAD Feb 9 21:38:24.211000 audit: BPF prog-id=73 op=UNLOAD Feb 9 21:38:24.211000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.211000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.211000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.211000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.211000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.211000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.211000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.211000 audit[1945]: AVC avc: denied { perfmon } for pid=1945 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.211000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.211000 audit[1945]: AVC avc: denied { bpf } for pid=1945 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:24.211000 audit: BPF prog-id=75 op=LOAD Feb 9 21:38:24.211000 audit[1945]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002c1d78 items=0 ppid=1628 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:24.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323966376265343066636461383733653262623561383965383763 Feb 9 21:38:25.178150 systemd[1]: cri-containerd-8029f7be40fcda873e2bb5a89e87c1d3301285f13b3e514a6dfaf29c8ea7f294.scope: Deactivated successfully. Feb 9 21:38:25.189253 kubelet[1542]: I0209 21:38:25.189214 1542 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 21:38:25.191000 audit: BPF prog-id=75 op=UNLOAD Feb 9 21:38:25.203846 kubelet[1542]: I0209 21:38:25.203809 1542 topology_manager.go:212] "Topology Admit Handler" Feb 9 21:38:25.204647 kubelet[1542]: I0209 21:38:25.204605 1542 topology_manager.go:212] "Topology Admit Handler" Feb 9 21:38:25.204762 kubelet[1542]: I0209 21:38:25.204711 1542 topology_manager.go:212] "Topology Admit Handler" Feb 9 21:38:25.207680 systemd[1]: Created slice kubepods-burstable-pod7ea80032_eead_46eb_aa24_12435448e0fa.slice. Feb 9 21:38:25.218733 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8029f7be40fcda873e2bb5a89e87c1d3301285f13b3e514a6dfaf29c8ea7f294-rootfs.mount: Deactivated successfully. Feb 9 21:38:25.220328 systemd[1]: Created slice kubepods-besteffort-podf3d9b71e_d18e_43bd_86ac_aa6c18d2520e.slice. Feb 9 21:38:25.223991 systemd[1]: Created slice kubepods-burstable-pode44a07f5_dda5_4492_9e95_0a3eaae03960.slice. Feb 9 21:38:25.295045 kubelet[1542]: I0209 21:38:25.294941 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/7ea80032-eead-46eb-aa24-12435448e0fa-config-volume\") pod \"coredns-5d78c9869d-5l82t\" (UID: \"7ea80032-eead-46eb-aa24-12435448e0fa\") " pod="kube-system/coredns-5d78c9869d-5l82t" Feb 9 21:38:25.295045 kubelet[1542]: I0209 21:38:25.295050 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fmqnp\" (UniqueName: \"kubernetes.io/projected/7ea80032-eead-46eb-aa24-12435448e0fa-kube-api-access-fmqnp\") pod \"coredns-5d78c9869d-5l82t\" (UID: \"7ea80032-eead-46eb-aa24-12435448e0fa\") " pod="kube-system/coredns-5d78c9869d-5l82t" Feb 9 21:38:25.295584 kubelet[1542]: I0209 21:38:25.295282 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e44a07f5-dda5-4492-9e95-0a3eaae03960-config-volume\") pod \"coredns-5d78c9869d-zbgjp\" (UID: \"e44a07f5-dda5-4492-9e95-0a3eaae03960\") " pod="kube-system/coredns-5d78c9869d-zbgjp" Feb 9 21:38:25.295584 kubelet[1542]: I0209 21:38:25.295421 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rd6wh\" (UniqueName: \"kubernetes.io/projected/e44a07f5-dda5-4492-9e95-0a3eaae03960-kube-api-access-rd6wh\") pod \"coredns-5d78c9869d-zbgjp\" (UID: \"e44a07f5-dda5-4492-9e95-0a3eaae03960\") " pod="kube-system/coredns-5d78c9869d-zbgjp" Feb 9 21:38:25.295891 kubelet[1542]: I0209 21:38:25.295600 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-frbtf\" (UniqueName: \"kubernetes.io/projected/f3d9b71e-d18e-43bd-86ac-aa6c18d2520e-kube-api-access-frbtf\") pod \"calico-kube-controllers-55b6cd655b-pdmv4\" (UID: \"f3d9b71e-d18e-43bd-86ac-aa6c18d2520e\") " pod="calico-system/calico-kube-controllers-55b6cd655b-pdmv4" Feb 9 21:38:25.295891 kubelet[1542]: I0209 21:38:25.295722 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f3d9b71e-d18e-43bd-86ac-aa6c18d2520e-tigera-ca-bundle\") pod \"calico-kube-controllers-55b6cd655b-pdmv4\" (UID: \"f3d9b71e-d18e-43bd-86ac-aa6c18d2520e\") " pod="calico-system/calico-kube-controllers-55b6cd655b-pdmv4" Feb 9 21:38:25.303592 kubelet[1542]: E0209 21:38:25.303518 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:25.389322 systemd[1]: Created slice kubepods-besteffort-poddfb34e95_52fb_45cb_bba0_97a341a445ca.slice. Feb 9 21:38:25.393982 env[1162]: time="2024-02-09T21:38:25.393854557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wqwwd,Uid:dfb34e95-52fb-45cb-bba0-97a341a445ca,Namespace:calico-system,Attempt:0,}" Feb 9 21:38:25.517890 env[1162]: time="2024-02-09T21:38:25.517768508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5l82t,Uid:7ea80032-eead-46eb-aa24-12435448e0fa,Namespace:kube-system,Attempt:0,}" Feb 9 21:38:25.524057 env[1162]: time="2024-02-09T21:38:25.523942537Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55b6cd655b-pdmv4,Uid:f3d9b71e-d18e-43bd-86ac-aa6c18d2520e,Namespace:calico-system,Attempt:0,}" Feb 9 21:38:25.527169 env[1162]: time="2024-02-09T21:38:25.527060771Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zbgjp,Uid:e44a07f5-dda5-4492-9e95-0a3eaae03960,Namespace:kube-system,Attempt:0,}" Feb 9 21:38:25.911891 env[1162]: time="2024-02-09T21:38:25.911672363Z" level=info msg="shim disconnected" id=8029f7be40fcda873e2bb5a89e87c1d3301285f13b3e514a6dfaf29c8ea7f294 Feb 9 21:38:25.911891 env[1162]: time="2024-02-09T21:38:25.911773335Z" level=warning msg="cleaning up after shim disconnected" id=8029f7be40fcda873e2bb5a89e87c1d3301285f13b3e514a6dfaf29c8ea7f294 namespace=k8s.io Feb 9 21:38:25.911891 env[1162]: time="2024-02-09T21:38:25.911823433Z" level=info msg="cleaning up dead shim" Feb 9 21:38:25.937200 env[1162]: time="2024-02-09T21:38:25.937174493Z" level=warning msg="cleanup warnings time=\"2024-02-09T21:38:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2007 runtime=io.containerd.runc.v2\n" Feb 9 21:38:25.949046 env[1162]: time="2024-02-09T21:38:25.949003293Z" level=error msg="Failed to destroy network for sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.949254 env[1162]: time="2024-02-09T21:38:25.949214039Z" level=error msg="encountered an error cleaning up failed sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.949254 env[1162]: time="2024-02-09T21:38:25.949245611Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wqwwd,Uid:dfb34e95-52fb-45cb-bba0-97a341a445ca,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.949353 env[1162]: time="2024-02-09T21:38:25.949330800Z" level=error msg="Failed to destroy network for sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.949404 env[1162]: time="2024-02-09T21:38:25.949376996Z" level=error msg="Failed to destroy network for sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.949437 kubelet[1542]: E0209 21:38:25.949425 1542 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.949490 kubelet[1542]: E0209 21:38:25.949483 1542 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wqwwd" Feb 9 21:38:25.949515 kubelet[1542]: E0209 21:38:25.949507 1542 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-wqwwd" Feb 9 21:38:25.949555 env[1162]: time="2024-02-09T21:38:25.949535790Z" level=error msg="encountered an error cleaning up failed sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.949582 kubelet[1542]: E0209 21:38:25.949554 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-wqwwd_calico-system(dfb34e95-52fb-45cb-bba0-97a341a445ca)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-wqwwd_calico-system(dfb34e95-52fb-45cb-bba0-97a341a445ca)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:25.949636 env[1162]: time="2024-02-09T21:38:25.949568236Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55b6cd655b-pdmv4,Uid:f3d9b71e-d18e-43bd-86ac-aa6c18d2520e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.949636 env[1162]: time="2024-02-09T21:38:25.949592034Z" level=error msg="encountered an error cleaning up failed sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.949636 env[1162]: time="2024-02-09T21:38:25.949615837Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5l82t,Uid:7ea80032-eead-46eb-aa24-12435448e0fa,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.949711 kubelet[1542]: E0209 21:38:25.949685 1542 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.949711 kubelet[1542]: E0209 21:38:25.949706 1542 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55b6cd655b-pdmv4" Feb 9 21:38:25.949751 kubelet[1542]: E0209 21:38:25.949719 1542 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55b6cd655b-pdmv4" Feb 9 21:38:25.949751 kubelet[1542]: E0209 21:38:25.949742 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-55b6cd655b-pdmv4_calico-system(f3d9b71e-d18e-43bd-86ac-aa6c18d2520e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-55b6cd655b-pdmv4_calico-system(f3d9b71e-d18e-43bd-86ac-aa6c18d2520e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55b6cd655b-pdmv4" podUID=f3d9b71e-d18e-43bd-86ac-aa6c18d2520e Feb 9 21:38:25.949751 kubelet[1542]: E0209 21:38:25.949685 1542 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.949823 kubelet[1542]: E0209 21:38:25.949761 1542 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-5l82t" Feb 9 21:38:25.949823 kubelet[1542]: E0209 21:38:25.949771 1542 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-5l82t" Feb 9 21:38:25.949823 kubelet[1542]: E0209 21:38:25.949790 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-5l82t_kube-system(7ea80032-eead-46eb-aa24-12435448e0fa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-5l82t_kube-system(7ea80032-eead-46eb-aa24-12435448e0fa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-5l82t" podUID=7ea80032-eead-46eb-aa24-12435448e0fa Feb 9 21:38:25.950103 env[1162]: time="2024-02-09T21:38:25.950085212Z" level=error msg="Failed to destroy network for sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.950235 env[1162]: time="2024-02-09T21:38:25.950221541Z" level=error msg="encountered an error cleaning up failed sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.950256 env[1162]: time="2024-02-09T21:38:25.950243263Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zbgjp,Uid:e44a07f5-dda5-4492-9e95-0a3eaae03960,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.950313 kubelet[1542]: E0209 21:38:25.950306 1542 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:25.950335 kubelet[1542]: E0209 21:38:25.950323 1542 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-zbgjp" Feb 9 21:38:25.950355 kubelet[1542]: E0209 21:38:25.950336 1542 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-zbgjp" Feb 9 21:38:25.950376 kubelet[1542]: E0209 21:38:25.950356 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-zbgjp_kube-system(e44a07f5-dda5-4492-9e95-0a3eaae03960)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-zbgjp_kube-system(e44a07f5-dda5-4492-9e95-0a3eaae03960)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-zbgjp" podUID=e44a07f5-dda5-4492-9e95-0a3eaae03960 Feb 9 21:38:26.222882 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09-shm.mount: Deactivated successfully. Feb 9 21:38:26.222949 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8-shm.mount: Deactivated successfully. Feb 9 21:38:26.304406 kubelet[1542]: E0209 21:38:26.304324 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:26.492604 kubelet[1542]: I0209 21:38:26.492392 1542 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:38:26.494698 kubelet[1542]: I0209 21:38:26.494638 1542 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:38:26.495990 env[1162]: time="2024-02-09T21:38:26.495896766Z" level=info msg="StopPodSandbox for \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\"" Feb 9 21:38:26.501157 kubelet[1542]: I0209 21:38:26.501105 1542 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:38:26.501437 env[1162]: time="2024-02-09T21:38:26.501147718Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 21:38:26.502186 env[1162]: time="2024-02-09T21:38:26.502099409Z" level=info msg="StopPodSandbox for \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\"" Feb 9 21:38:26.503431 kubelet[1542]: I0209 21:38:26.503365 1542 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:38:26.504389 env[1162]: time="2024-02-09T21:38:26.504315943Z" level=info msg="StopPodSandbox for \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\"" Feb 9 21:38:26.505953 env[1162]: time="2024-02-09T21:38:26.505846423Z" level=info msg="StopPodSandbox for \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\"" Feb 9 21:38:26.519690 env[1162]: time="2024-02-09T21:38:26.519653051Z" level=error msg="StopPodSandbox for \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\" failed" error="failed to destroy network for sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:26.519785 env[1162]: time="2024-02-09T21:38:26.519653054Z" level=error msg="StopPodSandbox for \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\" failed" error="failed to destroy network for sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:26.519882 kubelet[1542]: E0209 21:38:26.519870 1542 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:38:26.519914 kubelet[1542]: E0209 21:38:26.519902 1542 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25} Feb 9 21:38:26.519938 kubelet[1542]: E0209 21:38:26.519923 1542 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f3d9b71e-d18e-43bd-86ac-aa6c18d2520e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 21:38:26.519982 kubelet[1542]: E0209 21:38:26.519940 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f3d9b71e-d18e-43bd-86ac-aa6c18d2520e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55b6cd655b-pdmv4" podUID=f3d9b71e-d18e-43bd-86ac-aa6c18d2520e Feb 9 21:38:26.519982 kubelet[1542]: E0209 21:38:26.519946 1542 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:38:26.519982 kubelet[1542]: E0209 21:38:26.519961 1542 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09} Feb 9 21:38:26.519982 kubelet[1542]: E0209 21:38:26.519979 1542 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7ea80032-eead-46eb-aa24-12435448e0fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 21:38:26.520085 kubelet[1542]: E0209 21:38:26.519994 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7ea80032-eead-46eb-aa24-12435448e0fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-5l82t" podUID=7ea80032-eead-46eb-aa24-12435448e0fa Feb 9 21:38:26.520558 env[1162]: time="2024-02-09T21:38:26.520532004Z" level=error msg="StopPodSandbox for \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\" failed" error="failed to destroy network for sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:26.520654 kubelet[1542]: E0209 21:38:26.520649 1542 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:38:26.520682 kubelet[1542]: E0209 21:38:26.520659 1542 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8} Feb 9 21:38:26.520682 kubelet[1542]: E0209 21:38:26.520675 1542 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dfb34e95-52fb-45cb-bba0-97a341a445ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 21:38:26.520739 kubelet[1542]: E0209 21:38:26.520688 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dfb34e95-52fb-45cb-bba0-97a341a445ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:26.521179 env[1162]: time="2024-02-09T21:38:26.521163275Z" level=error msg="StopPodSandbox for \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\" failed" error="failed to destroy network for sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:26.521262 kubelet[1542]: E0209 21:38:26.521254 1542 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:38:26.521285 kubelet[1542]: E0209 21:38:26.521270 1542 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219} Feb 9 21:38:26.521306 kubelet[1542]: E0209 21:38:26.521296 1542 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e44a07f5-dda5-4492-9e95-0a3eaae03960\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 21:38:26.521339 kubelet[1542]: E0209 21:38:26.521314 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e44a07f5-dda5-4492-9e95-0a3eaae03960\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-zbgjp" podUID=e44a07f5-dda5-4492-9e95-0a3eaae03960 Feb 9 21:38:27.305492 kubelet[1542]: E0209 21:38:27.305348 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:28.305681 kubelet[1542]: E0209 21:38:28.305577 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:29.306177 kubelet[1542]: E0209 21:38:29.306054 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:30.307185 kubelet[1542]: E0209 21:38:30.307060 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:31.307514 kubelet[1542]: E0209 21:38:31.307358 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:32.308312 kubelet[1542]: E0209 21:38:32.308232 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:33.309097 kubelet[1542]: E0209 21:38:33.309020 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:34.309347 kubelet[1542]: E0209 21:38:34.309279 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:35.309969 kubelet[1542]: E0209 21:38:35.309906 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:36.311152 kubelet[1542]: E0209 21:38:36.311108 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:37.312390 kubelet[1542]: E0209 21:38:37.312277 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:37.370283 env[1162]: time="2024-02-09T21:38:37.370176700Z" level=info msg="StopPodSandbox for \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\"" Feb 9 21:38:37.396469 env[1162]: time="2024-02-09T21:38:37.396404585Z" level=error msg="StopPodSandbox for \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\" failed" error="failed to destroy network for sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:37.396583 kubelet[1542]: E0209 21:38:37.396571 1542 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:38:37.396636 kubelet[1542]: E0209 21:38:37.396598 1542 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219} Feb 9 21:38:37.396636 kubelet[1542]: E0209 21:38:37.396620 1542 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e44a07f5-dda5-4492-9e95-0a3eaae03960\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 21:38:37.396725 kubelet[1542]: E0209 21:38:37.396638 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e44a07f5-dda5-4492-9e95-0a3eaae03960\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-zbgjp" podUID=e44a07f5-dda5-4492-9e95-0a3eaae03960 Feb 9 21:38:38.312729 kubelet[1542]: E0209 21:38:38.312652 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:39.313694 kubelet[1542]: E0209 21:38:39.313594 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:39.370994 env[1162]: time="2024-02-09T21:38:39.370897580Z" level=info msg="StopPodSandbox for \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\"" Feb 9 21:38:39.400364 env[1162]: time="2024-02-09T21:38:39.400306181Z" level=error msg="StopPodSandbox for \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\" failed" error="failed to destroy network for sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:39.400511 kubelet[1542]: E0209 21:38:39.400484 1542 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:38:39.400559 kubelet[1542]: E0209 21:38:39.400528 1542 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8} Feb 9 21:38:39.400591 kubelet[1542]: E0209 21:38:39.400562 1542 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dfb34e95-52fb-45cb-bba0-97a341a445ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 21:38:39.400591 kubelet[1542]: E0209 21:38:39.400588 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dfb34e95-52fb-45cb-bba0-97a341a445ca\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-wqwwd" podUID=dfb34e95-52fb-45cb-bba0-97a341a445ca Feb 9 21:38:39.894755 systemd[1]: Started sshd@7-139.178.90.113:22-218.92.0.27:37832.service. Feb 9 21:38:39.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.113:22-218.92.0.27:37832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:38:39.922185 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 21:38:39.922310 kernel: audit: type=1130 audit(1707514719.894:621): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.113:22-218.92.0.27:37832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:38:40.274867 kubelet[1542]: E0209 21:38:40.274761 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:40.314927 kubelet[1542]: E0209 21:38:40.314806 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:40.379176 env[1162]: time="2024-02-09T21:38:40.379152466Z" level=info msg="StopPodSandbox for \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\"" Feb 9 21:38:40.391597 env[1162]: time="2024-02-09T21:38:40.391565531Z" level=error msg="StopPodSandbox for \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\" failed" error="failed to destroy network for sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:40.391708 kubelet[1542]: E0209 21:38:40.391696 1542 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:38:40.391766 kubelet[1542]: E0209 21:38:40.391723 1542 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09} Feb 9 21:38:40.391766 kubelet[1542]: E0209 21:38:40.391753 1542 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7ea80032-eead-46eb-aa24-12435448e0fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 21:38:40.391843 kubelet[1542]: E0209 21:38:40.391786 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7ea80032-eead-46eb-aa24-12435448e0fa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-5l82t" podUID=7ea80032-eead-46eb-aa24-12435448e0fa Feb 9 21:38:40.909029 sshd[2403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 21:38:40.908000 audit[2403]: USER_AUTH pid=2403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:38:40.999566 kernel: audit: type=1100 audit(1707514720.908:622): pid=2403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:38:41.315903 kubelet[1542]: E0209 21:38:41.315845 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:42.073821 sshd[2403]: Failed password for root from 218.92.0.27 port 37832 ssh2 Feb 9 21:38:42.316987 kubelet[1542]: E0209 21:38:42.316926 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:42.370150 env[1162]: time="2024-02-09T21:38:42.370028282Z" level=info msg="StopPodSandbox for \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\"" Feb 9 21:38:42.383726 env[1162]: time="2024-02-09T21:38:42.383647994Z" level=error msg="StopPodSandbox for \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\" failed" error="failed to destroy network for sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 21:38:42.383910 kubelet[1542]: E0209 21:38:42.383897 1542 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:38:42.383957 kubelet[1542]: E0209 21:38:42.383926 1542 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25} Feb 9 21:38:42.383989 kubelet[1542]: E0209 21:38:42.383958 1542 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f3d9b71e-d18e-43bd-86ac-aa6c18d2520e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 21:38:42.383989 kubelet[1542]: E0209 21:38:42.383983 1542 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f3d9b71e-d18e-43bd-86ac-aa6c18d2520e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55b6cd655b-pdmv4" podUID=f3d9b71e-d18e-43bd-86ac-aa6c18d2520e Feb 9 21:38:43.188000 audit[2403]: USER_AUTH pid=2403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:38:43.280453 kernel: audit: type=1100 audit(1707514723.188:623): pid=2403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:38:43.297148 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1118734854.mount: Deactivated successfully. Feb 9 21:38:43.317684 kubelet[1542]: E0209 21:38:43.317662 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:43.321968 env[1162]: time="2024-02-09T21:38:43.321921814Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:43.322494 env[1162]: time="2024-02-09T21:38:43.322454529Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:43.323154 env[1162]: time="2024-02-09T21:38:43.323114114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:43.324073 env[1162]: time="2024-02-09T21:38:43.324032436Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:43.324212 env[1162]: time="2024-02-09T21:38:43.324167876Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 21:38:43.327615 env[1162]: time="2024-02-09T21:38:43.327600514Z" level=info msg="CreateContainer within sandbox \"d0bf8cd9c8ad799d192e14443b37e8591b054590431b870586504d8dff1ce1f9\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 21:38:43.332829 env[1162]: time="2024-02-09T21:38:43.332807443Z" level=info msg="CreateContainer within sandbox \"d0bf8cd9c8ad799d192e14443b37e8591b054590431b870586504d8dff1ce1f9\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f95cc71ebf5af57cef43f77d58919314d4489c75266db17e9cef7a961602eb7f\"" Feb 9 21:38:43.333096 env[1162]: time="2024-02-09T21:38:43.333054870Z" level=info msg="StartContainer for \"f95cc71ebf5af57cef43f77d58919314d4489c75266db17e9cef7a961602eb7f\"" Feb 9 21:38:43.353014 systemd[1]: Started cri-containerd-f95cc71ebf5af57cef43f77d58919314d4489c75266db17e9cef7a961602eb7f.scope. Feb 9 21:38:43.359000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.359000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=1628 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:43.522184 kernel: audit: type=1400 audit(1707514723.359:624): avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.522236 kernel: audit: type=1300 audit(1707514723.359:624): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=1628 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:43.522254 kernel: audit: type=1327 audit(1707514723.359:624): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639356363373165626635616635376365663433663737643538393139 Feb 9 21:38:43.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639356363373165626635616635376365663433663737643538393139 Feb 9 21:38:43.359000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.682055 kernel: audit: type=1400 audit(1707514723.359:625): avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.682087 kernel: audit: type=1400 audit(1707514723.359:625): avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.359000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.745551 kernel: audit: type=1400 audit(1707514723.359:625): avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.359000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.809159 kernel: audit: type=1400 audit(1707514723.359:625): avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.359000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.359000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.359000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.359000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.359000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.359000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.359000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.359000 audit: BPF prog-id=76 op=LOAD Feb 9 21:38:43.359000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000273c70 items=0 ppid=1628 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:43.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639356363373165626635616635376365663433663737643538393139 Feb 9 21:38:43.520000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.520000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.520000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.520000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.520000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.520000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.520000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.520000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.520000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.520000 audit: BPF prog-id=77 op=LOAD Feb 9 21:38:43.520000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c000273cb8 items=0 ppid=1628 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:43.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639356363373165626635616635376365663433663737643538393139 Feb 9 21:38:43.616000 audit: BPF prog-id=77 op=UNLOAD Feb 9 21:38:43.616000 audit: BPF prog-id=76 op=UNLOAD Feb 9 21:38:43.616000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.616000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.616000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.616000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.616000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.616000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.616000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.616000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.616000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.616000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:43.616000 audit: BPF prog-id=78 op=LOAD Feb 9 21:38:43.616000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000273d48 items=0 ppid=1628 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:43.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639356363373165626635616635376365663433663737643538393139 Feb 9 21:38:43.890676 env[1162]: time="2024-02-09T21:38:43.890624726Z" level=info msg="StartContainer for \"f95cc71ebf5af57cef43f77d58919314d4489c75266db17e9cef7a961602eb7f\" returns successfully" Feb 9 21:38:43.995647 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 21:38:43.995704 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved. Feb 9 21:38:44.318321 kubelet[1542]: E0209 21:38:44.318215 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:44.587064 kubelet[1542]: I0209 21:38:44.587018 1542 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-fkdg5" podStartSLOduration=3.623872721 podCreationTimestamp="2024-02-09 21:37:40 +0000 UTC" firstStartedPulling="2024-02-09 21:37:42.361162173 +0000 UTC m=+2.373934486" lastFinishedPulling="2024-02-09 21:38:43.3242871 +0000 UTC m=+63.337059417" observedRunningTime="2024-02-09 21:38:44.586722002 +0000 UTC m=+64.599494378" watchObservedRunningTime="2024-02-09 21:38:44.586997652 +0000 UTC m=+64.599769962" Feb 9 21:38:45.277000 audit[2623]: AVC avc: denied { write } for pid=2623 comm="tee" name="fd" dev="proc" ino=19755 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 21:38:45.306281 kernel: kauditd_printk_skb: 36 callbacks suppressed Feb 9 21:38:45.306463 kernel: audit: type=1400 audit(1707514725.277:630): avc: denied { write } for pid=2623 comm="tee" name="fd" dev="proc" ino=19755 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 21:38:45.318622 kubelet[1542]: E0209 21:38:45.318576 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:45.277000 audit[2622]: AVC avc: denied { write } for pid=2622 comm="tee" name="fd" dev="proc" ino=8775 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 21:38:45.372453 kernel: audit: type=1400 audit(1707514725.277:631): avc: denied { write } for pid=2622 comm="tee" name="fd" dev="proc" ino=8775 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 21:38:45.433580 sshd[2403]: Failed password for root from 218.92.0.27 port 37832 ssh2 Feb 9 21:38:45.277000 audit[2623]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1d7c596f a2=241 a3=1b6 items=1 ppid=2591 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:45.531620 kernel: audit: type=1300 audit(1707514725.277:630): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1d7c596f a2=241 a3=1b6 items=1 ppid=2591 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:45.531686 kernel: audit: type=1300 audit(1707514725.277:631): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9e38597f a2=241 a3=1b6 items=1 ppid=2589 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:45.277000 audit[2622]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9e38597f a2=241 a3=1b6 items=1 ppid=2589 pid=2622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:45.277000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 21:38:45.656625 kernel: audit: type=1307 audit(1707514725.277:631): cwd="/etc/service/enabled/bird/log" Feb 9 21:38:45.656671 kernel: audit: type=1307 audit(1707514725.277:630): cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 21:38:45.277000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 21:38:45.687404 kernel: audit: type=1302 audit(1707514725.277:631): item=0 name="/dev/fd/63" inode=30320 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:38:45.277000 audit: PATH item=0 name="/dev/fd/63" inode=30320 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:38:45.750469 kernel: audit: type=1302 audit(1707514725.277:630): item=0 name="/dev/fd/63" inode=8772 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:38:45.277000 audit: PATH item=0 name="/dev/fd/63" inode=8772 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:38:45.813410 kernel: audit: type=1327 audit(1707514725.277:630): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 21:38:45.813449 kernel: Initializing XFRM netlink socket Feb 9 21:38:45.277000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 21:38:45.873463 kernel: audit: type=1327 audit(1707514725.277:631): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 21:38:45.277000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 21:38:45.277000 audit[2632]: AVC avc: denied { write } for pid=2632 comm="tee" name="fd" dev="proc" ino=12872 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 21:38:45.277000 audit[2632]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6a8bf980 a2=241 a3=1b6 items=1 ppid=2592 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:45.277000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 21:38:45.277000 audit: PATH item=0 name="/dev/fd/63" inode=12869 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:38:45.277000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 21:38:45.277000 audit[2636]: AVC avc: denied { write } for pid=2636 comm="tee" name="fd" dev="proc" ino=16037 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 21:38:45.277000 audit[2634]: AVC avc: denied { write } for pid=2634 comm="tee" name="fd" dev="proc" ino=32836 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 21:38:45.277000 audit[2636]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd461297e a2=241 a3=1b6 items=1 ppid=2596 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:45.277000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 21:38:45.277000 audit[2633]: AVC avc: denied { write } for pid=2633 comm="tee" name="fd" dev="proc" ino=24028 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 21:38:45.277000 audit[2634]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff172aa96e a2=241 a3=1b6 items=1 ppid=2594 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:45.277000 audit: PATH item=0 name="/dev/fd/63" inode=16034 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:38:45.277000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 21:38:45.277000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 21:38:45.277000 audit: PATH item=0 name="/dev/fd/63" inode=32833 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:38:45.277000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 21:38:45.277000 audit[2633]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef707597e a2=241 a3=1b6 items=1 ppid=2590 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:45.277000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 21:38:45.277000 audit: PATH item=0 name="/dev/fd/63" inode=29458 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:38:45.277000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 21:38:45.278000 audit[2631]: AVC avc: denied { write } for pid=2631 comm="tee" name="fd" dev="proc" ino=19326 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 21:38:45.278000 audit[2631]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7ef2697e a2=241 a3=1b6 items=1 ppid=2595 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:45.278000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 21:38:45.278000 audit: PATH item=0 name="/dev/fd/63" inode=24025 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 21:38:45.278000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit: BPF prog-id=79 op=LOAD Feb 9 21:38:46.015000 audit[2796]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7089f600 a2=70 a3=7f2e25c05000 items=0 ppid=2597 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 21:38:46.015000 audit: BPF prog-id=79 op=UNLOAD Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.015000 audit: BPF prog-id=80 op=LOAD Feb 9 21:38:46.015000 audit[2796]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe7089f600 a2=70 a3=6e items=0 ppid=2597 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 21:38:46.016000 audit: BPF prog-id=80 op=UNLOAD Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe7089f5b0 a2=70 a3=7ffe7089f600 items=0 ppid=2597 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit: BPF prog-id=81 op=LOAD Feb 9 21:38:46.016000 audit[2796]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe7089f590 a2=70 a3=7ffe7089f600 items=0 ppid=2597 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 21:38:46.016000 audit: BPF prog-id=81 op=UNLOAD Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7089f670 a2=70 a3=0 items=0 ppid=2597 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe7089f660 a2=70 a3=0 items=0 ppid=2597 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe7089f6a0 a2=70 a3=0 items=0 ppid=2597 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { perfmon } for pid=2796 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit[2796]: AVC avc: denied { bpf } for pid=2796 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.016000 audit: BPF prog-id=82 op=LOAD Feb 9 21:38:46.016000 audit[2796]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe7089f5c0 a2=70 a3=ffffffff items=0 ppid=2597 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 21:38:46.017000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.017000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd7ba71eb0 a2=70 a3=fff80800 items=0 ppid=2597 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.017000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 21:38:46.017000 audit[2800]: AVC avc: denied { bpf } for pid=2800 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:46.017000 audit[2800]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd7ba71d80 a2=70 a3=3 items=0 ppid=2597 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.017000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 21:38:46.035000 audit: BPF prog-id=82 op=UNLOAD Feb 9 21:38:46.138000 audit[2855]: NETFILTER_CFG table=mangle:65 family=2 entries=19 op=nft_register_chain pid=2855 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 21:38:46.138000 audit[2855]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe1c398090 a2=0 a3=7ffe1c39807c items=0 ppid=2597 pid=2855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.138000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 21:38:46.143000 audit[2854]: NETFILTER_CFG table=raw:66 family=2 entries=19 op=nft_register_chain pid=2854 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 21:38:46.143000 audit[2854]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffcab66bf50 a2=0 a3=55677aacf000 items=0 ppid=2597 pid=2854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.143000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 21:38:46.145000 audit[2856]: NETFILTER_CFG table=nat:67 family=2 entries=16 op=nft_register_chain pid=2856 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 21:38:46.145000 audit[2856]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc45b3f820 a2=0 a3=55cdcf51b000 items=0 ppid=2597 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.145000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 21:38:46.149000 audit[2859]: NETFILTER_CFG table=filter:68 family=2 entries=39 op=nft_register_chain pid=2859 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 21:38:46.149000 audit[2859]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffe392ef460 a2=0 a3=559dd53ae000 items=0 ppid=2597 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:46.149000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 21:38:46.319718 kubelet[1542]: E0209 21:38:46.319586 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:46.979207 systemd-networkd[1013]: vxlan.calico: Link UP Feb 9 21:38:46.979212 systemd-networkd[1013]: vxlan.calico: Gained carrier Feb 9 21:38:47.320661 kubelet[1542]: E0209 21:38:47.320593 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:47.601000 audit[2403]: USER_AUTH pid=2403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:38:48.320831 kubelet[1542]: E0209 21:38:48.320722 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:48.928783 systemd-networkd[1013]: vxlan.calico: Gained IPv6LL Feb 9 21:38:49.063644 sshd[2403]: Failed password for root from 218.92.0.27 port 37832 ssh2 Feb 9 21:38:49.322093 kubelet[1542]: E0209 21:38:49.321976 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:49.883111 sshd[2403]: Received disconnect from 218.92.0.27 port 37832:11: [preauth] Feb 9 21:38:49.883111 sshd[2403]: Disconnected from authenticating user root 218.92.0.27 port 37832 [preauth] Feb 9 21:38:49.883645 sshd[2403]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 21:38:49.885717 systemd[1]: sshd@7-139.178.90.113:22-218.92.0.27:37832.service: Deactivated successfully. Feb 9 21:38:49.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.90.113:22-218.92.0.27:37832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:38:50.035964 systemd[1]: Started sshd@8-139.178.90.113:22-218.92.0.27:37879.service. Feb 9 21:38:50.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.113:22-218.92.0.27:37879 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:38:50.323331 kubelet[1542]: E0209 21:38:50.323212 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:50.370935 env[1162]: time="2024-02-09T21:38:50.370791360Z" level=info msg="StopPodSandbox for \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\"" Feb 9 21:38:50.423292 env[1162]: 2024-02-09 21:38:50.406 [INFO][2888] k8s.go 578: Cleaning up netns ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:38:50.423292 env[1162]: 2024-02-09 21:38:50.406 [INFO][2888] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" iface="eth0" netns="/var/run/netns/cni-f93c4eb9-119d-5b1c-7be4-a35d1511e24d" Feb 9 21:38:50.423292 env[1162]: 2024-02-09 21:38:50.406 [INFO][2888] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" iface="eth0" netns="/var/run/netns/cni-f93c4eb9-119d-5b1c-7be4-a35d1511e24d" Feb 9 21:38:50.423292 env[1162]: 2024-02-09 21:38:50.406 [INFO][2888] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" iface="eth0" netns="/var/run/netns/cni-f93c4eb9-119d-5b1c-7be4-a35d1511e24d" Feb 9 21:38:50.423292 env[1162]: 2024-02-09 21:38:50.406 [INFO][2888] k8s.go 585: Releasing IP address(es) ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:38:50.423292 env[1162]: 2024-02-09 21:38:50.406 [INFO][2888] utils.go 188: Calico CNI releasing IP address ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:38:50.423292 env[1162]: 2024-02-09 21:38:50.415 [INFO][2902] ipam_plugin.go 415: Releasing address using handleID ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" HandleID="k8s-pod-network.32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Workload="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:38:50.423292 env[1162]: 2024-02-09 21:38:50.415 [INFO][2902] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:38:50.423292 env[1162]: 2024-02-09 21:38:50.416 [INFO][2902] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:38:50.423292 env[1162]: 2024-02-09 21:38:50.420 [WARNING][2902] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" HandleID="k8s-pod-network.32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Workload="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:38:50.423292 env[1162]: 2024-02-09 21:38:50.420 [INFO][2902] ipam_plugin.go 443: Releasing address using workloadID ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" HandleID="k8s-pod-network.32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Workload="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:38:50.423292 env[1162]: 2024-02-09 21:38:50.422 [INFO][2902] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:38:50.423292 env[1162]: 2024-02-09 21:38:50.422 [INFO][2888] k8s.go 591: Teardown processing complete. ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:38:50.423708 env[1162]: time="2024-02-09T21:38:50.423346359Z" level=info msg="TearDown network for sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\" successfully" Feb 9 21:38:50.423708 env[1162]: time="2024-02-09T21:38:50.423368688Z" level=info msg="StopPodSandbox for \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\" returns successfully" Feb 9 21:38:50.423961 env[1162]: time="2024-02-09T21:38:50.423919122Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zbgjp,Uid:e44a07f5-dda5-4492-9e95-0a3eaae03960,Namespace:kube-system,Attempt:1,}" Feb 9 21:38:50.424555 systemd[1]: run-netns-cni\x2df93c4eb9\x2d119d\x2d5b1c\x2d7be4\x2da35d1511e24d.mount: Deactivated successfully. Feb 9 21:38:50.774857 systemd-networkd[1013]: calif7f4c8b4e08: Link UP Feb 9 21:38:50.841787 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 21:38:50.841831 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif7f4c8b4e08: link becomes ready Feb 9 21:38:50.841832 systemd-networkd[1013]: calif7f4c8b4e08: Gained carrier Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.694 [INFO][2917] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0 coredns-5d78c9869d- kube-system e44a07f5-dda5-4492-9e95-0a3eaae03960 2347 0 2024-02-09 21:24:05 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s 10.67.80.21 coredns-5d78c9869d-zbgjp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif7f4c8b4e08 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" Namespace="kube-system" Pod="coredns-5d78c9869d-zbgjp" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-" Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.694 [INFO][2917] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" Namespace="kube-system" Pod="coredns-5d78c9869d-zbgjp" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.721 [INFO][2939] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" HandleID="k8s-pod-network.afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" Workload="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.733 [INFO][2939] ipam_plugin.go 268: Auto assigning IP ContainerID="afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" HandleID="k8s-pod-network.afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" Workload="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002900d0), Attrs:map[string]string{"namespace":"kube-system", "node":"10.67.80.21", "pod":"coredns-5d78c9869d-zbgjp", "timestamp":"2024-02-09 21:38:50.721113676 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.733 [INFO][2939] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.733 [INFO][2939] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.733 [INFO][2939] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.736 [INFO][2939] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" host="10.67.80.21" Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.741 [INFO][2939] ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.746 [INFO][2939] ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.749 [INFO][2939] ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.753 [INFO][2939] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.753 [INFO][2939] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" host="10.67.80.21" Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.755 [INFO][2939] ipam.go 1682: Creating new handle: k8s-pod-network.afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4 Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.760 [INFO][2939] ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" host="10.67.80.21" Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.765 [INFO][2939] ipam.go 1216: Successfully claimed IPs: [192.168.115.1/26] block=192.168.115.0/26 handle="k8s-pod-network.afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" host="10.67.80.21" Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.765 [INFO][2939] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.1/26] handle="k8s-pod-network.afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" host="10.67.80.21" Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.765 [INFO][2939] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:38:50.846628 env[1162]: 2024-02-09 21:38:50.765 [INFO][2939] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.115.1/26] IPv6=[] ContainerID="afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" HandleID="k8s-pod-network.afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" Workload="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:38:50.847182 env[1162]: 2024-02-09 21:38:50.771 [INFO][2917] k8s.go 385: Populated endpoint ContainerID="afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" Namespace="kube-system" Pod="coredns-5d78c9869d-zbgjp" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e44a07f5-dda5-4492-9e95-0a3eaae03960", ResourceVersion:"2347", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 24, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"coredns-5d78c9869d-zbgjp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.115.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif7f4c8b4e08", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:38:50.847182 env[1162]: 2024-02-09 21:38:50.772 [INFO][2917] k8s.go 386: Calico CNI using IPs: [192.168.115.1/32] ContainerID="afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" Namespace="kube-system" Pod="coredns-5d78c9869d-zbgjp" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:38:50.847182 env[1162]: 2024-02-09 21:38:50.772 [INFO][2917] dataplane_linux.go 68: Setting the host side veth name to calif7f4c8b4e08 ContainerID="afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" Namespace="kube-system" Pod="coredns-5d78c9869d-zbgjp" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:38:50.847182 env[1162]: 2024-02-09 21:38:50.841 [INFO][2917] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" Namespace="kube-system" Pod="coredns-5d78c9869d-zbgjp" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:38:50.847182 env[1162]: 2024-02-09 21:38:50.841 [INFO][2917] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" Namespace="kube-system" Pod="coredns-5d78c9869d-zbgjp" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e44a07f5-dda5-4492-9e95-0a3eaae03960", ResourceVersion:"2347", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 24, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4", Pod:"coredns-5d78c9869d-zbgjp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.115.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif7f4c8b4e08", MAC:"76:9f:38:fa:26:7b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:38:50.847182 env[1162]: 2024-02-09 21:38:50.845 [INFO][2917] k8s.go 491: Wrote updated endpoint to datastore ContainerID="afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4" Namespace="kube-system" Pod="coredns-5d78c9869d-zbgjp" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:38:50.852859 env[1162]: time="2024-02-09T21:38:50.852758979Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:38:50.852859 env[1162]: time="2024-02-09T21:38:50.852810752Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:38:50.852859 env[1162]: time="2024-02-09T21:38:50.852817645Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:38:50.853053 env[1162]: time="2024-02-09T21:38:50.852929066Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4 pid=2976 runtime=io.containerd.runc.v2 Feb 9 21:38:50.853000 audit[2985]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=2985 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 21:38:50.880381 kernel: kauditd_printk_skb: 111 callbacks suppressed Feb 9 21:38:50.880416 kernel: audit: type=1325 audit(1707514730.853:658): table=filter:69 family=2 entries=36 op=nft_register_chain pid=2985 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 21:38:50.898213 systemd[1]: Started cri-containerd-afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4.scope. Feb 9 21:38:50.853000 audit[2985]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fff22eb19b0 a2=0 a3=7fff22eb199c items=0 ppid=2597 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:51.029539 kernel: audit: type=1300 audit(1707514730.853:658): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fff22eb19b0 a2=0 a3=7fff22eb199c items=0 ppid=2597 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:51.029600 kernel: audit: type=1327 audit(1707514730.853:658): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 21:38:50.853000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 21:38:51.041208 sshd[2870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 21:38:51.088494 kernel: audit: type=1400 audit(1707514730.938:659): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:50.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.149031 kernel: audit: type=1400 audit(1707514730.938:660): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:50.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.209527 kernel: audit: type=1400 audit(1707514730.938:661): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:50.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.270115 kernel: audit: type=1400 audit(1707514730.938:662): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:50.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.323633 kubelet[1542]: E0209 21:38:51.323603 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:51.331015 kernel: audit: type=1400 audit(1707514730.938:663): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:50.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:50.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.452973 kernel: audit: type=1400 audit(1707514730.938:664): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.453008 kernel: audit: type=1400 audit(1707514730.938:665): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:50.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:50.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:50.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.039000 audit[2870]: USER_AUTH pid=2870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:38:51.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.087000 audit: BPF prog-id=83 op=LOAD Feb 9 21:38:51.087000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.087000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2976 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:51.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636536346531616364623562623061333939646161663137666135 Feb 9 21:38:51.087000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.087000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2976 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:51.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636536346531616364623562623061333939646161663137666135 Feb 9 21:38:51.087000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.087000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.087000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.087000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.087000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.087000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.087000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.087000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.087000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.087000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.087000 audit: BPF prog-id=84 op=LOAD Feb 9 21:38:51.087000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000300b70 items=0 ppid=2976 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:51.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636536346531616364623562623061333939646161663137666135 Feb 9 21:38:51.208000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.208000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.208000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.208000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.208000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.208000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.208000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.208000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.208000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.208000 audit: BPF prog-id=85 op=LOAD Feb 9 21:38:51.208000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000300bb8 items=0 ppid=2976 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:51.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636536346531616364623562623061333939646161663137666135 Feb 9 21:38:51.329000 audit: BPF prog-id=85 op=UNLOAD Feb 9 21:38:51.329000 audit: BPF prog-id=84 op=UNLOAD Feb 9 21:38:51.329000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.329000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.329000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.329000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.329000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.329000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.329000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.329000 audit[2986]: AVC avc: denied { perfmon } for pid=2986 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.329000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.329000 audit[2986]: AVC avc: denied { bpf } for pid=2986 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:51.329000 audit: BPF prog-id=86 op=LOAD Feb 9 21:38:51.329000 audit[2986]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000300fc8 items=0 ppid=2976 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:51.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166636536346531616364623562623061333939646161663137666135 Feb 9 21:38:51.542028 env[1162]: time="2024-02-09T21:38:51.541976624Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-zbgjp,Uid:e44a07f5-dda5-4492-9e95-0a3eaae03960,Namespace:kube-system,Attempt:1,} returns sandbox id \"afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4\"" Feb 9 21:38:51.542609 env[1162]: time="2024-02-09T21:38:51.542595336Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 9 21:38:52.157769 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3991103035.mount: Deactivated successfully. Feb 9 21:38:52.324419 kubelet[1542]: E0209 21:38:52.324392 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:52.370198 env[1162]: time="2024-02-09T21:38:52.370134233Z" level=info msg="StopPodSandbox for \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\"" Feb 9 21:38:52.430216 env[1162]: 2024-02-09 21:38:52.401 [INFO][3030] k8s.go 578: Cleaning up netns ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:38:52.430216 env[1162]: 2024-02-09 21:38:52.401 [INFO][3030] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" iface="eth0" netns="/var/run/netns/cni-1c9d6a0c-c3e4-81f0-b5c5-720d17bdc5c3" Feb 9 21:38:52.430216 env[1162]: 2024-02-09 21:38:52.402 [INFO][3030] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" iface="eth0" netns="/var/run/netns/cni-1c9d6a0c-c3e4-81f0-b5c5-720d17bdc5c3" Feb 9 21:38:52.430216 env[1162]: 2024-02-09 21:38:52.402 [INFO][3030] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" iface="eth0" netns="/var/run/netns/cni-1c9d6a0c-c3e4-81f0-b5c5-720d17bdc5c3" Feb 9 21:38:52.430216 env[1162]: 2024-02-09 21:38:52.402 [INFO][3030] k8s.go 585: Releasing IP address(es) ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:38:52.430216 env[1162]: 2024-02-09 21:38:52.402 [INFO][3030] utils.go 188: Calico CNI releasing IP address ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:38:52.430216 env[1162]: 2024-02-09 21:38:52.413 [INFO][3046] ipam_plugin.go 415: Releasing address using handleID ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" HandleID="k8s-pod-network.f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Workload="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:38:52.430216 env[1162]: 2024-02-09 21:38:52.413 [INFO][3046] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:38:52.430216 env[1162]: 2024-02-09 21:38:52.413 [INFO][3046] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:38:52.430216 env[1162]: 2024-02-09 21:38:52.425 [WARNING][3046] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" HandleID="k8s-pod-network.f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Workload="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:38:52.430216 env[1162]: 2024-02-09 21:38:52.425 [INFO][3046] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" HandleID="k8s-pod-network.f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Workload="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:38:52.430216 env[1162]: 2024-02-09 21:38:52.428 [INFO][3046] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:38:52.430216 env[1162]: 2024-02-09 21:38:52.429 [INFO][3030] k8s.go 591: Teardown processing complete. ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:38:52.430624 env[1162]: time="2024-02-09T21:38:52.430311715Z" level=info msg="TearDown network for sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\" successfully" Feb 9 21:38:52.430624 env[1162]: time="2024-02-09T21:38:52.430341894Z" level=info msg="StopPodSandbox for \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\" returns successfully" Feb 9 21:38:52.430862 env[1162]: time="2024-02-09T21:38:52.430847728Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wqwwd,Uid:dfb34e95-52fb-45cb-bba0-97a341a445ca,Namespace:calico-system,Attempt:1,}" Feb 9 21:38:52.431352 systemd[1]: run-netns-cni\x2d1c9d6a0c\x2dc3e4\x2d81f0\x2db5c5\x2d720d17bdc5c3.mount: Deactivated successfully. Feb 9 21:38:52.448639 systemd-networkd[1013]: calif7f4c8b4e08: Gained IPv6LL Feb 9 21:38:52.506991 systemd-networkd[1013]: cali9de92d7fb74: Link UP Feb 9 21:38:52.560691 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 21:38:52.560758 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9de92d7fb74: link becomes ready Feb 9 21:38:52.560848 systemd-networkd[1013]: cali9de92d7fb74: Gained carrier Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.457 [INFO][3061] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-csi--node--driver--wqwwd-eth0 csi-node-driver- calico-system dfb34e95-52fb-45cb-bba0-97a341a445ca 2357 0 2024-02-09 21:37:40 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.21 csi-node-driver-wqwwd eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali9de92d7fb74 [] []}} ContainerID="0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" Namespace="calico-system" Pod="csi-node-driver-wqwwd" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--wqwwd-" Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.457 [INFO][3061] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" Namespace="calico-system" Pod="csi-node-driver-wqwwd" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.474 [INFO][3085] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" HandleID="k8s-pod-network.0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" Workload="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.486 [INFO][3085] ipam_plugin.go 268: Auto assigning IP ContainerID="0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" HandleID="k8s-pod-network.0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" Workload="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025b780), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.80.21", "pod":"csi-node-driver-wqwwd", "timestamp":"2024-02-09 21:38:52.474151541 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.486 [INFO][3085] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.486 [INFO][3085] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.486 [INFO][3085] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.487 [INFO][3085] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" host="10.67.80.21" Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.490 [INFO][3085] ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.493 [INFO][3085] ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.495 [INFO][3085] ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.496 [INFO][3085] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.496 [INFO][3085] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" host="10.67.80.21" Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.498 [INFO][3085] ipam.go 1682: Creating new handle: k8s-pod-network.0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4 Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.501 [INFO][3085] ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" host="10.67.80.21" Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.504 [INFO][3085] ipam.go 1216: Successfully claimed IPs: [192.168.115.2/26] block=192.168.115.0/26 handle="k8s-pod-network.0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" host="10.67.80.21" Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.504 [INFO][3085] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.2/26] handle="k8s-pod-network.0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" host="10.67.80.21" Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.504 [INFO][3085] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:38:52.576564 env[1162]: 2024-02-09 21:38:52.504 [INFO][3085] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.115.2/26] IPv6=[] ContainerID="0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" HandleID="k8s-pod-network.0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" Workload="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:38:52.577076 env[1162]: 2024-02-09 21:38:52.506 [INFO][3061] k8s.go 385: Populated endpoint ContainerID="0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" Namespace="calico-system" Pod="csi-node-driver-wqwwd" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-csi--node--driver--wqwwd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dfb34e95-52fb-45cb-bba0-97a341a445ca", ResourceVersion:"2357", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 37, 40, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"csi-node-driver-wqwwd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9de92d7fb74", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:38:52.577076 env[1162]: 2024-02-09 21:38:52.506 [INFO][3061] k8s.go 386: Calico CNI using IPs: [192.168.115.2/32] ContainerID="0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" Namespace="calico-system" Pod="csi-node-driver-wqwwd" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:38:52.577076 env[1162]: 2024-02-09 21:38:52.506 [INFO][3061] dataplane_linux.go 68: Setting the host side veth name to cali9de92d7fb74 ContainerID="0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" Namespace="calico-system" Pod="csi-node-driver-wqwwd" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:38:52.577076 env[1162]: 2024-02-09 21:38:52.560 [INFO][3061] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" Namespace="calico-system" Pod="csi-node-driver-wqwwd" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:38:52.577076 env[1162]: 2024-02-09 21:38:52.560 [INFO][3061] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" Namespace="calico-system" Pod="csi-node-driver-wqwwd" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-csi--node--driver--wqwwd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dfb34e95-52fb-45cb-bba0-97a341a445ca", ResourceVersion:"2357", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 37, 40, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4", Pod:"csi-node-driver-wqwwd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9de92d7fb74", MAC:"d2:1b:90:5c:4e:4c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:38:52.577076 env[1162]: 2024-02-09 21:38:52.575 [INFO][3061] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4" Namespace="calico-system" Pod="csi-node-driver-wqwwd" WorkloadEndpoint="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:38:52.582072 env[1162]: time="2024-02-09T21:38:52.582035000Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:38:52.582072 env[1162]: time="2024-02-09T21:38:52.582059257Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:38:52.582182 env[1162]: time="2024-02-09T21:38:52.582069708Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:38:52.582182 env[1162]: time="2024-02-09T21:38:52.582137459Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4 pid=3119 runtime=io.containerd.runc.v2 Feb 9 21:38:52.582000 audit[3128]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=3128 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 21:38:52.582000 audit[3128]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fff17c1d360 a2=0 a3=7fff17c1d34c items=0 ppid=2597 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:52.582000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 21:38:52.599764 systemd[1]: Started cri-containerd-0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4.scope. Feb 9 21:38:52.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit: BPF prog-id=87 op=LOAD Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3119 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:52.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063376266623561393633316633643136333865623834393265643866 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3119 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:52.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063376266623561393633316633643136333865623834393265643866 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit: BPF prog-id=88 op=LOAD Feb 9 21:38:52.603000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000324740 items=0 ppid=3119 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:52.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063376266623561393633316633643136333865623834393265643866 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.603000 audit: BPF prog-id=89 op=LOAD Feb 9 21:38:52.603000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000324788 items=0 ppid=3119 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:52.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063376266623561393633316633643136333865623834393265643866 Feb 9 21:38:52.603000 audit: BPF prog-id=89 op=UNLOAD Feb 9 21:38:52.604000 audit: BPF prog-id=88 op=UNLOAD Feb 9 21:38:52.604000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.604000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.604000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.604000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.604000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.604000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.604000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.604000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.604000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.604000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.604000 audit: BPF prog-id=90 op=LOAD Feb 9 21:38:52.604000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000324b98 items=0 ppid=3119 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:52.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063376266623561393633316633643136333865623834393265643866 Feb 9 21:38:52.622352 env[1162]: time="2024-02-09T21:38:52.622324515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-wqwwd,Uid:dfb34e95-52fb-45cb-bba0-97a341a445ca,Namespace:calico-system,Attempt:1,} returns sandbox id \"0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4\"" Feb 9 21:38:52.717617 sshd[2870]: Failed password for root from 218.92.0.27 port 37879 ssh2 Feb 9 21:38:52.741485 env[1162]: time="2024-02-09T21:38:52.741451873Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:52.742095 env[1162]: time="2024-02-09T21:38:52.742080965Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:52.742713 env[1162]: time="2024-02-09T21:38:52.742701611Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:52.743707 env[1162]: time="2024-02-09T21:38:52.743695128Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:38:52.743909 env[1162]: time="2024-02-09T21:38:52.743896744Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 9 21:38:52.744249 env[1162]: time="2024-02-09T21:38:52.744206914Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 21:38:52.744851 env[1162]: time="2024-02-09T21:38:52.744819587Z" level=info msg="CreateContainer within sandbox \"afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 21:38:52.748820 env[1162]: time="2024-02-09T21:38:52.748778349Z" level=info msg="CreateContainer within sandbox \"afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"cb7ffaca563a18e90cf13da7b6e20ae0c8b363d0e0a90a165de893fe36628dc6\"" Feb 9 21:38:52.748994 env[1162]: time="2024-02-09T21:38:52.748952584Z" level=info msg="StartContainer for \"cb7ffaca563a18e90cf13da7b6e20ae0c8b363d0e0a90a165de893fe36628dc6\"" Feb 9 21:38:52.767547 systemd[1]: Started cri-containerd-cb7ffaca563a18e90cf13da7b6e20ae0c8b363d0e0a90a165de893fe36628dc6.scope. Feb 9 21:38:52.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit: BPF prog-id=91 op=LOAD Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2976 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:52.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376666616361353633613138653930636631336461376236653230 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=2976 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:52.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376666616361353633613138653930636631336461376236653230 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit: BPF prog-id=92 op=LOAD Feb 9 21:38:52.772000 audit[3159]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0001e4ea0 items=0 ppid=2976 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:52.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376666616361353633613138653930636631336461376236653230 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit: BPF prog-id=93 op=LOAD Feb 9 21:38:52.772000 audit[3159]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0001e4ee8 items=0 ppid=2976 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:52.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376666616361353633613138653930636631336461376236653230 Feb 9 21:38:52.772000 audit: BPF prog-id=93 op=UNLOAD Feb 9 21:38:52.772000 audit: BPF prog-id=92 op=UNLOAD Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { perfmon } for pid=3159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit[3159]: AVC avc: denied { bpf } for pid=3159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:52.772000 audit: BPF prog-id=94 op=LOAD Feb 9 21:38:52.772000 audit[3159]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0001e52f8 items=0 ppid=2976 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:52.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376666616361353633613138653930636631336461376236653230 Feb 9 21:38:52.793341 env[1162]: time="2024-02-09T21:38:52.793284255Z" level=info msg="StartContainer for \"cb7ffaca563a18e90cf13da7b6e20ae0c8b363d0e0a90a165de893fe36628dc6\" returns successfully" Feb 9 21:38:53.321000 audit[2870]: ANOM_LOGIN_FAILURES pid=2870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 9 21:38:53.321000 audit[2870]: USER_AUTH pid=2870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:38:53.323093 sshd[2870]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 9 21:38:53.324941 kubelet[1542]: E0209 21:38:53.324837 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:53.370429 env[1162]: time="2024-02-09T21:38:53.370282906Z" level=info msg="StopPodSandbox for \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\"" Feb 9 21:38:53.475061 env[1162]: 2024-02-09 21:38:53.453 [INFO][3215] k8s.go 578: Cleaning up netns ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:38:53.475061 env[1162]: 2024-02-09 21:38:53.453 [INFO][3215] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" iface="eth0" netns="/var/run/netns/cni-d7dd8eea-cbed-c54f-f3f7-25aebd9c2ce6" Feb 9 21:38:53.475061 env[1162]: 2024-02-09 21:38:53.453 [INFO][3215] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" iface="eth0" netns="/var/run/netns/cni-d7dd8eea-cbed-c54f-f3f7-25aebd9c2ce6" Feb 9 21:38:53.475061 env[1162]: 2024-02-09 21:38:53.453 [INFO][3215] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" iface="eth0" netns="/var/run/netns/cni-d7dd8eea-cbed-c54f-f3f7-25aebd9c2ce6" Feb 9 21:38:53.475061 env[1162]: 2024-02-09 21:38:53.453 [INFO][3215] k8s.go 585: Releasing IP address(es) ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:38:53.475061 env[1162]: 2024-02-09 21:38:53.453 [INFO][3215] utils.go 188: Calico CNI releasing IP address ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:38:53.475061 env[1162]: 2024-02-09 21:38:53.465 [INFO][3231] ipam_plugin.go 415: Releasing address using handleID ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" HandleID="k8s-pod-network.a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Workload="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:38:53.475061 env[1162]: 2024-02-09 21:38:53.465 [INFO][3231] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:38:53.475061 env[1162]: 2024-02-09 21:38:53.465 [INFO][3231] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:38:53.475061 env[1162]: 2024-02-09 21:38:53.471 [WARNING][3231] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" HandleID="k8s-pod-network.a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Workload="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:38:53.475061 env[1162]: 2024-02-09 21:38:53.471 [INFO][3231] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" HandleID="k8s-pod-network.a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Workload="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:38:53.475061 env[1162]: 2024-02-09 21:38:53.473 [INFO][3231] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:38:53.475061 env[1162]: 2024-02-09 21:38:53.474 [INFO][3215] k8s.go 591: Teardown processing complete. ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:38:53.475725 env[1162]: time="2024-02-09T21:38:53.475139315Z" level=info msg="TearDown network for sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\" successfully" Feb 9 21:38:53.475725 env[1162]: time="2024-02-09T21:38:53.475178799Z" level=info msg="StopPodSandbox for \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\" returns successfully" Feb 9 21:38:53.475794 env[1162]: time="2024-02-09T21:38:53.475718508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5l82t,Uid:7ea80032-eead-46eb-aa24-12435448e0fa,Namespace:kube-system,Attempt:1,}" Feb 9 21:38:53.476688 systemd[1]: run-netns-cni\x2dd7dd8eea\x2dcbed\x2dc54f\x2df3f7\x2d25aebd9c2ce6.mount: Deactivated successfully. Feb 9 21:38:53.573619 systemd-networkd[1013]: cali82352b40ce7: Link UP Feb 9 21:38:53.613339 kubelet[1542]: I0209 21:38:53.613314 1542 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-zbgjp" podStartSLOduration=887.411667974 podCreationTimestamp="2024-02-09 21:24:05 +0000 UTC" firstStartedPulling="2024-02-09 21:38:51.542492198 +0000 UTC m=+71.555264512" lastFinishedPulling="2024-02-09 21:38:52.744112163 +0000 UTC m=+72.756884476" observedRunningTime="2024-02-09 21:38:53.607505084 +0000 UTC m=+73.620277396" watchObservedRunningTime="2024-02-09 21:38:53.613287938 +0000 UTC m=+73.626060248" Feb 9 21:38:53.626335 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 21:38:53.626382 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali82352b40ce7: link becomes ready Feb 9 21:38:53.626548 systemd-networkd[1013]: cali82352b40ce7: Gained carrier Feb 9 21:38:53.626000 audit[3286]: NETFILTER_CFG table=filter:71 family=2 entries=14 op=nft_register_rule pid=3286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:38:53.626000 audit[3286]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffead1867b0 a2=0 a3=7ffead18679c items=0 ppid=1786 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.626000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.512 [INFO][3247] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0 coredns-5d78c9869d- kube-system 7ea80032-eead-46eb-aa24-12435448e0fa 2366 0 2024-02-09 21:24:05 +0000 UTC <nil> <nil> map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s 10.67.80.21 coredns-5d78c9869d-5l82t eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali82352b40ce7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" Namespace="kube-system" Pod="coredns-5d78c9869d-5l82t" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-" Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.512 [INFO][3247] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" Namespace="kube-system" Pod="coredns-5d78c9869d-5l82t" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.535 [INFO][3268] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" HandleID="k8s-pod-network.a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" Workload="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.549 [INFO][3268] ipam_plugin.go 268: Auto assigning IP ContainerID="a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" HandleID="k8s-pod-network.a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" Workload="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000354df0), Attrs:map[string]string{"namespace":"kube-system", "node":"10.67.80.21", "pod":"coredns-5d78c9869d-5l82t", "timestamp":"2024-02-09 21:38:53.535521471 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.549 [INFO][3268] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.549 [INFO][3268] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.549 [INFO][3268] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.550 [INFO][3268] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" host="10.67.80.21" Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.553 [INFO][3268] ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.557 [INFO][3268] ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.559 [INFO][3268] ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.562 [INFO][3268] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.562 [INFO][3268] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" host="10.67.80.21" Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.563 [INFO][3268] ipam.go 1682: Creating new handle: k8s-pod-network.a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22 Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.566 [INFO][3268] ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" host="10.67.80.21" Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.570 [INFO][3268] ipam.go 1216: Successfully claimed IPs: [192.168.115.3/26] block=192.168.115.0/26 handle="k8s-pod-network.a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" host="10.67.80.21" Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.570 [INFO][3268] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.3/26] handle="k8s-pod-network.a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" host="10.67.80.21" Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.570 [INFO][3268] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:38:53.632853 env[1162]: 2024-02-09 21:38:53.570 [INFO][3268] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.115.3/26] IPv6=[] ContainerID="a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" HandleID="k8s-pod-network.a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" Workload="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:38:53.633396 env[1162]: 2024-02-09 21:38:53.572 [INFO][3247] k8s.go 385: Populated endpoint ContainerID="a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" Namespace="kube-system" Pod="coredns-5d78c9869d-5l82t" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"7ea80032-eead-46eb-aa24-12435448e0fa", ResourceVersion:"2366", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 24, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"coredns-5d78c9869d-5l82t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.115.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali82352b40ce7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:38:53.633396 env[1162]: 2024-02-09 21:38:53.572 [INFO][3247] k8s.go 386: Calico CNI using IPs: [192.168.115.3/32] ContainerID="a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" Namespace="kube-system" Pod="coredns-5d78c9869d-5l82t" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:38:53.633396 env[1162]: 2024-02-09 21:38:53.572 [INFO][3247] dataplane_linux.go 68: Setting the host side veth name to cali82352b40ce7 ContainerID="a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" Namespace="kube-system" Pod="coredns-5d78c9869d-5l82t" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:38:53.633396 env[1162]: 2024-02-09 21:38:53.626 [INFO][3247] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" Namespace="kube-system" Pod="coredns-5d78c9869d-5l82t" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:38:53.633396 env[1162]: 2024-02-09 21:38:53.626 [INFO][3247] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" Namespace="kube-system" Pod="coredns-5d78c9869d-5l82t" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"7ea80032-eead-46eb-aa24-12435448e0fa", ResourceVersion:"2366", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 24, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22", Pod:"coredns-5d78c9869d-5l82t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.115.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali82352b40ce7", MAC:"d6:cd:62:76:38:74", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:38:53.633396 env[1162]: 2024-02-09 21:38:53.632 [INFO][3247] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22" Namespace="kube-system" Pod="coredns-5d78c9869d-5l82t" WorkloadEndpoint="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:38:53.638449 env[1162]: time="2024-02-09T21:38:53.638418320Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:38:53.638449 env[1162]: time="2024-02-09T21:38:53.638439626Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:38:53.638539 env[1162]: time="2024-02-09T21:38:53.638450829Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:38:53.638677 env[1162]: time="2024-02-09T21:38:53.638657526Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22 pid=3305 runtime=io.containerd.runc.v2 Feb 9 21:38:53.644232 systemd[1]: Started cri-containerd-a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22.scope. Feb 9 21:38:53.643000 audit[3286]: NETFILTER_CFG table=nat:72 family=2 entries=14 op=nft_register_rule pid=3286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:38:53.643000 audit[3286]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffead1867b0 a2=0 a3=31030 items=0 ppid=1786 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.643000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:38:53.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit: BPF prog-id=95 op=LOAD Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3305 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131326638653662653234323664643933373430343464373633373735 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3305 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131326638653662653234323664643933373430343464373633373735 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit: BPF prog-id=96 op=LOAD Feb 9 21:38:53.648000 audit[3316]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00022b1c0 items=0 ppid=3305 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131326638653662653234323664643933373430343464373633373735 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.648000 audit: BPF prog-id=97 op=LOAD Feb 9 21:38:53.648000 audit[3316]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00022b208 items=0 ppid=3305 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131326638653662653234323664643933373430343464373633373735 Feb 9 21:38:53.648000 audit: BPF prog-id=97 op=UNLOAD Feb 9 21:38:53.648000 audit: BPF prog-id=96 op=UNLOAD Feb 9 21:38:53.649000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.649000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.649000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.649000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.649000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.649000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.649000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.649000 audit[3316]: AVC avc: denied { perfmon } for pid=3316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.649000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.649000 audit[3316]: AVC avc: denied { bpf } for pid=3316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.649000 audit: BPF prog-id=98 op=LOAD Feb 9 21:38:53.649000 audit[3316]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00022b618 items=0 ppid=3305 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131326638653662653234323664643933373430343464373633373735 Feb 9 21:38:53.656000 audit[3333]: NETFILTER_CFG table=filter:73 family=2 entries=34 op=nft_register_chain pid=3333 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 21:38:53.656000 audit[3333]: SYSCALL arch=c000003e syscall=46 success=yes exit=17900 a0=3 a1=7ffe1898ff90 a2=0 a3=7ffe1898ff7c items=0 ppid=2597 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.656000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 21:38:53.657000 audit[3334]: NETFILTER_CFG table=filter:74 family=2 entries=11 op=nft_register_rule pid=3334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:38:53.657000 audit[3334]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff189264d0 a2=0 a3=7fff189264bc items=0 ppid=1786 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:38:53.678027 env[1162]: time="2024-02-09T21:38:53.678004215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5l82t,Uid:7ea80032-eead-46eb-aa24-12435448e0fa,Namespace:kube-system,Attempt:1,} returns sandbox id \"a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22\"" Feb 9 21:38:53.679214 env[1162]: time="2024-02-09T21:38:53.679200112Z" level=info msg="CreateContainer within sandbox \"a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 9 21:38:53.678000 audit[3334]: NETFILTER_CFG table=nat:75 family=2 entries=35 op=nft_register_chain pid=3334 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:38:53.678000 audit[3334]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fff189264d0 a2=0 a3=7fff189264bc items=0 ppid=1786 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.678000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:38:53.683328 env[1162]: time="2024-02-09T21:38:53.683282687Z" level=info msg="CreateContainer within sandbox \"a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"e7428c918873cfbacd85c30201b734bef0025fb7bbe76854f2b05cbad2316a4b\"" Feb 9 21:38:53.683514 env[1162]: time="2024-02-09T21:38:53.683449490Z" level=info msg="StartContainer for \"e7428c918873cfbacd85c30201b734bef0025fb7bbe76854f2b05cbad2316a4b\"" Feb 9 21:38:53.704749 systemd[1]: Started cri-containerd-e7428c918873cfbacd85c30201b734bef0025fb7bbe76854f2b05cbad2316a4b.scope. Feb 9 21:38:53.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit: BPF prog-id=99 op=LOAD Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3305 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537343238633931383837336366626163643835633330323031623733 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3305 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537343238633931383837336366626163643835633330323031623733 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit: BPF prog-id=100 op=LOAD Feb 9 21:38:53.716000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030d780 items=0 ppid=3305 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537343238633931383837336366626163643835633330323031623733 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit: BPF prog-id=101 op=LOAD Feb 9 21:38:53.716000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00030d7c8 items=0 ppid=3305 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537343238633931383837336366626163643835633330323031623733 Feb 9 21:38:53.716000 audit: BPF prog-id=101 op=UNLOAD Feb 9 21:38:53.716000 audit: BPF prog-id=100 op=UNLOAD Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:53.716000 audit: BPF prog-id=102 op=LOAD Feb 9 21:38:53.716000 audit[3347]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00030dbd8 items=0 ppid=3305 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:53.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537343238633931383837336366626163643835633330323031623733 Feb 9 21:38:53.739483 env[1162]: time="2024-02-09T21:38:53.739433599Z" level=info msg="StartContainer for \"e7428c918873cfbacd85c30201b734bef0025fb7bbe76854f2b05cbad2316a4b\" returns successfully" Feb 9 21:38:53.984784 systemd-networkd[1013]: cali9de92d7fb74: Gained IPv6LL Feb 9 21:38:54.325862 kubelet[1542]: E0209 21:38:54.325740 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:54.626792 kubelet[1542]: I0209 21:38:54.626585 1542 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-5l82t" podStartSLOduration=889.626492519 podCreationTimestamp="2024-02-09 21:24:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 21:38:54.626183193 +0000 UTC m=+74.638955577" watchObservedRunningTime="2024-02-09 21:38:54.626492519 +0000 UTC m=+74.639264886" Feb 9 21:38:54.638000 audit[3388]: NETFILTER_CFG table=filter:76 family=2 entries=8 op=nft_register_rule pid=3388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:38:54.638000 audit[3388]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffeb98f4420 a2=0 a3=7ffeb98f440c items=0 ppid=1786 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:54.638000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:38:54.653000 audit[3388]: NETFILTER_CFG table=nat:77 family=2 entries=44 op=nft_register_rule pid=3388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:38:54.653000 audit[3388]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffeb98f4420 a2=0 a3=7ffeb98f440c items=0 ppid=1786 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:54.653000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:38:54.817680 systemd-networkd[1013]: cali82352b40ce7: Gained IPv6LL Feb 9 21:38:54.939913 sshd[2870]: Failed password for root from 218.92.0.27 port 37879 ssh2 Feb 9 21:38:55.327009 kubelet[1542]: E0209 21:38:55.326898 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:55.604000 audit[2870]: USER_AUTH pid=2870 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:38:55.672000 audit[3390]: NETFILTER_CFG table=filter:78 family=2 entries=8 op=nft_register_rule pid=3390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:38:55.672000 audit[3390]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcc2644820 a2=0 a3=7ffcc264480c items=0 ppid=1786 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:55.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:38:55.681000 audit[3390]: NETFILTER_CFG table=nat:79 family=2 entries=56 op=nft_register_chain pid=3390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:38:55.681000 audit[3390]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffcc2644820 a2=0 a3=7ffcc264480c items=0 ppid=1786 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:55.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:38:56.328362 kubelet[1542]: E0209 21:38:56.328178 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:57.328733 kubelet[1542]: E0209 21:38:57.328609 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:57.370820 env[1162]: time="2024-02-09T21:38:57.370633786Z" level=info msg="StopPodSandbox for \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\"" Feb 9 21:38:57.431157 env[1162]: 2024-02-09 21:38:57.412 [INFO][3421] k8s.go 578: Cleaning up netns ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:38:57.431157 env[1162]: 2024-02-09 21:38:57.412 [INFO][3421] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" iface="eth0" netns="/var/run/netns/cni-dc0d37ad-d7a9-58d9-ee14-93f3bcb42e29" Feb 9 21:38:57.431157 env[1162]: 2024-02-09 21:38:57.412 [INFO][3421] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" iface="eth0" netns="/var/run/netns/cni-dc0d37ad-d7a9-58d9-ee14-93f3bcb42e29" Feb 9 21:38:57.431157 env[1162]: 2024-02-09 21:38:57.412 [INFO][3421] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" iface="eth0" netns="/var/run/netns/cni-dc0d37ad-d7a9-58d9-ee14-93f3bcb42e29" Feb 9 21:38:57.431157 env[1162]: 2024-02-09 21:38:57.412 [INFO][3421] k8s.go 585: Releasing IP address(es) ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:38:57.431157 env[1162]: 2024-02-09 21:38:57.412 [INFO][3421] utils.go 188: Calico CNI releasing IP address ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:38:57.431157 env[1162]: 2024-02-09 21:38:57.422 [INFO][3433] ipam_plugin.go 415: Releasing address using handleID ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" HandleID="k8s-pod-network.99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Workload="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:38:57.431157 env[1162]: 2024-02-09 21:38:57.422 [INFO][3433] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:38:57.431157 env[1162]: 2024-02-09 21:38:57.422 [INFO][3433] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:38:57.431157 env[1162]: 2024-02-09 21:38:57.428 [WARNING][3433] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" HandleID="k8s-pod-network.99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Workload="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:38:57.431157 env[1162]: 2024-02-09 21:38:57.428 [INFO][3433] ipam_plugin.go 443: Releasing address using workloadID ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" HandleID="k8s-pod-network.99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Workload="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:38:57.431157 env[1162]: 2024-02-09 21:38:57.429 [INFO][3433] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:38:57.431157 env[1162]: 2024-02-09 21:38:57.430 [INFO][3421] k8s.go 591: Teardown processing complete. ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:38:57.431517 env[1162]: time="2024-02-09T21:38:57.431250715Z" level=info msg="TearDown network for sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\" successfully" Feb 9 21:38:57.431517 env[1162]: time="2024-02-09T21:38:57.431273204Z" level=info msg="StopPodSandbox for \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\" returns successfully" Feb 9 21:38:57.431746 env[1162]: time="2024-02-09T21:38:57.431695340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55b6cd655b-pdmv4,Uid:f3d9b71e-d18e-43bd-86ac-aa6c18d2520e,Namespace:calico-system,Attempt:1,}" Feb 9 21:38:57.432815 systemd[1]: run-netns-cni\x2ddc0d37ad\x2dd7a9\x2d58d9\x2dee14\x2d93f3bcb42e29.mount: Deactivated successfully. Feb 9 21:38:57.535624 systemd-networkd[1013]: calia0ada7d74fc: Link UP Feb 9 21:38:57.587523 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 21:38:57.587578 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia0ada7d74fc: link becomes ready Feb 9 21:38:57.587669 systemd-networkd[1013]: calia0ada7d74fc: Gained carrier Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.458 [INFO][3447] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0 calico-kube-controllers-55b6cd655b- calico-system f3d9b71e-d18e-43bd-86ac-aa6c18d2520e 2397 0 2024-02-09 21:24:10 +0000 UTC <nil> <nil> map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:55b6cd655b projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s 10.67.80.21 calico-kube-controllers-55b6cd655b-pdmv4 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calia0ada7d74fc [] []}} ContainerID="5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" Namespace="calico-system" Pod="calico-kube-controllers-55b6cd655b-pdmv4" WorkloadEndpoint="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-" Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.458 [INFO][3447] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" Namespace="calico-system" Pod="calico-kube-controllers-55b6cd655b-pdmv4" WorkloadEndpoint="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.478 [INFO][3466] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" HandleID="k8s-pod-network.5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" Workload="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.490 [INFO][3466] ipam_plugin.go 268: Auto assigning IP ContainerID="5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" HandleID="k8s-pod-network.5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" Workload="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029daa0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.80.21", "pod":"calico-kube-controllers-55b6cd655b-pdmv4", "timestamp":"2024-02-09 21:38:57.478253327 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.490 [INFO][3466] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.490 [INFO][3466] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.490 [INFO][3466] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.492 [INFO][3466] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" host="10.67.80.21" Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.496 [INFO][3466] ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.501 [INFO][3466] ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.503 [INFO][3466] ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.506 [INFO][3466] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.506 [INFO][3466] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" host="10.67.80.21" Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.509 [INFO][3466] ipam.go 1682: Creating new handle: k8s-pod-network.5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5 Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.517 [INFO][3466] ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" host="10.67.80.21" Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.528 [INFO][3466] ipam.go 1216: Successfully claimed IPs: [192.168.115.4/26] block=192.168.115.0/26 handle="k8s-pod-network.5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" host="10.67.80.21" Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.528 [INFO][3466] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.4/26] handle="k8s-pod-network.5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" host="10.67.80.21" Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.528 [INFO][3466] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:38:57.597776 env[1162]: 2024-02-09 21:38:57.528 [INFO][3466] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.115.4/26] IPv6=[] ContainerID="5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" HandleID="k8s-pod-network.5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" Workload="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:38:57.598235 env[1162]: 2024-02-09 21:38:57.532 [INFO][3447] k8s.go 385: Populated endpoint ContainerID="5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" Namespace="calico-system" Pod="calico-kube-controllers-55b6cd655b-pdmv4" WorkloadEndpoint="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0", GenerateName:"calico-kube-controllers-55b6cd655b-", Namespace:"calico-system", SelfLink:"", UID:"f3d9b71e-d18e-43bd-86ac-aa6c18d2520e", ResourceVersion:"2397", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 24, 10, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55b6cd655b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"calico-kube-controllers-55b6cd655b-pdmv4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.115.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia0ada7d74fc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:38:57.598235 env[1162]: 2024-02-09 21:38:57.532 [INFO][3447] k8s.go 386: Calico CNI using IPs: [192.168.115.4/32] ContainerID="5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" Namespace="calico-system" Pod="calico-kube-controllers-55b6cd655b-pdmv4" WorkloadEndpoint="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:38:57.598235 env[1162]: 2024-02-09 21:38:57.532 [INFO][3447] dataplane_linux.go 68: Setting the host side veth name to calia0ada7d74fc ContainerID="5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" Namespace="calico-system" Pod="calico-kube-controllers-55b6cd655b-pdmv4" WorkloadEndpoint="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:38:57.598235 env[1162]: 2024-02-09 21:38:57.587 [INFO][3447] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" Namespace="calico-system" Pod="calico-kube-controllers-55b6cd655b-pdmv4" WorkloadEndpoint="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:38:57.598235 env[1162]: 2024-02-09 21:38:57.587 [INFO][3447] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" Namespace="calico-system" Pod="calico-kube-controllers-55b6cd655b-pdmv4" WorkloadEndpoint="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0", GenerateName:"calico-kube-controllers-55b6cd655b-", Namespace:"calico-system", SelfLink:"", UID:"f3d9b71e-d18e-43bd-86ac-aa6c18d2520e", ResourceVersion:"2397", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 24, 10, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55b6cd655b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5", Pod:"calico-kube-controllers-55b6cd655b-pdmv4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.115.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia0ada7d74fc", MAC:"ee:c5:a6:04:cd:af", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:38:57.598235 env[1162]: 2024-02-09 21:38:57.597 [INFO][3447] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5" Namespace="calico-system" Pod="calico-kube-controllers-55b6cd655b-pdmv4" WorkloadEndpoint="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:38:57.603246 env[1162]: time="2024-02-09T21:38:57.603212202Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:38:57.603246 env[1162]: time="2024-02-09T21:38:57.603236152Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:38:57.603246 env[1162]: time="2024-02-09T21:38:57.603243140Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:38:57.603375 env[1162]: time="2024-02-09T21:38:57.603305352Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5 pid=3505 runtime=io.containerd.runc.v2 Feb 9 21:38:57.603000 audit[3511]: NETFILTER_CFG table=filter:80 family=2 entries=42 op=nft_register_chain pid=3511 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 21:38:57.622425 systemd[1]: Started cri-containerd-5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5.scope. Feb 9 21:38:57.628837 kernel: kauditd_printk_skb: 312 callbacks suppressed Feb 9 21:38:57.628867 kernel: audit: type=1325 audit(1707514737.603:763): table=filter:80 family=2 entries=42 op=nft_register_chain pid=3511 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 21:38:57.603000 audit[3511]: SYSCALL arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffde5a122d0 a2=0 a3=7ffde5a122bc items=0 ppid=2597 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:57.771882 kernel: audit: type=1300 audit(1707514737.603:763): arch=c000003e syscall=46 success=yes exit=20696 a0=3 a1=7ffde5a122d0 a2=0 a3=7ffde5a122bc items=0 ppid=2597 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:57.771954 kernel: audit: type=1327 audit(1707514737.603:763): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 21:38:57.603000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 21:38:57.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.829451 kernel: audit: type=1400 audit(1707514737.688:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.005340 kernel: audit: type=1400 audit(1707514737.688:765): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.005378 kernel: audit: type=1400 audit(1707514737.688:766): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.005398 kernel: audit: type=1400 audit(1707514737.688:767): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.064897 kernel: audit: type=1400 audit(1707514737.688:768): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.165585 sshd[2870]: Failed password for root from 218.92.0.27 port 37879 ssh2 Feb 9 21:38:58.185362 kernel: audit: type=1400 audit(1707514737.688:769): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.185394 kernel: audit: type=1400 audit(1707514737.688:770): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit: BPF prog-id=103 op=LOAD Feb 9 21:38:57.827000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3505 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:57.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564373563333237356362316363386432343739633130363433623837 Feb 9 21:38:57.827000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3505 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:57.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564373563333237356362316363386432343739633130363433623837 Feb 9 21:38:57.827000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.827000 audit: BPF prog-id=104 op=LOAD Feb 9 21:38:57.827000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002983f0 items=0 ppid=3505 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:57.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564373563333237356362316363386432343739633130363433623837 Feb 9 21:38:57.886000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.886000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.886000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.886000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.886000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.886000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.886000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.886000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.886000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:57.886000 audit: BPF prog-id=105 op=LOAD Feb 9 21:38:57.886000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000298438 items=0 ppid=3505 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:57.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564373563333237356362316363386432343739633130363433623837 Feb 9 21:38:58.003000 audit: BPF prog-id=105 op=UNLOAD Feb 9 21:38:58.003000 audit: BPF prog-id=104 op=UNLOAD Feb 9 21:38:58.003000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.003000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.003000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.003000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.003000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.003000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.003000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.003000 audit[3516]: AVC avc: denied { perfmon } for pid=3516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.003000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.003000 audit[3516]: AVC avc: denied { bpf } for pid=3516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:38:58.003000 audit: BPF prog-id=106 op=LOAD Feb 9 21:38:58.003000 audit[3516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000298848 items=0 ppid=3505 pid=3516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:38:58.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564373563333237356362316363386432343739633130363433623837 Feb 9 21:38:58.275011 env[1162]: time="2024-02-09T21:38:58.274983850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55b6cd655b-pdmv4,Uid:f3d9b71e-d18e-43bd-86ac-aa6c18d2520e,Namespace:calico-system,Attempt:1,} returns sandbox id \"5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5\"" Feb 9 21:38:58.329383 kubelet[1542]: E0209 21:38:58.329308 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:59.329910 kubelet[1542]: E0209 21:38:59.329736 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:38:59.553070 systemd-networkd[1013]: calia0ada7d74fc: Gained IPv6LL Feb 9 21:39:00.016925 sshd[2870]: Received disconnect from 218.92.0.27 port 37879:11: [preauth] Feb 9 21:39:00.016925 sshd[2870]: Disconnected from authenticating user root 218.92.0.27 port 37879 [preauth] Feb 9 21:39:00.017432 sshd[2870]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 21:39:00.019572 systemd[1]: sshd@8-139.178.90.113:22-218.92.0.27:37879.service: Deactivated successfully. Feb 9 21:39:00.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.90.113:22-218.92.0.27:37879 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:00.163571 systemd[1]: Started sshd@9-139.178.90.113:22-218.92.0.27:39668.service. Feb 9 21:39:00.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.113:22-218.92.0.27:39668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:00.275021 kubelet[1542]: E0209 21:39:00.274775 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:00.330621 kubelet[1542]: E0209 21:39:00.330515 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:01.129036 sshd[3566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 21:39:01.127000 audit[3566]: USER_AUTH pid=3566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:39:01.331890 kubelet[1542]: E0209 21:39:01.331768 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:02.332424 kubelet[1542]: E0209 21:39:02.332309 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:02.845847 sshd[3566]: Failed password for root from 218.92.0.27 port 39668 ssh2 Feb 9 21:39:03.333290 kubelet[1542]: E0209 21:39:03.333217 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:03.402000 audit[3566]: USER_AUTH pid=3566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:39:03.429786 kernel: kauditd_printk_skb: 53 callbacks suppressed Feb 9 21:39:03.429841 kernel: audit: type=1100 audit(1707514743.402:785): pid=3566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:39:04.334006 kubelet[1542]: E0209 21:39:04.333885 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:05.060424 sshd[3566]: Failed password for root from 218.92.0.27 port 39668 ssh2 Feb 9 21:39:05.334349 kubelet[1542]: E0209 21:39:05.334115 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:05.678000 audit[3566]: USER_AUTH pid=3566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:39:05.764492 kernel: audit: type=1100 audit(1707514745.678:786): pid=3566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.27 addr=218.92.0.27 terminal=ssh res=failed' Feb 9 21:39:06.335111 kubelet[1542]: E0209 21:39:06.335005 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:07.336108 kubelet[1542]: E0209 21:39:07.336037 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:07.942725 sshd[3566]: Failed password for root from 218.92.0.27 port 39668 ssh2 Feb 9 21:39:08.336508 kubelet[1542]: E0209 21:39:08.336393 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:09.336673 kubelet[1542]: E0209 21:39:09.336573 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:10.082788 sshd[3566]: Received disconnect from 218.92.0.27 port 39668:11: [preauth] Feb 9 21:39:10.082788 sshd[3566]: Disconnected from authenticating user root 218.92.0.27 port 39668 [preauth] Feb 9 21:39:10.083293 sshd[3566]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.27 user=root Feb 9 21:39:10.085334 systemd[1]: sshd@9-139.178.90.113:22-218.92.0.27:39668.service: Deactivated successfully. Feb 9 21:39:10.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.113:22-218.92.0.27:39668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:10.172649 kernel: audit: type=1131 audit(1707514750.085:787): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.90.113:22-218.92.0.27:39668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:10.337582 kubelet[1542]: E0209 21:39:10.337330 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:11.076322 env[1162]: time="2024-02-09T21:39:11.076255526Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:39:11.077106 env[1162]: time="2024-02-09T21:39:11.077062915Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:39:11.077859 env[1162]: time="2024-02-09T21:39:11.077809941Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:39:11.079042 env[1162]: time="2024-02-09T21:39:11.078989007Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:39:11.079388 env[1162]: time="2024-02-09T21:39:11.079331376Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 21:39:11.079925 env[1162]: time="2024-02-09T21:39:11.079870865Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 9 21:39:11.080678 env[1162]: time="2024-02-09T21:39:11.080636244Z" level=info msg="CreateContainer within sandbox \"0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 21:39:11.086034 env[1162]: time="2024-02-09T21:39:11.085987660Z" level=info msg="CreateContainer within sandbox \"0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e7e0d185585a31594f219ba285c34738452ac7b4f7fbf84b1d851a74ecc7d846\"" Feb 9 21:39:11.086331 env[1162]: time="2024-02-09T21:39:11.086292856Z" level=info msg="StartContainer for \"e7e0d185585a31594f219ba285c34738452ac7b4f7fbf84b1d851a74ecc7d846\"" Feb 9 21:39:11.108378 systemd[1]: Started cri-containerd-e7e0d185585a31594f219ba285c34738452ac7b4f7fbf84b1d851a74ecc7d846.scope. Feb 9 21:39:11.114000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.114000 audit[3590]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3119 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:39:11.267917 kernel: audit: type=1400 audit(1707514751.114:788): avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.267956 kernel: audit: type=1300 audit(1707514751.114:788): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3119 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:39:11.267975 kernel: audit: type=1327 audit(1707514751.114:788): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653064313835353835613331353934663231396261323835633334 Feb 9 21:39:11.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653064313835353835613331353934663231396261323835633334 Feb 9 21:39:11.338226 kubelet[1542]: E0209 21:39:11.338164 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:11.357918 kernel: audit: type=1400 audit(1707514751.114:789): avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.114000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.418179 kernel: audit: type=1400 audit(1707514751.114:789): avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.114000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.479362 kernel: audit: type=1400 audit(1707514751.114:789): avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.114000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.541806 kernel: audit: type=1400 audit(1707514751.114:789): avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.114000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.605880 kernel: audit: type=1400 audit(1707514751.114:789): avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.114000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.671284 kernel: audit: type=1400 audit(1707514751.114:789): avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.114000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.114000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.114000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.114000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.114000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.114000 audit: BPF prog-id=107 op=LOAD Feb 9 21:39:11.114000 audit[3590]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028ef20 items=0 ppid=3119 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:39:11.114000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653064313835353835613331353934663231396261323835633334 Feb 9 21:39:11.267000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.267000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.267000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.267000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.267000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.267000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.267000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.267000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.267000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.267000 audit: BPF prog-id=108 op=LOAD Feb 9 21:39:11.267000 audit[3590]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028ef68 items=0 ppid=3119 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:39:11.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653064313835353835613331353934663231396261323835633334 Feb 9 21:39:11.417000 audit: BPF prog-id=108 op=UNLOAD Feb 9 21:39:11.417000 audit: BPF prog-id=107 op=UNLOAD Feb 9 21:39:11.417000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.417000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.417000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.417000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.417000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.417000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.417000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.417000 audit[3590]: AVC avc: denied { perfmon } for pid=3590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.417000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.417000 audit[3590]: AVC avc: denied { bpf } for pid=3590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:11.417000 audit: BPF prog-id=109 op=LOAD Feb 9 21:39:11.417000 audit[3590]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028eff8 items=0 ppid=3119 pid=3590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:39:11.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653064313835353835613331353934663231396261323835633334 Feb 9 21:39:11.738415 env[1162]: time="2024-02-09T21:39:11.738394986Z" level=info msg="StartContainer for \"e7e0d185585a31594f219ba285c34738452ac7b4f7fbf84b1d851a74ecc7d846\" returns successfully" Feb 9 21:39:12.338652 kubelet[1542]: E0209 21:39:12.338591 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:13.338923 kubelet[1542]: E0209 21:39:13.338848 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:14.339204 kubelet[1542]: E0209 21:39:14.339090 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:14.552606 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4158384804.mount: Deactivated successfully. Feb 9 21:39:15.340028 kubelet[1542]: E0209 21:39:15.339926 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:16.341031 kubelet[1542]: E0209 21:39:16.340920 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:17.342212 kubelet[1542]: E0209 21:39:17.342085 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:18.342334 kubelet[1542]: E0209 21:39:18.342233 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:19.343633 kubelet[1542]: E0209 21:39:19.343517 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:20.274236 kubelet[1542]: E0209 21:39:20.274127 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:20.344277 kubelet[1542]: E0209 21:39:20.344180 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:20.862098 env[1162]: time="2024-02-09T21:39:20.861966058Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:39:20.864985 env[1162]: time="2024-02-09T21:39:20.864876028Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:39:20.869874 env[1162]: time="2024-02-09T21:39:20.869777851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:39:20.874838 env[1162]: time="2024-02-09T21:39:20.874737753Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:39:20.877374 env[1162]: time="2024-02-09T21:39:20.877258846Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 9 21:39:20.878533 env[1162]: time="2024-02-09T21:39:20.878387472Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 21:39:20.886365 env[1162]: time="2024-02-09T21:39:20.886350595Z" level=info msg="CreateContainer within sandbox \"5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 9 21:39:20.890819 env[1162]: time="2024-02-09T21:39:20.890775182Z" level=info msg="CreateContainer within sandbox \"5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"850a2b71602392074d2726a5abee456f2474a7e32c2d48474f235debd55b1016\"" Feb 9 21:39:20.891008 env[1162]: time="2024-02-09T21:39:20.890967393Z" level=info msg="StartContainer for \"850a2b71602392074d2726a5abee456f2474a7e32c2d48474f235debd55b1016\"" Feb 9 21:39:20.912768 systemd[1]: Started cri-containerd-850a2b71602392074d2726a5abee456f2474a7e32c2d48474f235debd55b1016.scope. Feb 9 21:39:20.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:20.949018 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 21:39:20.949089 kernel: audit: type=1400 audit(1707514760.921:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:20.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.076349 kernel: audit: type=1400 audit(1707514760.921:795): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.076380 kernel: audit: type=1400 audit(1707514760.921:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:20.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.141210 kernel: audit: type=1400 audit(1707514760.921:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:20.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.205386 kernel: audit: type=1400 audit(1707514760.921:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:20.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.269347 kernel: audit: type=1400 audit(1707514760.921:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:20.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.333285 kernel: audit: type=1400 audit(1707514760.921:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:20.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.344439 kubelet[1542]: E0209 21:39:21.344397 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:21.397274 kernel: audit: type=1400 audit(1707514760.921:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:20.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:20.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.525062 kernel: audit: type=1400 audit(1707514760.921:802): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.525098 kernel: audit: type=1400 audit(1707514761.012:803): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit: BPF prog-id=110 op=LOAD Feb 9 21:39:21.012000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit[3632]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3505 pid=3632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:39:21.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306132623731363032333932303734643237323661356162656534 Feb 9 21:39:21.012000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit[3632]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3505 pid=3632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:39:21.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306132623731363032333932303734643237323661356162656534 Feb 9 21:39:21.012000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.012000 audit: BPF prog-id=111 op=LOAD Feb 9 21:39:21.012000 audit[3632]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c8120 items=0 ppid=3505 pid=3632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:39:21.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306132623731363032333932303734643237323661356162656534 Feb 9 21:39:21.140000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.140000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.140000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.140000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.140000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.140000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.140000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.140000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.140000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.140000 audit: BPF prog-id=112 op=LOAD Feb 9 21:39:21.140000 audit[3632]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c8168 items=0 ppid=3505 pid=3632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:39:21.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306132623731363032333932303734643237323661356162656534 Feb 9 21:39:21.268000 audit: BPF prog-id=112 op=UNLOAD Feb 9 21:39:21.268000 audit: BPF prog-id=111 op=UNLOAD Feb 9 21:39:21.268000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.268000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.268000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.268000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.268000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.268000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.268000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.268000 audit[3632]: AVC avc: denied { perfmon } for pid=3632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.268000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.268000 audit[3632]: AVC avc: denied { bpf } for pid=3632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:39:21.268000 audit: BPF prog-id=113 op=LOAD Feb 9 21:39:21.268000 audit[3632]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c8578 items=0 ppid=3505 pid=3632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:39:21.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306132623731363032333932303734643237323661356162656534 Feb 9 21:39:21.617436 env[1162]: time="2024-02-09T21:39:21.617412579Z" level=info msg="StartContainer for \"850a2b71602392074d2726a5abee456f2474a7e32c2d48474f235debd55b1016\" returns successfully" Feb 9 21:39:21.693036 kubelet[1542]: I0209 21:39:21.692913 1542 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-55b6cd655b-pdmv4" podStartSLOduration=889.090654374 podCreationTimestamp="2024-02-09 21:24:10 +0000 UTC" firstStartedPulling="2024-02-09 21:38:58.275566225 +0000 UTC m=+78.288338536" lastFinishedPulling="2024-02-09 21:39:20.87777519 +0000 UTC m=+100.890547570" observedRunningTime="2024-02-09 21:39:21.692337256 +0000 UTC m=+101.705109619" watchObservedRunningTime="2024-02-09 21:39:21.692863408 +0000 UTC m=+101.705635739" Feb 9 21:39:22.345285 kubelet[1542]: E0209 21:39:22.345174 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:23.346485 kubelet[1542]: E0209 21:39:23.346343 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:24.347659 kubelet[1542]: E0209 21:39:24.347575 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:25.348782 kubelet[1542]: E0209 21:39:25.348710 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:26.349918 kubelet[1542]: E0209 21:39:26.349802 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:27.350474 kubelet[1542]: E0209 21:39:27.350371 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:28.351233 kubelet[1542]: E0209 21:39:28.351155 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:29.351849 kubelet[1542]: E0209 21:39:29.351771 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:30.352877 kubelet[1542]: E0209 21:39:30.352734 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:31.353766 kubelet[1542]: E0209 21:39:31.353664 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:32.120982 systemd[1]: Started sshd@10-139.178.90.113:22-218.92.0.107:54504.service. Feb 9 21:39:32.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.113:22-218.92.0.107:54504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:32.148389 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 9 21:39:32.148448 kernel: audit: type=1130 audit(1707514772.120:812): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.113:22-218.92.0.107:54504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:32.354489 kubelet[1542]: E0209 21:39:32.354359 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:33.085094 sshd[3746]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 9 21:39:33.084000 audit[3746]: USER_AUTH pid=3746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:33.176625 kernel: audit: type=1100 audit(1707514773.084:813): pid=3746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:33.355376 kubelet[1542]: E0209 21:39:33.355145 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:34.355887 kubelet[1542]: E0209 21:39:34.355761 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:34.862416 sshd[3746]: Failed password for root from 218.92.0.107 port 54504 ssh2 Feb 9 21:39:35.355000 audit[3746]: USER_AUTH pid=3746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:35.357192 kubelet[1542]: E0209 21:39:35.357037 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:35.446631 kernel: audit: type=1100 audit(1707514775.355:814): pid=3746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:36.357980 kubelet[1542]: E0209 21:39:36.357867 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:37.073685 sshd[3746]: Failed password for root from 218.92.0.107 port 54504 ssh2 Feb 9 21:39:37.358225 kubelet[1542]: E0209 21:39:37.358008 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:37.627000 audit[3746]: USER_AUTH pid=3746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:37.719624 kernel: audit: type=1100 audit(1707514777.627:815): pid=3746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:38.358582 kubelet[1542]: E0209 21:39:38.358478 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:39.285125 sshd[3746]: Failed password for root from 218.92.0.107 port 54504 ssh2 Feb 9 21:39:39.359104 kubelet[1542]: E0209 21:39:39.358981 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:39.899434 sshd[3746]: Received disconnect from 218.92.0.107 port 54504:11: [preauth] Feb 9 21:39:39.899434 sshd[3746]: Disconnected from authenticating user root 218.92.0.107 port 54504 [preauth] Feb 9 21:39:39.899986 sshd[3746]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 9 21:39:39.902049 systemd[1]: sshd@10-139.178.90.113:22-218.92.0.107:54504.service: Deactivated successfully. Feb 9 21:39:39.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.113:22-218.92.0.107:54504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:39.994623 kernel: audit: type=1131 audit(1707514779.901:816): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.90.113:22-218.92.0.107:54504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:40.030493 systemd[1]: Started sshd@11-139.178.90.113:22-218.92.0.107:44123.service. Feb 9 21:39:40.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.113:22-218.92.0.107:44123 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:40.122637 kernel: audit: type=1130 audit(1707514780.029:817): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.113:22-218.92.0.107:44123 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:40.274178 kubelet[1542]: E0209 21:39:40.274079 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:40.294658 env[1162]: time="2024-02-09T21:39:40.294544510Z" level=info msg="StopPodSandbox for \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\"" Feb 9 21:39:40.360091 kubelet[1542]: E0209 21:39:40.360041 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:40.402941 env[1162]: 2024-02-09 21:39:40.363 [WARNING][3772] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"7ea80032-eead-46eb-aa24-12435448e0fa", ResourceVersion:"2388", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 24, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22", Pod:"coredns-5d78c9869d-5l82t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.115.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali82352b40ce7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:39:40.402941 env[1162]: 2024-02-09 21:39:40.363 [INFO][3772] k8s.go 578: Cleaning up netns ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:39:40.402941 env[1162]: 2024-02-09 21:39:40.363 [INFO][3772] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" iface="eth0" netns="" Feb 9 21:39:40.402941 env[1162]: 2024-02-09 21:39:40.363 [INFO][3772] k8s.go 585: Releasing IP address(es) ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:39:40.402941 env[1162]: 2024-02-09 21:39:40.363 [INFO][3772] utils.go 188: Calico CNI releasing IP address ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:39:40.402941 env[1162]: 2024-02-09 21:39:40.392 [INFO][3789] ipam_plugin.go 415: Releasing address using handleID ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" HandleID="k8s-pod-network.a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Workload="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:39:40.402941 env[1162]: 2024-02-09 21:39:40.392 [INFO][3789] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:39:40.402941 env[1162]: 2024-02-09 21:39:40.392 [INFO][3789] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:39:40.402941 env[1162]: 2024-02-09 21:39:40.399 [WARNING][3789] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" HandleID="k8s-pod-network.a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Workload="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:39:40.402941 env[1162]: 2024-02-09 21:39:40.399 [INFO][3789] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" HandleID="k8s-pod-network.a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Workload="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:39:40.402941 env[1162]: 2024-02-09 21:39:40.401 [INFO][3789] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:39:40.402941 env[1162]: 2024-02-09 21:39:40.402 [INFO][3772] k8s.go 591: Teardown processing complete. ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:39:40.403496 env[1162]: time="2024-02-09T21:39:40.402937165Z" level=info msg="TearDown network for sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\" successfully" Feb 9 21:39:40.403496 env[1162]: time="2024-02-09T21:39:40.402966856Z" level=info msg="StopPodSandbox for \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\" returns successfully" Feb 9 21:39:40.403496 env[1162]: time="2024-02-09T21:39:40.403414444Z" level=info msg="RemovePodSandbox for \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\"" Feb 9 21:39:40.403496 env[1162]: time="2024-02-09T21:39:40.403468014Z" level=info msg="Forcibly stopping sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\"" Feb 9 21:39:40.498073 env[1162]: 2024-02-09 21:39:40.440 [WARNING][3823] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"7ea80032-eead-46eb-aa24-12435448e0fa", ResourceVersion:"2388", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 24, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"a12f8e6be2426dd9374044d763775663ab33e6ba1660f04ddfd3f2b44f888f22", Pod:"coredns-5d78c9869d-5l82t", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.115.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali82352b40ce7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:39:40.498073 env[1162]: 2024-02-09 21:39:40.440 [INFO][3823] k8s.go 578: Cleaning up netns ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:39:40.498073 env[1162]: 2024-02-09 21:39:40.440 [INFO][3823] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" iface="eth0" netns="" Feb 9 21:39:40.498073 env[1162]: 2024-02-09 21:39:40.440 [INFO][3823] k8s.go 585: Releasing IP address(es) ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:39:40.498073 env[1162]: 2024-02-09 21:39:40.440 [INFO][3823] utils.go 188: Calico CNI releasing IP address ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:39:40.498073 env[1162]: 2024-02-09 21:39:40.482 [INFO][3836] ipam_plugin.go 415: Releasing address using handleID ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" HandleID="k8s-pod-network.a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Workload="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:39:40.498073 env[1162]: 2024-02-09 21:39:40.482 [INFO][3836] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:39:40.498073 env[1162]: 2024-02-09 21:39:40.482 [INFO][3836] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:39:40.498073 env[1162]: 2024-02-09 21:39:40.493 [WARNING][3836] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" HandleID="k8s-pod-network.a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Workload="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:39:40.498073 env[1162]: 2024-02-09 21:39:40.493 [INFO][3836] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" HandleID="k8s-pod-network.a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Workload="10.67.80.21-k8s-coredns--5d78c9869d--5l82t-eth0" Feb 9 21:39:40.498073 env[1162]: 2024-02-09 21:39:40.496 [INFO][3836] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:39:40.498073 env[1162]: 2024-02-09 21:39:40.497 [INFO][3823] k8s.go 591: Teardown processing complete. ContainerID="a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09" Feb 9 21:39:40.498073 env[1162]: time="2024-02-09T21:39:40.498057451Z" level=info msg="TearDown network for sandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\" successfully" Feb 9 21:39:40.499693 env[1162]: time="2024-02-09T21:39:40.499669791Z" level=info msg="RemovePodSandbox \"a75ea1f3e957dedca71a5824cb14105268d45356f52819e6b5735d5dff15bc09\" returns successfully" Feb 9 21:39:40.500127 env[1162]: time="2024-02-09T21:39:40.500101817Z" level=info msg="StopPodSandbox for \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\"" Feb 9 21:39:40.578468 env[1162]: 2024-02-09 21:39:40.539 [WARNING][3867] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-csi--node--driver--wqwwd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dfb34e95-52fb-45cb-bba0-97a341a445ca", ResourceVersion:"2360", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 37, 40, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4", Pod:"csi-node-driver-wqwwd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9de92d7fb74", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:39:40.578468 env[1162]: 2024-02-09 21:39:40.540 [INFO][3867] k8s.go 578: Cleaning up netns ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:39:40.578468 env[1162]: 2024-02-09 21:39:40.540 [INFO][3867] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" iface="eth0" netns="" Feb 9 21:39:40.578468 env[1162]: 2024-02-09 21:39:40.540 [INFO][3867] k8s.go 585: Releasing IP address(es) ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:39:40.578468 env[1162]: 2024-02-09 21:39:40.540 [INFO][3867] utils.go 188: Calico CNI releasing IP address ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:39:40.578468 env[1162]: 2024-02-09 21:39:40.557 [INFO][3885] ipam_plugin.go 415: Releasing address using handleID ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" HandleID="k8s-pod-network.f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Workload="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:39:40.578468 env[1162]: 2024-02-09 21:39:40.557 [INFO][3885] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:39:40.578468 env[1162]: 2024-02-09 21:39:40.557 [INFO][3885] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:39:40.578468 env[1162]: 2024-02-09 21:39:40.572 [WARNING][3885] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" HandleID="k8s-pod-network.f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Workload="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:39:40.578468 env[1162]: 2024-02-09 21:39:40.572 [INFO][3885] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" HandleID="k8s-pod-network.f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Workload="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:39:40.578468 env[1162]: 2024-02-09 21:39:40.575 [INFO][3885] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:39:40.578468 env[1162]: 2024-02-09 21:39:40.577 [INFO][3867] k8s.go 591: Teardown processing complete. ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:39:40.578468 env[1162]: time="2024-02-09T21:39:40.578430263Z" level=info msg="TearDown network for sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\" successfully" Feb 9 21:39:40.579846 env[1162]: time="2024-02-09T21:39:40.578484052Z" level=info msg="StopPodSandbox for \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\" returns successfully" Feb 9 21:39:40.579846 env[1162]: time="2024-02-09T21:39:40.578978185Z" level=info msg="RemovePodSandbox for \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\"" Feb 9 21:39:40.579846 env[1162]: time="2024-02-09T21:39:40.579020097Z" level=info msg="Forcibly stopping sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\"" Feb 9 21:39:40.692525 env[1162]: 2024-02-09 21:39:40.644 [WARNING][3918] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-csi--node--driver--wqwwd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dfb34e95-52fb-45cb-bba0-97a341a445ca", ResourceVersion:"2360", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 37, 40, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4", Pod:"csi-node-driver-wqwwd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9de92d7fb74", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:39:40.692525 env[1162]: 2024-02-09 21:39:40.644 [INFO][3918] k8s.go 578: Cleaning up netns ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:39:40.692525 env[1162]: 2024-02-09 21:39:40.644 [INFO][3918] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" iface="eth0" netns="" Feb 9 21:39:40.692525 env[1162]: 2024-02-09 21:39:40.644 [INFO][3918] k8s.go 585: Releasing IP address(es) ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:39:40.692525 env[1162]: 2024-02-09 21:39:40.644 [INFO][3918] utils.go 188: Calico CNI releasing IP address ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:39:40.692525 env[1162]: 2024-02-09 21:39:40.667 [INFO][3934] ipam_plugin.go 415: Releasing address using handleID ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" HandleID="k8s-pod-network.f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Workload="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:39:40.692525 env[1162]: 2024-02-09 21:39:40.667 [INFO][3934] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:39:40.692525 env[1162]: 2024-02-09 21:39:40.667 [INFO][3934] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:39:40.692525 env[1162]: 2024-02-09 21:39:40.684 [WARNING][3934] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" HandleID="k8s-pod-network.f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Workload="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:39:40.692525 env[1162]: 2024-02-09 21:39:40.684 [INFO][3934] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" HandleID="k8s-pod-network.f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Workload="10.67.80.21-k8s-csi--node--driver--wqwwd-eth0" Feb 9 21:39:40.692525 env[1162]: 2024-02-09 21:39:40.687 [INFO][3934] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:39:40.692525 env[1162]: 2024-02-09 21:39:40.690 [INFO][3918] k8s.go 591: Teardown processing complete. ContainerID="f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8" Feb 9 21:39:40.694020 env[1162]: time="2024-02-09T21:39:40.692570024Z" level=info msg="TearDown network for sandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\" successfully" Feb 9 21:39:40.695716 env[1162]: time="2024-02-09T21:39:40.695658370Z" level=info msg="RemovePodSandbox \"f6c9280962465291667d8570a668935034d6cee03d053ef2ef0f49d543e469b8\" returns successfully" Feb 9 21:39:40.696583 env[1162]: time="2024-02-09T21:39:40.696519992Z" level=info msg="StopPodSandbox for \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\"" Feb 9 21:39:40.817121 env[1162]: 2024-02-09 21:39:40.763 [WARNING][3965] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0", GenerateName:"calico-kube-controllers-55b6cd655b-", Namespace:"calico-system", SelfLink:"", UID:"f3d9b71e-d18e-43bd-86ac-aa6c18d2520e", ResourceVersion:"2465", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 24, 10, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55b6cd655b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5", Pod:"calico-kube-controllers-55b6cd655b-pdmv4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.115.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia0ada7d74fc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:39:40.817121 env[1162]: 2024-02-09 21:39:40.764 [INFO][3965] k8s.go 578: Cleaning up netns ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:39:40.817121 env[1162]: 2024-02-09 21:39:40.764 [INFO][3965] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" iface="eth0" netns="" Feb 9 21:39:40.817121 env[1162]: 2024-02-09 21:39:40.764 [INFO][3965] k8s.go 585: Releasing IP address(es) ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:39:40.817121 env[1162]: 2024-02-09 21:39:40.764 [INFO][3965] utils.go 188: Calico CNI releasing IP address ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:39:40.817121 env[1162]: 2024-02-09 21:39:40.797 [INFO][3983] ipam_plugin.go 415: Releasing address using handleID ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" HandleID="k8s-pod-network.99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Workload="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:39:40.817121 env[1162]: 2024-02-09 21:39:40.798 [INFO][3983] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:39:40.817121 env[1162]: 2024-02-09 21:39:40.798 [INFO][3983] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:39:40.817121 env[1162]: 2024-02-09 21:39:40.811 [WARNING][3983] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" HandleID="k8s-pod-network.99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Workload="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:39:40.817121 env[1162]: 2024-02-09 21:39:40.811 [INFO][3983] ipam_plugin.go 443: Releasing address using workloadID ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" HandleID="k8s-pod-network.99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Workload="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:39:40.817121 env[1162]: 2024-02-09 21:39:40.813 [INFO][3983] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:39:40.817121 env[1162]: 2024-02-09 21:39:40.815 [INFO][3965] k8s.go 591: Teardown processing complete. ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:39:40.818465 env[1162]: time="2024-02-09T21:39:40.817138582Z" level=info msg="TearDown network for sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\" successfully" Feb 9 21:39:40.818465 env[1162]: time="2024-02-09T21:39:40.817201080Z" level=info msg="StopPodSandbox for \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\" returns successfully" Feb 9 21:39:40.818465 env[1162]: time="2024-02-09T21:39:40.817936344Z" level=info msg="RemovePodSandbox for \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\"" Feb 9 21:39:40.818465 env[1162]: time="2024-02-09T21:39:40.818001538Z" level=info msg="Forcibly stopping sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\"" Feb 9 21:39:40.908014 env[1162]: 2024-02-09 21:39:40.871 [WARNING][4013] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0", GenerateName:"calico-kube-controllers-55b6cd655b-", Namespace:"calico-system", SelfLink:"", UID:"f3d9b71e-d18e-43bd-86ac-aa6c18d2520e", ResourceVersion:"2465", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 24, 10, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55b6cd655b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"5d75c3275cb1cc8d2479c10643b877aeadba8b877f0a85ef10c715e326e16bf5", Pod:"calico-kube-controllers-55b6cd655b-pdmv4", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.115.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia0ada7d74fc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:39:40.908014 env[1162]: 2024-02-09 21:39:40.871 [INFO][4013] k8s.go 578: Cleaning up netns ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:39:40.908014 env[1162]: 2024-02-09 21:39:40.871 [INFO][4013] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" iface="eth0" netns="" Feb 9 21:39:40.908014 env[1162]: 2024-02-09 21:39:40.871 [INFO][4013] k8s.go 585: Releasing IP address(es) ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:39:40.908014 env[1162]: 2024-02-09 21:39:40.871 [INFO][4013] utils.go 188: Calico CNI releasing IP address ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:39:40.908014 env[1162]: 2024-02-09 21:39:40.889 [INFO][4027] ipam_plugin.go 415: Releasing address using handleID ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" HandleID="k8s-pod-network.99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Workload="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:39:40.908014 env[1162]: 2024-02-09 21:39:40.889 [INFO][4027] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:39:40.908014 env[1162]: 2024-02-09 21:39:40.889 [INFO][4027] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:39:40.908014 env[1162]: 2024-02-09 21:39:40.903 [WARNING][4027] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" HandleID="k8s-pod-network.99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Workload="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:39:40.908014 env[1162]: 2024-02-09 21:39:40.903 [INFO][4027] ipam_plugin.go 443: Releasing address using workloadID ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" HandleID="k8s-pod-network.99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Workload="10.67.80.21-k8s-calico--kube--controllers--55b6cd655b--pdmv4-eth0" Feb 9 21:39:40.908014 env[1162]: 2024-02-09 21:39:40.906 [INFO][4027] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:39:40.908014 env[1162]: 2024-02-09 21:39:40.907 [INFO][4013] k8s.go 591: Teardown processing complete. ContainerID="99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25" Feb 9 21:39:40.908014 env[1162]: time="2024-02-09T21:39:40.907994492Z" level=info msg="TearDown network for sandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\" successfully" Feb 9 21:39:40.909419 env[1162]: time="2024-02-09T21:39:40.909399075Z" level=info msg="RemovePodSandbox \"99a46c8514fd36cf8ad57ab5efc55c8b74b3ac141b9e2e99f2b7e849eba4ed25\" returns successfully" Feb 9 21:39:40.909733 env[1162]: time="2024-02-09T21:39:40.909711200Z" level=info msg="StopPodSandbox for \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\"" Feb 9 21:39:40.925566 sshd[3755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 9 21:39:40.924000 audit[3755]: USER_AUTH pid=3755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:40.985571 env[1162]: 2024-02-09 21:39:40.947 [WARNING][4057] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e44a07f5-dda5-4492-9e95-0a3eaae03960", ResourceVersion:"2372", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 24, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4", Pod:"coredns-5d78c9869d-zbgjp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.115.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif7f4c8b4e08", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:39:40.985571 env[1162]: 2024-02-09 21:39:40.947 [INFO][4057] k8s.go 578: Cleaning up netns ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:39:40.985571 env[1162]: 2024-02-09 21:39:40.947 [INFO][4057] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" iface="eth0" netns="" Feb 9 21:39:40.985571 env[1162]: 2024-02-09 21:39:40.947 [INFO][4057] k8s.go 585: Releasing IP address(es) ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:39:40.985571 env[1162]: 2024-02-09 21:39:40.947 [INFO][4057] utils.go 188: Calico CNI releasing IP address ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:39:40.985571 env[1162]: 2024-02-09 21:39:40.967 [INFO][4075] ipam_plugin.go 415: Releasing address using handleID ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" HandleID="k8s-pod-network.32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Workload="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:39:40.985571 env[1162]: 2024-02-09 21:39:40.967 [INFO][4075] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:39:40.985571 env[1162]: 2024-02-09 21:39:40.967 [INFO][4075] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:39:40.985571 env[1162]: 2024-02-09 21:39:40.981 [WARNING][4075] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" HandleID="k8s-pod-network.32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Workload="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:39:40.985571 env[1162]: 2024-02-09 21:39:40.981 [INFO][4075] ipam_plugin.go 443: Releasing address using workloadID ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" HandleID="k8s-pod-network.32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Workload="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:39:40.985571 env[1162]: 2024-02-09 21:39:40.984 [INFO][4075] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:39:40.985571 env[1162]: 2024-02-09 21:39:40.984 [INFO][4057] k8s.go 591: Teardown processing complete. ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:39:40.985571 env[1162]: time="2024-02-09T21:39:40.985565523Z" level=info msg="TearDown network for sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\" successfully" Feb 9 21:39:40.985943 env[1162]: time="2024-02-09T21:39:40.985584480Z" level=info msg="StopPodSandbox for \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\" returns successfully" Feb 9 21:39:40.985943 env[1162]: time="2024-02-09T21:39:40.985870631Z" level=info msg="RemovePodSandbox for \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\"" Feb 9 21:39:40.985943 env[1162]: time="2024-02-09T21:39:40.985889549Z" level=info msg="Forcibly stopping sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\"" Feb 9 21:39:41.015515 kernel: audit: type=1100 audit(1707514780.924:818): pid=3755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:41.035476 env[1162]: 2024-02-09 21:39:41.013 [WARNING][4108] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"e44a07f5-dda5-4492-9e95-0a3eaae03960", ResourceVersion:"2372", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 24, 5, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"afce64e1acdb5bb0a399daaf17fa54145da47dbd4f72a59dcde1daa5dae59fa4", Pod:"coredns-5d78c9869d-zbgjp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.115.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif7f4c8b4e08", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:39:41.035476 env[1162]: 2024-02-09 21:39:41.013 [INFO][4108] k8s.go 578: Cleaning up netns ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:39:41.035476 env[1162]: 2024-02-09 21:39:41.013 [INFO][4108] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" iface="eth0" netns="" Feb 9 21:39:41.035476 env[1162]: 2024-02-09 21:39:41.013 [INFO][4108] k8s.go 585: Releasing IP address(es) ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:39:41.035476 env[1162]: 2024-02-09 21:39:41.013 [INFO][4108] utils.go 188: Calico CNI releasing IP address ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:39:41.035476 env[1162]: 2024-02-09 21:39:41.023 [INFO][4122] ipam_plugin.go 415: Releasing address using handleID ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" HandleID="k8s-pod-network.32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Workload="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:39:41.035476 env[1162]: 2024-02-09 21:39:41.023 [INFO][4122] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:39:41.035476 env[1162]: 2024-02-09 21:39:41.023 [INFO][4122] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:39:41.035476 env[1162]: 2024-02-09 21:39:41.032 [WARNING][4122] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" HandleID="k8s-pod-network.32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Workload="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:39:41.035476 env[1162]: 2024-02-09 21:39:41.032 [INFO][4122] ipam_plugin.go 443: Releasing address using workloadID ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" HandleID="k8s-pod-network.32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Workload="10.67.80.21-k8s-coredns--5d78c9869d--zbgjp-eth0" Feb 9 21:39:41.035476 env[1162]: 2024-02-09 21:39:41.034 [INFO][4122] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:39:41.035476 env[1162]: 2024-02-09 21:39:41.034 [INFO][4108] k8s.go 591: Teardown processing complete. ContainerID="32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219" Feb 9 21:39:41.035804 env[1162]: time="2024-02-09T21:39:41.035493419Z" level=info msg="TearDown network for sandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\" successfully" Feb 9 21:39:41.036679 env[1162]: time="2024-02-09T21:39:41.036667760Z" level=info msg="RemovePodSandbox \"32e2bb5aa18a93fea3fa5d1990f54920aa90146cba57b209107a9e9cace1d219\" returns successfully" Feb 9 21:39:41.361144 kubelet[1542]: E0209 21:39:41.361077 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:42.362426 kubelet[1542]: E0209 21:39:42.362308 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:43.363552 kubelet[1542]: E0209 21:39:43.363416 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:43.661606 sshd[3755]: Failed password for root from 218.92.0.107 port 44123 ssh2 Feb 9 21:39:44.364671 kubelet[1542]: E0209 21:39:44.364588 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:45.317000 audit[3755]: USER_AUTH pid=3755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:45.364776 kubelet[1542]: E0209 21:39:45.364763 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:45.409634 kernel: audit: type=1100 audit(1707514785.317:819): pid=3755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:46.365888 kubelet[1542]: E0209 21:39:46.365807 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:47.075906 sshd[3755]: Failed password for root from 218.92.0.107 port 44123 ssh2 Feb 9 21:39:47.367032 kubelet[1542]: E0209 21:39:47.366810 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:47.581000 audit[3755]: USER_AUTH pid=3755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:47.673624 kernel: audit: type=1100 audit(1707514787.581:820): pid=3755 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:48.367585 kubelet[1542]: E0209 21:39:48.367507 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:49.279525 sshd[3755]: Failed password for root from 218.92.0.107 port 44123 ssh2 Feb 9 21:39:49.367870 kubelet[1542]: E0209 21:39:49.367803 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:49.847234 sshd[3755]: Received disconnect from 218.92.0.107 port 44123:11: [preauth] Feb 9 21:39:49.847234 sshd[3755]: Disconnected from authenticating user root 218.92.0.107 port 44123 [preauth] Feb 9 21:39:49.847754 sshd[3755]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 9 21:39:49.849797 systemd[1]: sshd@11-139.178.90.113:22-218.92.0.107:44123.service: Deactivated successfully. Feb 9 21:39:49.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.113:22-218.92.0.107:44123 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:49.942639 kernel: audit: type=1131 audit(1707514789.848:821): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.90.113:22-218.92.0.107:44123 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:49.991668 systemd[1]: Started sshd@12-139.178.90.113:22-218.92.0.107:49632.service. Feb 9 21:39:49.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.113:22-218.92.0.107:49632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:50.082622 kernel: audit: type=1130 audit(1707514789.990:822): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.113:22-218.92.0.107:49632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:50.369067 kubelet[1542]: E0209 21:39:50.368954 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:50.895058 sshd[4147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 9 21:39:50.893000 audit[4147]: USER_AUTH pid=4147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:50.985628 kernel: audit: type=1100 audit(1707514790.893:823): pid=4147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:51.369404 kubelet[1542]: E0209 21:39:51.369294 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:52.370350 kubelet[1542]: E0209 21:39:52.370240 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:53.003619 sshd[4147]: Failed password for root from 218.92.0.107 port 49632 ssh2 Feb 9 21:39:53.156000 audit[4147]: USER_AUTH pid=4147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:53.248625 kernel: audit: type=1100 audit(1707514793.156:824): pid=4147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:53.370961 kubelet[1542]: E0209 21:39:53.370755 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:54.372020 kubelet[1542]: E0209 21:39:54.371902 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:54.679311 sshd[4147]: Failed password for root from 218.92.0.107 port 49632 ssh2 Feb 9 21:39:55.372553 kubelet[1542]: E0209 21:39:55.372423 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:55.420000 audit[4147]: USER_AUTH pid=4147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:55.511498 kernel: audit: type=1100 audit(1707514795.420:825): pid=4147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.107 addr=218.92.0.107 terminal=ssh res=failed' Feb 9 21:39:56.372987 kubelet[1542]: E0209 21:39:56.372887 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:57.218319 sshd[4147]: Failed password for root from 218.92.0.107 port 49632 ssh2 Feb 9 21:39:57.374019 kubelet[1542]: E0209 21:39:57.373902 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:57.684005 sshd[4147]: Received disconnect from 218.92.0.107 port 49632:11: [preauth] Feb 9 21:39:57.684005 sshd[4147]: Disconnected from authenticating user root 218.92.0.107 port 49632 [preauth] Feb 9 21:39:57.684567 sshd[4147]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.107 user=root Feb 9 21:39:57.686646 systemd[1]: sshd@12-139.178.90.113:22-218.92.0.107:49632.service: Deactivated successfully. Feb 9 21:39:57.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.113:22-218.92.0.107:49632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:57.779637 kernel: audit: type=1131 audit(1707514797.686:826): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.90.113:22-218.92.0.107:49632 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:39:58.374232 kubelet[1542]: E0209 21:39:58.374133 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:39:59.374980 kubelet[1542]: E0209 21:39:59.374872 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:00.274786 kubelet[1542]: E0209 21:40:00.274681 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:00.375882 kubelet[1542]: E0209 21:40:00.375797 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:01.376472 kubelet[1542]: E0209 21:40:01.376326 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:02.377240 kubelet[1542]: E0209 21:40:02.377134 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:03.377483 kubelet[1542]: E0209 21:40:03.377359 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:04.378333 kubelet[1542]: E0209 21:40:04.378240 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:05.379107 kubelet[1542]: E0209 21:40:05.378998 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:06.379515 kubelet[1542]: E0209 21:40:06.379408 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:07.380541 kubelet[1542]: E0209 21:40:07.380406 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:08.380985 kubelet[1542]: E0209 21:40:08.380876 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:09.382229 kubelet[1542]: E0209 21:40:09.382118 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:10.382349 kubelet[1542]: E0209 21:40:10.382294 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:11.383206 kubelet[1542]: E0209 21:40:11.383094 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:12.383719 kubelet[1542]: E0209 21:40:12.383615 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:13.384411 kubelet[1542]: E0209 21:40:13.384296 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:14.384542 kubelet[1542]: E0209 21:40:14.384479 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:15.385629 kubelet[1542]: E0209 21:40:15.385428 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:16.385651 kubelet[1542]: E0209 21:40:16.385584 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:17.386150 kubelet[1542]: E0209 21:40:17.386081 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:18.386808 kubelet[1542]: E0209 21:40:18.386692 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:19.387403 kubelet[1542]: E0209 21:40:19.387336 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:20.274822 kubelet[1542]: E0209 21:40:20.274753 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:20.387683 kubelet[1542]: E0209 21:40:20.387615 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:21.388032 kubelet[1542]: E0209 21:40:21.387958 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:22.389161 kubelet[1542]: E0209 21:40:22.389092 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:23.389843 kubelet[1542]: E0209 21:40:23.389744 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:24.390864 kubelet[1542]: E0209 21:40:24.390754 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:25.392107 kubelet[1542]: E0209 21:40:25.391995 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:26.393202 kubelet[1542]: E0209 21:40:26.393127 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:27.393819 kubelet[1542]: E0209 21:40:27.393740 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:28.394532 kubelet[1542]: E0209 21:40:28.394422 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:29.395839 kubelet[1542]: E0209 21:40:29.395756 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:30.396653 kubelet[1542]: E0209 21:40:30.396578 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:31.397853 kubelet[1542]: E0209 21:40:31.397771 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:32.398127 kubelet[1542]: E0209 21:40:32.398012 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:33.398882 kubelet[1542]: E0209 21:40:33.398763 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:34.399862 kubelet[1542]: E0209 21:40:34.399751 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:35.401027 kubelet[1542]: E0209 21:40:35.400909 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:36.402083 kubelet[1542]: E0209 21:40:36.401968 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:37.402342 kubelet[1542]: E0209 21:40:37.402263 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:38.403278 kubelet[1542]: E0209 21:40:38.403206 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:39.404197 kubelet[1542]: E0209 21:40:39.404119 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:40.274197 kubelet[1542]: E0209 21:40:40.274116 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:40.404519 kubelet[1542]: E0209 21:40:40.404421 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:41.405674 kubelet[1542]: E0209 21:40:41.405554 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:42.406495 kubelet[1542]: E0209 21:40:42.406393 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:43.406736 kubelet[1542]: E0209 21:40:43.406664 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:44.407436 kubelet[1542]: E0209 21:40:44.407306 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:45.408544 kubelet[1542]: E0209 21:40:45.408410 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:46.409667 kubelet[1542]: E0209 21:40:46.409559 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:46.962966 kubelet[1542]: I0209 21:40:46.962906 1542 topology_manager.go:212] "Topology Admit Handler" Feb 9 21:40:46.975375 systemd[1]: Created slice kubepods-besteffort-pod2f25cea6_9acf_4d5b_b553_4facf400382d.slice. Feb 9 21:40:47.012793 kubelet[1542]: I0209 21:40:47.012734 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zjg5m\" (UniqueName: \"kubernetes.io/projected/2f25cea6-9acf-4d5b-b553-4facf400382d-kube-api-access-zjg5m\") pod \"nginx-deployment-845c78c8b9-l8zpd\" (UID: \"2f25cea6-9acf-4d5b-b553-4facf400382d\") " pod="default/nginx-deployment-845c78c8b9-l8zpd" Feb 9 21:40:47.277862 env[1162]: time="2024-02-09T21:40:47.277720028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-l8zpd,Uid:2f25cea6-9acf-4d5b-b553-4facf400382d,Namespace:default,Attempt:0,}" Feb 9 21:40:47.410071 kubelet[1542]: E0209 21:40:47.410011 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:47.415549 systemd-networkd[1013]: cali8ab50d8df53: Link UP Feb 9 21:40:47.473069 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 21:40:47.473111 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8ab50d8df53: link becomes ready Feb 9 21:40:47.473133 systemd-networkd[1013]: cali8ab50d8df53: Gained carrier Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.316 [INFO][4294] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-eth0 nginx-deployment-845c78c8b9- default 2f25cea6-9acf-4d5b-b553-4facf400382d 2648 0 2024-02-09 21:40:46 +0000 UTC <nil> <nil> map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.21 nginx-deployment-845c78c8b9-l8zpd eth0 default [] [] [kns.default ksa.default.default] cali8ab50d8df53 [] []}} ContainerID="d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" Namespace="default" Pod="nginx-deployment-845c78c8b9-l8zpd" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-" Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.316 [INFO][4294] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" Namespace="default" Pod="nginx-deployment-845c78c8b9-l8zpd" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-eth0" Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.337 [INFO][4313] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" HandleID="k8s-pod-network.d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" Workload="10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-eth0" Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.356 [INFO][4313] ipam_plugin.go 268: Auto assigning IP ContainerID="d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" HandleID="k8s-pod-network.d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" Workload="10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003a20e0), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.21", "pod":"nginx-deployment-845c78c8b9-l8zpd", "timestamp":"2024-02-09 21:40:47.337767462 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.356 [INFO][4313] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.356 [INFO][4313] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.356 [INFO][4313] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.360 [INFO][4313] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" host="10.67.80.21" Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.367 [INFO][4313] ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.375 [INFO][4313] ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.379 [INFO][4313] ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.385 [INFO][4313] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.385 [INFO][4313] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" host="10.67.80.21" Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.389 [INFO][4313] ipam.go 1682: Creating new handle: k8s-pod-network.d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036 Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.396 [INFO][4313] ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" host="10.67.80.21" Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.407 [INFO][4313] ipam.go 1216: Successfully claimed IPs: [192.168.115.5/26] block=192.168.115.0/26 handle="k8s-pod-network.d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" host="10.67.80.21" Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.407 [INFO][4313] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.5/26] handle="k8s-pod-network.d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" host="10.67.80.21" Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.408 [INFO][4313] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:40:47.481683 env[1162]: 2024-02-09 21:40:47.408 [INFO][4313] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.115.5/26] IPv6=[] ContainerID="d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" HandleID="k8s-pod-network.d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" Workload="10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-eth0" Feb 9 21:40:47.482120 env[1162]: 2024-02-09 21:40:47.411 [INFO][4294] k8s.go 385: Populated endpoint ContainerID="d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" Namespace="default" Pod="nginx-deployment-845c78c8b9-l8zpd" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"2f25cea6-9acf-4d5b-b553-4facf400382d", ResourceVersion:"2648", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 40, 46, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-l8zpd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8ab50d8df53", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:40:47.482120 env[1162]: 2024-02-09 21:40:47.412 [INFO][4294] k8s.go 386: Calico CNI using IPs: [192.168.115.5/32] ContainerID="d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" Namespace="default" Pod="nginx-deployment-845c78c8b9-l8zpd" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-eth0" Feb 9 21:40:47.482120 env[1162]: 2024-02-09 21:40:47.412 [INFO][4294] dataplane_linux.go 68: Setting the host side veth name to cali8ab50d8df53 ContainerID="d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" Namespace="default" Pod="nginx-deployment-845c78c8b9-l8zpd" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-eth0" Feb 9 21:40:47.482120 env[1162]: 2024-02-09 21:40:47.473 [INFO][4294] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" Namespace="default" Pod="nginx-deployment-845c78c8b9-l8zpd" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-eth0" Feb 9 21:40:47.482120 env[1162]: 2024-02-09 21:40:47.473 [INFO][4294] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" Namespace="default" Pod="nginx-deployment-845c78c8b9-l8zpd" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"2f25cea6-9acf-4d5b-b553-4facf400382d", ResourceVersion:"2648", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 40, 46, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036", Pod:"nginx-deployment-845c78c8b9-l8zpd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.115.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8ab50d8df53", MAC:"2a:4a:3b:ea:74:2b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:40:47.482120 env[1162]: 2024-02-09 21:40:47.480 [INFO][4294] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036" Namespace="default" Pod="nginx-deployment-845c78c8b9-l8zpd" WorkloadEndpoint="10.67.80.21-k8s-nginx--deployment--845c78c8b9--l8zpd-eth0" Feb 9 21:40:47.486912 env[1162]: time="2024-02-09T21:40:47.486874176Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:40:47.486912 env[1162]: time="2024-02-09T21:40:47.486895607Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:40:47.486912 env[1162]: time="2024-02-09T21:40:47.486902335Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:40:47.487035 env[1162]: time="2024-02-09T21:40:47.486961537Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036 pid=4350 runtime=io.containerd.runc.v2 Feb 9 21:40:47.489000 audit[4361]: NETFILTER_CFG table=filter:81 family=2 entries=58 op=nft_register_chain pid=4361 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 21:40:47.505568 systemd[1]: Started cri-containerd-d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036.scope. Feb 9 21:40:47.489000 audit[4361]: SYSCALL arch=c000003e syscall=46 success=yes exit=27480 a0=3 a1=7fff34bbb370 a2=0 a3=7fff34bbb35c items=0 ppid=2597 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:40:47.645808 kernel: audit: type=1325 audit(1707514847.489:827): table=filter:81 family=2 entries=58 op=nft_register_chain pid=4361 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 21:40:47.645863 kernel: audit: type=1300 audit(1707514847.489:827): arch=c000003e syscall=46 success=yes exit=27480 a0=3 a1=7fff34bbb370 a2=0 a3=7fff34bbb35c items=0 ppid=2597 pid=4361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:40:47.645880 kernel: audit: type=1327 audit(1707514847.489:827): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 21:40:47.489000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 21:40:47.707417 kernel: audit: type=1400 audit(1707514847.555:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.770531 kernel: audit: type=1400 audit(1707514847.555:829): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.833693 kernel: audit: type=1400 audit(1707514847.555:830): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.896833 kernel: audit: type=1400 audit(1707514847.555:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.960307 kernel: audit: type=1400 audit(1707514847.555:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:48.023839 kernel: audit: type=1400 audit(1707514847.555:833): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:48.150833 kernel: audit: type=1400 audit(1707514847.555:834): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.706000 audit: BPF prog-id=114 op=LOAD Feb 9 21:40:47.707000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.707000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4350 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:40:47.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434366533353963333839666261396635323037346363646134333061 Feb 9 21:40:47.707000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.707000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4350 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:40:47.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434366533353963333839666261396635323037346363646134333061 Feb 9 21:40:47.707000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.707000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.707000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.707000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.707000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.707000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.707000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.707000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.707000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.707000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.707000 audit: BPF prog-id=115 op=LOAD Feb 9 21:40:47.707000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00023ac10 items=0 ppid=4350 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:40:47.707000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434366533353963333839666261396635323037346363646134333061 Feb 9 21:40:47.833000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.833000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.833000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.833000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.833000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.833000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.833000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.833000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.833000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.833000 audit: BPF prog-id=116 op=LOAD Feb 9 21:40:47.833000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00023ac58 items=0 ppid=4350 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:40:47.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434366533353963333839666261396635323037346363646134333061 Feb 9 21:40:47.959000 audit: BPF prog-id=116 op=UNLOAD Feb 9 21:40:47.959000 audit: BPF prog-id=115 op=UNLOAD Feb 9 21:40:47.959000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.959000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.959000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.959000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.959000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.959000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.959000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.959000 audit[4360]: AVC avc: denied { perfmon } for pid=4360 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.959000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.959000 audit[4360]: AVC avc: denied { bpf } for pid=4360 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:40:47.959000 audit: BPF prog-id=117 op=LOAD Feb 9 21:40:47.959000 audit[4360]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00023b068 items=0 ppid=4350 pid=4360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:40:47.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434366533353963333839666261396635323037346363646134333061 Feb 9 21:40:48.167374 env[1162]: time="2024-02-09T21:40:48.167351654Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-l8zpd,Uid:2f25cea6-9acf-4d5b-b553-4facf400382d,Namespace:default,Attempt:0,} returns sandbox id \"d46e359c389fba9f52074ccda430a88525a000a5e686a0534572015cf47f0036\"" Feb 9 21:40:48.410862 kubelet[1542]: E0209 21:40:48.410650 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:49.056785 systemd-networkd[1013]: cali8ab50d8df53: Gained IPv6LL Feb 9 21:40:49.411517 kubelet[1542]: E0209 21:40:49.411256 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:50.411863 kubelet[1542]: E0209 21:40:50.411738 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:51.412327 kubelet[1542]: E0209 21:40:51.412213 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:52.412370 kubelet[1542]: E0209 21:40:52.412314 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:53.413271 kubelet[1542]: E0209 21:40:53.413152 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:54.413747 kubelet[1542]: E0209 21:40:54.413640 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:55.414018 kubelet[1542]: E0209 21:40:55.413895 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:56.414261 kubelet[1542]: E0209 21:40:56.414147 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:57.415100 kubelet[1542]: E0209 21:40:57.414992 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:58.415765 kubelet[1542]: E0209 21:40:58.415651 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:40:59.416466 kubelet[1542]: E0209 21:40:59.416337 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:00.274606 kubelet[1542]: E0209 21:41:00.274496 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:00.416714 kubelet[1542]: E0209 21:41:00.416592 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:01.417180 kubelet[1542]: E0209 21:41:01.417058 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:02.417438 kubelet[1542]: E0209 21:41:02.417325 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:03.418829 kubelet[1542]: E0209 21:41:03.418712 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:04.419217 kubelet[1542]: E0209 21:41:04.419106 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:05.419420 kubelet[1542]: E0209 21:41:05.419312 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:06.419729 kubelet[1542]: E0209 21:41:06.419620 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:07.420109 kubelet[1542]: E0209 21:41:07.420000 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:08.420276 kubelet[1542]: E0209 21:41:08.420171 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:09.421604 kubelet[1542]: E0209 21:41:09.421479 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:10.421961 kubelet[1542]: E0209 21:41:10.421842 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:11.422680 kubelet[1542]: E0209 21:41:11.422575 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:12.423517 kubelet[1542]: E0209 21:41:12.423405 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:13.424040 kubelet[1542]: E0209 21:41:13.423941 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:14.425033 kubelet[1542]: E0209 21:41:14.424950 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:15.426170 kubelet[1542]: E0209 21:41:15.426061 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:16.427409 kubelet[1542]: E0209 21:41:16.427288 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:17.427850 kubelet[1542]: E0209 21:41:17.427743 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:18.428756 kubelet[1542]: E0209 21:41:18.428654 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:19.429489 kubelet[1542]: E0209 21:41:19.429359 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:20.274393 kubelet[1542]: E0209 21:41:20.274309 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:20.430293 kubelet[1542]: E0209 21:41:20.430177 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:21.431437 kubelet[1542]: E0209 21:41:21.431317 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:22.432424 kubelet[1542]: E0209 21:41:22.432306 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:23.432767 kubelet[1542]: E0209 21:41:23.432657 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:24.433634 kubelet[1542]: E0209 21:41:24.433508 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:25.434626 kubelet[1542]: E0209 21:41:25.434525 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:26.435247 kubelet[1542]: E0209 21:41:26.435134 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:27.435499 kubelet[1542]: E0209 21:41:27.435354 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:28.436455 kubelet[1542]: E0209 21:41:28.436334 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:29.436706 kubelet[1542]: E0209 21:41:29.436596 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:30.437635 kubelet[1542]: E0209 21:41:30.437565 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:31.438107 kubelet[1542]: E0209 21:41:31.438028 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:32.438989 kubelet[1542]: E0209 21:41:32.438884 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:33.439570 kubelet[1542]: E0209 21:41:33.439495 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:34.439846 kubelet[1542]: E0209 21:41:34.439795 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:35.440993 kubelet[1542]: E0209 21:41:35.440884 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:36.441149 kubelet[1542]: E0209 21:41:36.441040 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:37.442381 kubelet[1542]: E0209 21:41:37.442273 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:38.443172 kubelet[1542]: E0209 21:41:38.443055 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:39.443920 kubelet[1542]: E0209 21:41:39.443813 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:40.274277 kubelet[1542]: E0209 21:41:40.274167 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:40.444760 kubelet[1542]: E0209 21:41:40.444653 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:41.445338 kubelet[1542]: E0209 21:41:41.445228 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:42.446371 kubelet[1542]: E0209 21:41:42.446270 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:43.446774 kubelet[1542]: E0209 21:41:43.446661 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:44.446998 kubelet[1542]: E0209 21:41:44.446892 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:45.447475 kubelet[1542]: E0209 21:41:45.447261 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:46.448206 kubelet[1542]: E0209 21:41:46.448086 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:47.448493 kubelet[1542]: E0209 21:41:47.448386 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:48.449391 kubelet[1542]: E0209 21:41:48.449327 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:49.450504 kubelet[1542]: E0209 21:41:49.450396 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:50.451213 kubelet[1542]: E0209 21:41:50.451147 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:51.451988 kubelet[1542]: E0209 21:41:51.451912 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:52.452839 kubelet[1542]: E0209 21:41:52.452760 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:53.453264 kubelet[1542]: E0209 21:41:53.453152 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:54.453691 kubelet[1542]: E0209 21:41:54.453583 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:54.995267 systemd[1]: Started sshd@13-139.178.90.113:22-218.92.0.33:19356.service. Feb 9 21:41:54.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.113:22-218.92.0.33:19356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:41:55.022557 kernel: kauditd_printk_skb: 50 callbacks suppressed Feb 9 21:41:55.022655 kernel: audit: type=1130 audit(1707514914.993:846): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.113:22-218.92.0.33:19356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:41:55.148251 sshd[4543]: Unable to negotiate with 218.92.0.33 port 19356: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth] Feb 9 21:41:55.148744 systemd[1]: sshd@13-139.178.90.113:22-218.92.0.33:19356.service: Deactivated successfully. Feb 9 21:41:55.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.113:22-218.92.0.33:19356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:41:55.237652 kernel: audit: type=1131 audit(1707514915.147:847): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.90.113:22-218.92.0.33:19356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:41:55.453864 kubelet[1542]: E0209 21:41:55.453788 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:56.454008 kubelet[1542]: E0209 21:41:56.453931 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:57.455001 kubelet[1542]: E0209 21:41:57.454884 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:58.455826 kubelet[1542]: E0209 21:41:58.455747 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:41:59.456766 kubelet[1542]: E0209 21:41:59.456651 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:00.275037 kubelet[1542]: E0209 21:42:00.274924 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:00.457889 kubelet[1542]: E0209 21:42:00.457760 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:01.458184 kubelet[1542]: E0209 21:42:01.458083 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:02.459053 kubelet[1542]: E0209 21:42:02.458935 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:03.459296 kubelet[1542]: E0209 21:42:03.459182 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:04.459493 kubelet[1542]: E0209 21:42:04.459379 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:05.459971 kubelet[1542]: E0209 21:42:05.459858 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:06.461128 kubelet[1542]: E0209 21:42:06.461025 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:07.461474 kubelet[1542]: E0209 21:42:07.461340 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:08.461641 kubelet[1542]: E0209 21:42:08.461530 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:09.461809 kubelet[1542]: E0209 21:42:09.461697 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:10.462857 kubelet[1542]: E0209 21:42:10.462747 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:11.463742 kubelet[1542]: E0209 21:42:11.463634 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:12.464905 kubelet[1542]: E0209 21:42:12.464795 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:13.465055 kubelet[1542]: E0209 21:42:13.464952 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:14.466006 kubelet[1542]: E0209 21:42:14.465893 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:15.467020 kubelet[1542]: E0209 21:42:15.466777 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:16.467734 kubelet[1542]: E0209 21:42:16.467619 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:17.468877 kubelet[1542]: E0209 21:42:17.468763 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:18.469907 kubelet[1542]: E0209 21:42:18.469796 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:19.470472 kubelet[1542]: E0209 21:42:19.470338 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:20.275094 kubelet[1542]: E0209 21:42:20.274988 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:20.471518 kubelet[1542]: E0209 21:42:20.471410 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:21.471761 kubelet[1542]: E0209 21:42:21.471658 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:22.472825 kubelet[1542]: E0209 21:42:22.472717 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:23.473815 kubelet[1542]: E0209 21:42:23.473709 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:24.474302 kubelet[1542]: E0209 21:42:24.474226 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:25.474597 kubelet[1542]: E0209 21:42:25.474541 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:26.475312 kubelet[1542]: E0209 21:42:26.475197 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:27.475558 kubelet[1542]: E0209 21:42:27.475385 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:28.476253 kubelet[1542]: E0209 21:42:28.476151 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:29.477003 kubelet[1542]: E0209 21:42:29.476856 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:30.477888 kubelet[1542]: E0209 21:42:30.477772 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:31.479005 kubelet[1542]: E0209 21:42:31.478892 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:32.479659 kubelet[1542]: E0209 21:42:32.479544 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:33.479996 kubelet[1542]: E0209 21:42:33.479874 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:34.480393 kubelet[1542]: E0209 21:42:34.480278 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:35.480810 kubelet[1542]: E0209 21:42:35.480696 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:36.481120 kubelet[1542]: E0209 21:42:36.481010 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:37.481504 kubelet[1542]: E0209 21:42:37.481403 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:38.482387 kubelet[1542]: E0209 21:42:38.482265 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:39.482612 kubelet[1542]: E0209 21:42:39.482582 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:39.989145 env[1162]: time="2024-02-09T21:42:39.989090119Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:42:39.989720 env[1162]: time="2024-02-09T21:42:39.989670045Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:42:39.990412 env[1162]: time="2024-02-09T21:42:39.990370658Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:42:39.991158 env[1162]: time="2024-02-09T21:42:39.991093172Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 21:42:39.991463 env[1162]: time="2024-02-09T21:42:39.991428701Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 21:42:39.992062 env[1162]: time="2024-02-09T21:42:39.992029717Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 21:42:39.992740 env[1162]: time="2024-02-09T21:42:39.992708013Z" level=info msg="CreateContainer within sandbox \"0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 21:42:39.997257 env[1162]: time="2024-02-09T21:42:39.997215111Z" level=info msg="CreateContainer within sandbox \"0c7bfb5a9631f3d1638eb8492ed8f95ed9d04b9aaa64cb70c26e0c6636b374c4\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"dc13fa2fa062942802f920538c7ed541368ec708b34c2d83cb268b8b23c08d1d\"" Feb 9 21:42:39.997414 env[1162]: time="2024-02-09T21:42:39.997404067Z" level=info msg="StartContainer for \"dc13fa2fa062942802f920538c7ed541368ec708b34c2d83cb268b8b23c08d1d\"" Feb 9 21:42:40.025360 systemd[1]: Started cri-containerd-dc13fa2fa062942802f920538c7ed541368ec708b34c2d83cb268b8b23c08d1d.scope. Feb 9 21:42:40.032000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.032000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3119 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:42:40.191488 kernel: audit: type=1400 audit(1707514960.032:848): avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.191527 kernel: audit: type=1300 audit(1707514960.032:848): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3119 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:42:40.191544 kernel: audit: type=1327 audit(1707514960.032:848): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313366613266613036323934323830326639323035333863376564 Feb 9 21:42:40.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313366613266613036323934323830326639323035333863376564 Feb 9 21:42:40.274855 kubelet[1542]: E0209 21:42:40.274816 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:40.283629 kernel: audit: type=1400 audit(1707514960.032:849): avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.032000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.346432 kernel: audit: type=1400 audit(1707514960.032:849): avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.032000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.032000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.472004 kernel: audit: type=1400 audit(1707514960.032:849): avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.472044 kernel: audit: type=1400 audit(1707514960.032:849): avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.032000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.483233 kubelet[1542]: E0209 21:42:40.483194 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:40.535161 kernel: audit: type=1400 audit(1707514960.032:849): avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.032000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.598520 kernel: audit: type=1400 audit(1707514960.032:849): avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.032000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.611219 env[1162]: time="2024-02-09T21:42:40.611170338Z" level=info msg="StartContainer for \"dc13fa2fa062942802f920538c7ed541368ec708b34c2d83cb268b8b23c08d1d\" returns successfully" Feb 9 21:42:40.662781 kernel: audit: type=1400 audit(1707514960.032:849): avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.032000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.032000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.032000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.032000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.032000 audit: BPF prog-id=118 op=LOAD Feb 9 21:42:40.032000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002dfbe0 items=0 ppid=3119 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:42:40.032000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313366613266613036323934323830326639323035333863376564 Feb 9 21:42:40.191000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.191000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.191000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.191000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.191000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.191000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.191000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.191000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.191000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.191000 audit: BPF prog-id=119 op=LOAD Feb 9 21:42:40.191000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002dfc28 items=0 ppid=3119 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:42:40.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313366613266613036323934323830326639323035333863376564 Feb 9 21:42:40.345000 audit: BPF prog-id=119 op=UNLOAD Feb 9 21:42:40.346000 audit: BPF prog-id=118 op=UNLOAD Feb 9 21:42:40.346000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.346000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.346000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.346000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.346000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.346000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.346000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.346000 audit[4673]: AVC avc: denied { perfmon } for pid=4673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.346000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.346000 audit[4673]: AVC avc: denied { bpf } for pid=4673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:42:40.346000 audit: BPF prog-id=120 op=LOAD Feb 9 21:42:40.346000 audit[4673]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002dfcb8 items=0 ppid=3119 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:42:40.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463313366613266613036323934323830326639323035333863376564 Feb 9 21:42:41.295073 kubelet[1542]: I0209 21:42:41.294979 1542 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-wqwwd" podStartSLOduration=73.926022176 podCreationTimestamp="2024-02-09 21:37:40 +0000 UTC" firstStartedPulling="2024-02-09 21:38:52.622901946 +0000 UTC m=+72.635674260" lastFinishedPulling="2024-02-09 21:42:39.991777119 +0000 UTC m=+300.004549433" observedRunningTime="2024-02-09 21:42:41.294636693 +0000 UTC m=+301.307409069" watchObservedRunningTime="2024-02-09 21:42:41.294897349 +0000 UTC m=+301.307669707" Feb 9 21:42:41.484054 kubelet[1542]: E0209 21:42:41.483981 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:41.496094 kubelet[1542]: I0209 21:42:41.495995 1542 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 21:42:41.496094 kubelet[1542]: I0209 21:42:41.496086 1542 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 21:42:42.485313 kubelet[1542]: E0209 21:42:42.485213 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:43.486324 kubelet[1542]: E0209 21:42:43.486223 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:44.487195 kubelet[1542]: E0209 21:42:44.487088 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:45.487929 kubelet[1542]: E0209 21:42:45.487820 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:46.489317 kubelet[1542]: E0209 21:42:46.489192 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:47.489599 kubelet[1542]: E0209 21:42:47.489517 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:48.490302 kubelet[1542]: E0209 21:42:48.490180 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:49.490682 kubelet[1542]: E0209 21:42:49.490608 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:50.491772 kubelet[1542]: E0209 21:42:50.491660 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:51.492243 kubelet[1542]: E0209 21:42:51.492135 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:52.492385 kubelet[1542]: E0209 21:42:52.492279 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:53.493353 kubelet[1542]: E0209 21:42:53.493239 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:54.493871 kubelet[1542]: E0209 21:42:54.493762 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:55.495035 kubelet[1542]: E0209 21:42:55.494925 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:56.495899 kubelet[1542]: E0209 21:42:56.495747 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:57.496161 kubelet[1542]: E0209 21:42:57.496049 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:58.497380 kubelet[1542]: E0209 21:42:58.497273 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:42:59.497999 kubelet[1542]: E0209 21:42:59.497892 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:00.275094 kubelet[1542]: E0209 21:43:00.274987 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:00.498866 kubelet[1542]: E0209 21:43:00.498813 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:01.499534 kubelet[1542]: E0209 21:43:01.499415 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:02.500666 kubelet[1542]: E0209 21:43:02.500561 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:03.501822 kubelet[1542]: E0209 21:43:03.501704 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:04.502250 kubelet[1542]: E0209 21:43:04.502138 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:05.503063 kubelet[1542]: E0209 21:43:05.502957 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:06.503684 kubelet[1542]: E0209 21:43:06.503574 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:07.503999 kubelet[1542]: E0209 21:43:07.503870 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:08.504139 kubelet[1542]: E0209 21:43:08.504027 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:09.504297 kubelet[1542]: E0209 21:43:09.504180 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:10.504485 kubelet[1542]: E0209 21:43:10.504382 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:11.505553 kubelet[1542]: E0209 21:43:11.505424 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:12.505702 kubelet[1542]: E0209 21:43:12.505596 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:13.506084 kubelet[1542]: E0209 21:43:13.506006 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:14.506694 kubelet[1542]: E0209 21:43:14.506615 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:15.506910 kubelet[1542]: E0209 21:43:15.506833 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:16.507791 kubelet[1542]: E0209 21:43:16.507681 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:17.508779 kubelet[1542]: E0209 21:43:17.508664 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:18.509505 kubelet[1542]: E0209 21:43:18.509398 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:19.509676 kubelet[1542]: E0209 21:43:19.509569 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:20.274213 kubelet[1542]: E0209 21:43:20.274113 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:20.510296 kubelet[1542]: E0209 21:43:20.510192 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:21.511510 kubelet[1542]: E0209 21:43:21.511390 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:22.512397 kubelet[1542]: E0209 21:43:22.512294 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:23.512841 kubelet[1542]: E0209 21:43:23.512728 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:24.513598 kubelet[1542]: E0209 21:43:24.513484 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:25.514730 kubelet[1542]: E0209 21:43:25.514619 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:26.515968 kubelet[1542]: E0209 21:43:26.515860 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:27.517114 kubelet[1542]: E0209 21:43:27.517065 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:28.517408 kubelet[1542]: E0209 21:43:28.517304 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:29.517961 kubelet[1542]: E0209 21:43:29.517864 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:30.518512 kubelet[1542]: E0209 21:43:30.518399 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:31.518975 kubelet[1542]: E0209 21:43:31.518874 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:32.519706 kubelet[1542]: E0209 21:43:32.519602 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:33.520459 kubelet[1542]: E0209 21:43:33.520341 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:34.521287 kubelet[1542]: E0209 21:43:34.521167 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:35.521544 kubelet[1542]: E0209 21:43:35.521420 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:36.522315 kubelet[1542]: E0209 21:43:36.522193 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:37.523033 kubelet[1542]: E0209 21:43:37.522935 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:38.523536 kubelet[1542]: E0209 21:43:38.523403 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:39.524412 kubelet[1542]: E0209 21:43:39.524304 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:40.274716 kubelet[1542]: E0209 21:43:40.274607 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:40.524607 kubelet[1542]: E0209 21:43:40.524547 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:41.525871 kubelet[1542]: E0209 21:43:41.525752 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:42.526395 kubelet[1542]: E0209 21:43:42.526286 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:43.526536 kubelet[1542]: E0209 21:43:43.526420 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:44.527731 kubelet[1542]: E0209 21:43:44.527622 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:45.527801 kubelet[1542]: E0209 21:43:45.527738 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:46.528651 kubelet[1542]: E0209 21:43:46.528547 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:47.529710 kubelet[1542]: E0209 21:43:47.529606 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:48.529818 kubelet[1542]: E0209 21:43:48.529745 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:49.530985 kubelet[1542]: E0209 21:43:49.530907 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:50.531755 kubelet[1542]: E0209 21:43:50.531651 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:51.532696 kubelet[1542]: E0209 21:43:51.532568 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:52.532884 kubelet[1542]: E0209 21:43:52.532782 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:53.049000 audit[4856]: NETFILTER_CFG table=filter:82 family=2 entries=20 op=nft_register_rule pid=4856 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:43:53.061893 kubelet[1542]: I0209 21:43:53.061851 1542 topology_manager.go:212] "Topology Admit Handler" Feb 9 21:43:53.065056 systemd[1]: Created slice kubepods-besteffort-podf98ea7c6_577e_4e3b_b430_60b7c057646d.slice. Feb 9 21:43:53.077466 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 21:43:53.077533 kernel: audit: type=1325 audit(1707515033.049:854): table=filter:82 family=2 entries=20 op=nft_register_rule pid=4856 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:43:53.049000 audit[4856]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffe8753e880 a2=0 a3=7ffe8753e86c items=0 ppid=1786 pid=4856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:43:53.168801 kubelet[1542]: I0209 21:43:53.168786 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/f98ea7c6-577e-4e3b-b430-60b7c057646d-data\") pod \"nfs-server-provisioner-0\" (UID: \"f98ea7c6-577e-4e3b-b430-60b7c057646d\") " pod="default/nfs-server-provisioner-0" Feb 9 21:43:53.168893 kubelet[1542]: I0209 21:43:53.168814 1542 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9s9bk\" (UniqueName: \"kubernetes.io/projected/f98ea7c6-577e-4e3b-b430-60b7c057646d-kube-api-access-9s9bk\") pod \"nfs-server-provisioner-0\" (UID: \"f98ea7c6-577e-4e3b-b430-60b7c057646d\") " pod="default/nfs-server-provisioner-0" Feb 9 21:43:53.236272 kernel: audit: type=1300 audit(1707515033.049:854): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffe8753e880 a2=0 a3=7ffe8753e86c items=0 ppid=1786 pid=4856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:43:53.236316 kernel: audit: type=1327 audit(1707515033.049:854): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:43:53.049000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:43:53.049000 audit[4856]: NETFILTER_CFG table=nat:83 family=2 entries=20 op=nft_register_rule pid=4856 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:43:53.049000 audit[4856]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe8753e880 a2=0 a3=31030 items=0 ppid=1786 pid=4856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:43:53.366651 env[1162]: time="2024-02-09T21:43:53.366609074Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f98ea7c6-577e-4e3b-b430-60b7c057646d,Namespace:default,Attempt:0,}" Feb 9 21:43:53.436636 systemd-networkd[1013]: cali60e51b789ff: Link UP Feb 9 21:43:53.453262 kernel: audit: type=1325 audit(1707515033.049:855): table=nat:83 family=2 entries=20 op=nft_register_rule pid=4856 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:43:53.453305 kernel: audit: type=1300 audit(1707515033.049:855): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe8753e880 a2=0 a3=31030 items=0 ppid=1786 pid=4856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:43:53.453324 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 21:43:53.453340 kernel: audit: type=1327 audit(1707515033.049:855): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:43:53.049000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:43:53.481065 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 21:43:53.533498 kubelet[1542]: E0209 21:43:53.533479 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:53.568225 systemd-networkd[1013]: cali60e51b789ff: Gained carrier Feb 9 21:43:53.299000 audit[4878]: NETFILTER_CFG table=filter:84 family=2 entries=32 op=nft_register_rule pid=4878 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:43:53.299000 audit[4878]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffef89e3040 a2=0 a3=7ffef89e302c items=0 ppid=1786 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:43:53.727582 kernel: audit: type=1325 audit(1707515033.299:856): table=filter:84 family=2 entries=32 op=nft_register_rule pid=4878 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:43:53.727622 kernel: audit: type=1300 audit(1707515033.299:856): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffef89e3040 a2=0 a3=7ffef89e302c items=0 ppid=1786 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:43:53.727639 kernel: audit: type=1327 audit(1707515033.299:856): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:43:53.299000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:43:53.795000 audit[4878]: NETFILTER_CFG table=nat:85 family=2 entries=20 op=nft_register_rule pid=4878 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.387 [INFO][4880] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.21-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default f98ea7c6-577e-4e3b-b430-60b7c057646d 3034 0 2024-02-09 21:43:53 +0000 UTC <nil> <nil> map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.80.21 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-" Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.388 [INFO][4880] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.401 [INFO][4899] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" HandleID="k8s-pod-network.93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" Workload="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.413 [INFO][4899] ipam_plugin.go 268: Auto assigning IP ContainerID="93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" HandleID="k8s-pod-network.93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" Workload="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c1d00), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.21", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 21:43:53.401066051 +0000 UTC"}, Hostname:"10.67.80.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.413 [INFO][4899] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.413 [INFO][4899] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.413 [INFO][4899] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.21' Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.414 [INFO][4899] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" host="10.67.80.21" Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.417 [INFO][4899] ipam.go 372: Looking up existing affinities for host host="10.67.80.21" Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.421 [INFO][4899] ipam.go 489: Trying affinity for 192.168.115.0/26 host="10.67.80.21" Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.422 [INFO][4899] ipam.go 155: Attempting to load block cidr=192.168.115.0/26 host="10.67.80.21" Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.425 [INFO][4899] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.115.0/26 host="10.67.80.21" Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.425 [INFO][4899] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.115.0/26 handle="k8s-pod-network.93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" host="10.67.80.21" Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.426 [INFO][4899] ipam.go 1682: Creating new handle: k8s-pod-network.93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6 Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.430 [INFO][4899] ipam.go 1203: Writing block in order to claim IPs block=192.168.115.0/26 handle="k8s-pod-network.93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" host="10.67.80.21" Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.435 [INFO][4899] ipam.go 1216: Successfully claimed IPs: [192.168.115.6/26] block=192.168.115.0/26 handle="k8s-pod-network.93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" host="10.67.80.21" Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.435 [INFO][4899] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.115.6/26] handle="k8s-pod-network.93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" host="10.67.80.21" Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.435 [INFO][4899] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 21:43:53.810433 env[1162]: 2024-02-09 21:43:53.435 [INFO][4899] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.115.6/26] IPv6=[] ContainerID="93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" HandleID="k8s-pod-network.93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" Workload="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Feb 9 21:43:53.810893 env[1162]: 2024-02-09 21:43:53.435 [INFO][4880] k8s.go 385: Populated endpoint ContainerID="93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f98ea7c6-577e-4e3b-b430-60b7c057646d", ResourceVersion:"3034", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 43, 53, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.115.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:43:53.810893 env[1162]: 2024-02-09 21:43:53.436 [INFO][4880] k8s.go 386: Calico CNI using IPs: [192.168.115.6/32] ContainerID="93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Feb 9 21:43:53.810893 env[1162]: 2024-02-09 21:43:53.436 [INFO][4880] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Feb 9 21:43:53.810893 env[1162]: 2024-02-09 21:43:53.436 [INFO][4880] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Feb 9 21:43:53.811010 env[1162]: 2024-02-09 21:43:53.796 [INFO][4880] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.21-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"f98ea7c6-577e-4e3b-b430-60b7c057646d", ResourceVersion:"3034", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 21, 43, 53, 0, time.Local), DeletionTimestamp:<nil>, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.21", ContainerID:"93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.115.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"da:fa:d8:0e:22:00", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 21:43:53.811010 env[1162]: 2024-02-09 21:43:53.809 [INFO][4880] k8s.go 491: Wrote updated endpoint to datastore ContainerID="93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.21-k8s-nfs--server--provisioner--0-eth0" Feb 9 21:43:53.815880 env[1162]: time="2024-02-09T21:43:53.815816477Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 21:43:53.815880 env[1162]: time="2024-02-09T21:43:53.815837728Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 21:43:53.815880 env[1162]: time="2024-02-09T21:43:53.815844761Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 21:43:53.816014 env[1162]: time="2024-02-09T21:43:53.815903051Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6 pid=4940 runtime=io.containerd.runc.v2 Feb 9 21:43:53.834073 systemd[1]: Started cri-containerd-93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6.scope. Feb 9 21:43:53.795000 audit[4878]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffef89e3040 a2=0 a3=31030 items=0 ppid=1786 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:43:53.795000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 21:43:53.856495 kernel: audit: type=1325 audit(1707515033.795:857): table=nat:85 family=2 entries=20 op=nft_register_rule pid=4878 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 21:43:53.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit: BPF prog-id=121 op=LOAD Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4940 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:43:53.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933646134613366613361626462393964343865656436343531623466 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4940 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:43:53.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933646134613366613361626462393964343865656436343531623466 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit: BPF prog-id=122 op=LOAD Feb 9 21:43:53.862000 audit[4949]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024830 items=0 ppid=4940 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:43:53.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933646134613366613361626462393964343865656436343531623466 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit: BPF prog-id=123 op=LOAD Feb 9 21:43:53.862000 audit[4949]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024878 items=0 ppid=4940 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:43:53.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933646134613366613361626462393964343865656436343531623466 Feb 9 21:43:53.862000 audit: BPF prog-id=123 op=UNLOAD Feb 9 21:43:53.862000 audit: BPF prog-id=122 op=UNLOAD Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { perfmon } for pid=4949 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit[4949]: AVC avc: denied { bpf } for pid=4949 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 21:43:53.862000 audit: BPF prog-id=124 op=LOAD Feb 9 21:43:53.862000 audit[4949]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024c88 items=0 ppid=4940 pid=4949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:43:53.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933646134613366613361626462393964343865656436343531623466 Feb 9 21:43:53.863000 audit[4966]: NETFILTER_CFG table=filter:86 family=2 entries=46 op=nft_register_chain pid=4966 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 21:43:53.863000 audit[4966]: SYSCALL arch=c000003e syscall=46 success=yes exit=21860 a0=3 a1=7ffd00ed2740 a2=0 a3=7ffd00ed272c items=0 ppid=2597 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 21:43:53.863000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 21:43:53.881751 env[1162]: time="2024-02-09T21:43:53.881722866Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:f98ea7c6-577e-4e3b-b430-60b7c057646d,Namespace:default,Attempt:0,} returns sandbox id \"93da4a3fa3abdb99d48eed6451b4f862cf40d031266408028ca5ab7e391740c6\"" Feb 9 21:43:54.534329 kubelet[1542]: E0209 21:43:54.534223 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:55.297030 systemd-networkd[1013]: cali60e51b789ff: Gained IPv6LL Feb 9 21:43:55.534947 kubelet[1542]: E0209 21:43:55.534874 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:56.535891 kubelet[1542]: E0209 21:43:56.535770 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:57.536851 kubelet[1542]: E0209 21:43:57.536743 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:58.537004 kubelet[1542]: E0209 21:43:58.536890 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:43:59.537995 kubelet[1542]: E0209 21:43:59.537875 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:00.274932 kubelet[1542]: E0209 21:44:00.274865 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:00.538862 kubelet[1542]: E0209 21:44:00.538639 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:01.539218 kubelet[1542]: E0209 21:44:01.539103 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:02.539990 kubelet[1542]: E0209 21:44:02.539877 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:03.540505 kubelet[1542]: E0209 21:44:03.540387 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:04.540773 kubelet[1542]: E0209 21:44:04.540655 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:05.540898 kubelet[1542]: E0209 21:44:05.540827 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:06.541712 kubelet[1542]: E0209 21:44:06.541637 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:07.542727 kubelet[1542]: E0209 21:44:07.542653 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:08.543991 kubelet[1542]: E0209 21:44:08.543904 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:09.544646 kubelet[1542]: E0209 21:44:09.544524 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:10.545095 kubelet[1542]: E0209 21:44:10.545025 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:11.546326 kubelet[1542]: E0209 21:44:11.546210 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:12.546559 kubelet[1542]: E0209 21:44:12.546430 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:13.547507 kubelet[1542]: E0209 21:44:13.547405 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:14.547876 kubelet[1542]: E0209 21:44:14.547779 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:15.548010 kubelet[1542]: E0209 21:44:15.547913 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:16.548854 kubelet[1542]: E0209 21:44:16.548748 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:17.549136 kubelet[1542]: E0209 21:44:17.549033 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:18.549867 kubelet[1542]: E0209 21:44:18.549755 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:19.550963 kubelet[1542]: E0209 21:44:19.550853 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:20.274831 kubelet[1542]: E0209 21:44:20.274723 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:20.552256 kubelet[1542]: E0209 21:44:20.552051 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:21.553074 kubelet[1542]: E0209 21:44:21.552962 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:22.553295 kubelet[1542]: E0209 21:44:22.553182 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:23.554491 kubelet[1542]: E0209 21:44:23.554355 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:24.555256 kubelet[1542]: E0209 21:44:24.555148 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:25.555492 kubelet[1542]: E0209 21:44:25.555346 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:26.556183 kubelet[1542]: E0209 21:44:26.556074 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:27.557425 kubelet[1542]: E0209 21:44:27.557313 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:28.557677 kubelet[1542]: E0209 21:44:28.557564 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:29.558565 kubelet[1542]: E0209 21:44:29.558461 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:30.559271 kubelet[1542]: E0209 21:44:30.559158 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:31.560016 kubelet[1542]: E0209 21:44:31.559904 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:32.561140 kubelet[1542]: E0209 21:44:32.561021 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:33.561625 kubelet[1542]: E0209 21:44:33.561518 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:34.562250 kubelet[1542]: E0209 21:44:34.562139 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:35.562482 kubelet[1542]: E0209 21:44:35.562354 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:36.563616 kubelet[1542]: E0209 21:44:36.563504 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:37.564204 kubelet[1542]: E0209 21:44:37.564128 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:38.565512 kubelet[1542]: E0209 21:44:38.565399 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:39.566435 kubelet[1542]: E0209 21:44:39.566313 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:40.274588 kubelet[1542]: E0209 21:44:40.274493 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:40.566985 kubelet[1542]: E0209 21:44:40.566786 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:41.567629 kubelet[1542]: E0209 21:44:41.567526 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:42.568857 kubelet[1542]: E0209 21:44:42.568747 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:43.569879 kubelet[1542]: E0209 21:44:43.569774 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:44.570992 kubelet[1542]: E0209 21:44:44.570885 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:45.572124 kubelet[1542]: E0209 21:44:45.572017 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:46.572983 kubelet[1542]: E0209 21:44:46.572881 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:47.573208 kubelet[1542]: E0209 21:44:47.573103 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:48.573990 kubelet[1542]: E0209 21:44:48.573879 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:49.574748 kubelet[1542]: E0209 21:44:49.574632 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:50.575547 kubelet[1542]: E0209 21:44:50.575475 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:51.576286 kubelet[1542]: E0209 21:44:51.576173 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:52.576500 kubelet[1542]: E0209 21:44:52.576345 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:53.577485 kubelet[1542]: E0209 21:44:53.577367 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:54.578264 kubelet[1542]: E0209 21:44:54.578158 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:55.578276 kubelet[1542]: E0209 21:44:55.578232 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:56.579122 kubelet[1542]: E0209 21:44:56.579062 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:57.580008 kubelet[1542]: E0209 21:44:57.579895 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:58.581232 kubelet[1542]: E0209 21:44:58.581130 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:44:59.581818 kubelet[1542]: E0209 21:44:59.581708 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:00.274681 kubelet[1542]: E0209 21:45:00.274609 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:00.582063 kubelet[1542]: E0209 21:45:00.581874 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:01.075550 systemd[1]: Started sshd@14-139.178.90.113:22-2.57.122.87:45612.service. Feb 9 21:45:01.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.113:22-2.57.122.87:45612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:01.102806 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 9 21:45:01.102887 kernel: audit: type=1130 audit(1707515101.074:877): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.113:22-2.57.122.87:45612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:01.582263 kubelet[1542]: E0209 21:45:01.582167 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:01.811325 sshd[5159]: Invalid user fjiang from 2.57.122.87 port 45612 Feb 9 21:45:01.994956 sshd[5159]: pam_faillock(sshd:auth): User unknown Feb 9 21:45:01.996117 sshd[5159]: pam_unix(sshd:auth): check pass; user unknown Feb 9 21:45:01.996207 sshd[5159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=2.57.122.87 Feb 9 21:45:01.997106 sshd[5159]: pam_faillock(sshd:auth): User unknown Feb 9 21:45:01.995000 audit[5159]: USER_AUTH pid=5159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fjiang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 9 21:45:02.087529 kernel: audit: type=1100 audit(1707515101.995:878): pid=5159 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="fjiang" exe="/usr/sbin/sshd" hostname=2.57.122.87 addr=2.57.122.87 terminal=ssh res=failed' Feb 9 21:45:02.582507 kubelet[1542]: E0209 21:45:02.582414 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:03.583499 kubelet[1542]: E0209 21:45:03.583388 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:04.134702 sshd[5159]: Failed password for invalid user fjiang from 2.57.122.87 port 45612 ssh2 Feb 9 21:45:04.361827 sshd[5159]: Connection closed by invalid user fjiang 2.57.122.87 port 45612 [preauth] Feb 9 21:45:04.364294 systemd[1]: sshd@14-139.178.90.113:22-2.57.122.87:45612.service: Deactivated successfully. Feb 9 21:45:04.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.113:22-2.57.122.87:45612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:04.456505 kernel: audit: type=1131 audit(1707515104.363:879): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.90.113:22-2.57.122.87:45612 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 21:45:04.584630 kubelet[1542]: E0209 21:45:04.584505 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:05.585440 kubelet[1542]: E0209 21:45:05.585366 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:06.586286 kubelet[1542]: E0209 21:45:06.586179 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:07.587273 kubelet[1542]: E0209 21:45:07.587236 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:08.587899 kubelet[1542]: E0209 21:45:08.587788 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:09.588128 kubelet[1542]: E0209 21:45:09.588018 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:10.589066 kubelet[1542]: E0209 21:45:10.588932 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:11.590133 kubelet[1542]: E0209 21:45:11.590026 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:12.590347 kubelet[1542]: E0209 21:45:12.590220 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:13.590627 kubelet[1542]: E0209 21:45:13.590512 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:14.591874 kubelet[1542]: E0209 21:45:14.591762 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:15.593020 kubelet[1542]: E0209 21:45:15.592897 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:16.593849 kubelet[1542]: E0209 21:45:16.593735 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:17.594145 kubelet[1542]: E0209 21:45:17.594053 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:18.595314 kubelet[1542]: E0209 21:45:18.595203 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:19.596362 kubelet[1542]: E0209 21:45:19.596258 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:20.274125 kubelet[1542]: E0209 21:45:20.274016 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:20.597360 kubelet[1542]: E0209 21:45:20.597136 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:21.598237 kubelet[1542]: E0209 21:45:21.598124 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:22.599115 kubelet[1542]: E0209 21:45:22.598994 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:23.600299 kubelet[1542]: E0209 21:45:23.600188 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:24.601495 kubelet[1542]: E0209 21:45:24.601385 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:25.602518 kubelet[1542]: E0209 21:45:25.602451 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:26.603078 kubelet[1542]: E0209 21:45:26.602969 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:27.604097 kubelet[1542]: E0209 21:45:27.603970 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:28.604934 kubelet[1542]: E0209 21:45:28.604834 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:29.605430 kubelet[1542]: E0209 21:45:29.605321 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:30.605651 kubelet[1542]: E0209 21:45:30.605537 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:31.606301 kubelet[1542]: E0209 21:45:31.606222 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:32.606639 kubelet[1542]: E0209 21:45:32.606528 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:33.607336 kubelet[1542]: E0209 21:45:33.607230 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:34.608483 kubelet[1542]: E0209 21:45:34.608379 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:35.609596 kubelet[1542]: E0209 21:45:35.609489 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:36.609930 kubelet[1542]: E0209 21:45:36.609818 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:37.610485 kubelet[1542]: E0209 21:45:37.610361 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:38.611563 kubelet[1542]: E0209 21:45:38.611436 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:39.612419 kubelet[1542]: E0209 21:45:39.612312 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:40.274632 kubelet[1542]: E0209 21:45:40.274525 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:40.613898 kubelet[1542]: E0209 21:45:40.613663 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:41.613990 kubelet[1542]: E0209 21:45:41.613880 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:42.614730 kubelet[1542]: E0209 21:45:42.614629 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:43.615304 kubelet[1542]: E0209 21:45:43.615191 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:44.615763 kubelet[1542]: E0209 21:45:44.615631 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:45.616503 kubelet[1542]: E0209 21:45:45.616399 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:46.617268 kubelet[1542]: E0209 21:45:46.617158 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:47.618305 kubelet[1542]: E0209 21:45:47.618197 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:48.618759 kubelet[1542]: E0209 21:45:48.618635 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:49.618921 kubelet[1542]: E0209 21:45:49.618806 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:50.619850 kubelet[1542]: E0209 21:45:50.619742 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:51.620884 kubelet[1542]: E0209 21:45:51.620769 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:52.621286 kubelet[1542]: E0209 21:45:52.621178 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:53.621688 kubelet[1542]: E0209 21:45:53.621577 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:54.622486 kubelet[1542]: E0209 21:45:54.622353 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:55.623179 kubelet[1542]: E0209 21:45:55.623116 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:56.623368 kubelet[1542]: E0209 21:45:56.623258 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:57.623640 kubelet[1542]: E0209 21:45:57.623508 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:58.624546 kubelet[1542]: E0209 21:45:58.624415 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:45:59.625372 kubelet[1542]: E0209 21:45:59.625264 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:00.275013 kubelet[1542]: E0209 21:46:00.274902 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:00.626065 kubelet[1542]: E0209 21:46:00.625835 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:01.626350 kubelet[1542]: E0209 21:46:01.626240 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:02.627121 kubelet[1542]: E0209 21:46:02.627015 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:03.627719 kubelet[1542]: E0209 21:46:03.627607 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:04.628496 kubelet[1542]: E0209 21:46:04.628356 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:05.628868 kubelet[1542]: E0209 21:46:05.628754 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:06.629030 kubelet[1542]: E0209 21:46:06.628925 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:07.629639 kubelet[1542]: E0209 21:46:07.629523 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:08.629890 kubelet[1542]: E0209 21:46:08.629772 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:09.630837 kubelet[1542]: E0209 21:46:09.630723 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:10.631404 kubelet[1542]: E0209 21:46:10.631301 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:11.632138 kubelet[1542]: E0209 21:46:11.632027 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:12.632316 kubelet[1542]: E0209 21:46:12.632170 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:13.632649 kubelet[1542]: E0209 21:46:13.632541 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:14.633831 kubelet[1542]: E0209 21:46:14.633719 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:15.634158 kubelet[1542]: E0209 21:46:15.634045 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:16.635329 kubelet[1542]: E0209 21:46:16.635212 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:16.985059 update_engine[1154]: I0209 21:46:16.984860 1154 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 21:46:16.985059 update_engine[1154]: I0209 21:46:16.984939 1154 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 21:46:16.986810 update_engine[1154]: I0209 21:46:16.986728 1154 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 21:46:16.987666 update_engine[1154]: I0209 21:46:16.987586 1154 omaha_request_params.cc:62] Current group set to lts Feb 9 21:46:16.987897 update_engine[1154]: I0209 21:46:16.987881 1154 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 21:46:16.987897 update_engine[1154]: I0209 21:46:16.987901 1154 update_attempter.cc:643] Scheduling an action processor start. Feb 9 21:46:16.988131 update_engine[1154]: I0209 21:46:16.987934 1154 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 21:46:16.988131 update_engine[1154]: I0209 21:46:16.988001 1154 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 21:46:16.988335 update_engine[1154]: I0209 21:46:16.988138 1154 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 21:46:16.988335 update_engine[1154]: I0209 21:46:16.988155 1154 omaha_request_action.cc:271] Request: <?xml version="1.0" encoding="UTF-8"?> Feb 9 21:46:16.988335 update_engine[1154]: <request protocol="3.0" version="update_engine-0.4.10" updaterversion="update_engine-0.4.10" installsource="scheduler" ismachine="1"> Feb 9 21:46:16.988335 update_engine[1154]: <os version="Chateau" platform="CoreOS" sp="3510.3.2_x86_64"></os> Feb 9 21:46:16.988335 update_engine[1154]: <app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" version="3510.3.2" track="lts" bootid="{92480a94-61c4-4e56-9434-b65478b6a760}" oem="packet" oemversion="0.2.2" alephversion="3510.3.2" machineid="7ceacabeb9194f4d8f74bf6be2ef9ebd" machinealias="" lang="en-US" board="amd64-usr" hardware_class="" delta_okay="false" > Feb 9 21:46:16.988335 update_engine[1154]: <ping active="1"></ping> Feb 9 21:46:16.988335 update_engine[1154]: <updatecheck></updatecheck> Feb 9 21:46:16.988335 update_engine[1154]: <event eventtype="3" eventresult="2" previousversion="0.0.0.0"></event> Feb 9 21:46:16.988335 update_engine[1154]: </app> Feb 9 21:46:16.988335 update_engine[1154]: </request> Feb 9 21:46:16.988335 update_engine[1154]: I0209 21:46:16.988165 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:46:16.989548 locksmithd[1179]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 21:46:16.991298 update_engine[1154]: I0209 21:46:16.991214 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:46:16.991533 update_engine[1154]: E0209 21:46:16.991437 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:46:16.991670 update_engine[1154]: I0209 21:46:16.991611 1154 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 21:46:17.635863 kubelet[1542]: E0209 21:46:17.635743 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:18.636756 kubelet[1542]: E0209 21:46:18.636648 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:19.637607 kubelet[1542]: E0209 21:46:19.637494 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:20.274677 kubelet[1542]: E0209 21:46:20.274601 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:20.638702 kubelet[1542]: E0209 21:46:20.638473 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:21.639498 kubelet[1542]: E0209 21:46:21.639359 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:22.640613 kubelet[1542]: E0209 21:46:22.640502 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:23.641642 kubelet[1542]: E0209 21:46:23.641520 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:24.641872 kubelet[1542]: E0209 21:46:24.641756 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:25.642618 kubelet[1542]: E0209 21:46:25.642568 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:26.643029 kubelet[1542]: E0209 21:46:26.642885 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:26.992306 update_engine[1154]: I0209 21:46:26.992064 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:46:26.993092 update_engine[1154]: I0209 21:46:26.992584 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:46:26.993092 update_engine[1154]: E0209 21:46:26.992792 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:46:26.993092 update_engine[1154]: I0209 21:46:26.992973 1154 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 21:46:27.643623 kubelet[1542]: E0209 21:46:27.643554 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:28.644134 kubelet[1542]: E0209 21:46:28.644024 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:29.644957 kubelet[1542]: E0209 21:46:29.644843 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:30.645433 kubelet[1542]: E0209 21:46:30.645321 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:31.646491 kubelet[1542]: E0209 21:46:31.646356 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:32.646943 kubelet[1542]: E0209 21:46:32.646836 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:33.647704 kubelet[1542]: E0209 21:46:33.647600 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:34.648287 kubelet[1542]: E0209 21:46:34.648180 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:35.648882 kubelet[1542]: E0209 21:46:35.648754 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:36.649169 kubelet[1542]: E0209 21:46:36.649062 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:36.992696 update_engine[1154]: I0209 21:46:36.992431 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:46:36.993503 update_engine[1154]: I0209 21:46:36.992940 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:46:36.993503 update_engine[1154]: E0209 21:46:36.993145 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:46:36.993503 update_engine[1154]: I0209 21:46:36.993330 1154 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 21:46:37.650262 kubelet[1542]: E0209 21:46:37.650150 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:38.650513 kubelet[1542]: E0209 21:46:38.650393 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:39.651823 kubelet[1542]: E0209 21:46:39.651713 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:40.274630 kubelet[1542]: E0209 21:46:40.274523 1542 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:40.652484 kubelet[1542]: E0209 21:46:40.652276 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:41.653410 kubelet[1542]: E0209 21:46:41.653296 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:42.654609 kubelet[1542]: E0209 21:46:42.654501 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:43.655284 kubelet[1542]: E0209 21:46:43.655176 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:44.656378 kubelet[1542]: E0209 21:46:44.656259 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:45.657258 kubelet[1542]: E0209 21:46:45.657148 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:46.657415 kubelet[1542]: E0209 21:46:46.657305 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:46.993033 update_engine[1154]: I0209 21:46:46.992794 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:46:46.993850 update_engine[1154]: I0209 21:46:46.993276 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:46:46.993850 update_engine[1154]: E0209 21:46:46.993521 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:46:46.993850 update_engine[1154]: I0209 21:46:46.993680 1154 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 21:46:46.993850 update_engine[1154]: I0209 21:46:46.993696 1154 omaha_request_action.cc:621] Omaha request response: Feb 9 21:46:46.993850 update_engine[1154]: E0209 21:46:46.993845 1154 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 21:46:46.994374 update_engine[1154]: I0209 21:46:46.993875 1154 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 21:46:46.994374 update_engine[1154]: I0209 21:46:46.993885 1154 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 21:46:46.994374 update_engine[1154]: I0209 21:46:46.993894 1154 update_attempter.cc:306] Processing Done. Feb 9 21:46:46.994374 update_engine[1154]: E0209 21:46:46.993921 1154 update_attempter.cc:619] Update failed. Feb 9 21:46:46.994374 update_engine[1154]: I0209 21:46:46.993929 1154 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 21:46:46.994374 update_engine[1154]: I0209 21:46:46.993938 1154 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 21:46:46.994374 update_engine[1154]: I0209 21:46:46.993948 1154 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 21:46:46.994374 update_engine[1154]: I0209 21:46:46.994097 1154 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 21:46:46.994374 update_engine[1154]: I0209 21:46:46.994148 1154 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 21:46:46.994374 update_engine[1154]: I0209 21:46:46.994159 1154 omaha_request_action.cc:271] Request: <?xml version="1.0" encoding="UTF-8"?> Feb 9 21:46:46.994374 update_engine[1154]: <request protocol="3.0" version="update_engine-0.4.10" updaterversion="update_engine-0.4.10" installsource="scheduler" ismachine="1"> Feb 9 21:46:46.994374 update_engine[1154]: <os version="Chateau" platform="CoreOS" sp="3510.3.2_x86_64"></os> Feb 9 21:46:46.994374 update_engine[1154]: <app appid="{e96281a6-d1af-4bde-9a0a-97b76e56dc57}" version="3510.3.2" track="lts" bootid="{92480a94-61c4-4e56-9434-b65478b6a760}" oem="packet" oemversion="0.2.2" alephversion="3510.3.2" machineid="7ceacabeb9194f4d8f74bf6be2ef9ebd" machinealias="" lang="en-US" board="amd64-usr" hardware_class="" delta_okay="false" > Feb 9 21:46:46.994374 update_engine[1154]: <event eventtype="3" eventresult="0" errorcode="268437456"></event> Feb 9 21:46:46.994374 update_engine[1154]: </app> Feb 9 21:46:46.994374 update_engine[1154]: </request> Feb 9 21:46:46.994374 update_engine[1154]: I0209 21:46:46.994169 1154 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 21:46:46.995992 update_engine[1154]: I0209 21:46:46.994539 1154 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 21:46:46.995992 update_engine[1154]: E0209 21:46:46.994737 1154 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 21:46:46.995992 update_engine[1154]: I0209 21:46:46.994892 1154 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 21:46:46.995992 update_engine[1154]: I0209 21:46:46.994908 1154 omaha_request_action.cc:621] Omaha request response: Feb 9 21:46:46.995992 update_engine[1154]: I0209 21:46:46.994920 1154 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 21:46:46.995992 update_engine[1154]: I0209 21:46:46.994927 1154 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 21:46:46.995992 update_engine[1154]: I0209 21:46:46.994935 1154 update_attempter.cc:306] Processing Done. Feb 9 21:46:46.995992 update_engine[1154]: I0209 21:46:46.994943 1154 update_attempter.cc:310] Error event sent. Feb 9 21:46:46.995992 update_engine[1154]: I0209 21:46:46.994964 1154 update_check_scheduler.cc:74] Next update check in 48m22s Feb 9 21:46:46.996855 locksmithd[1179]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 21:46:46.996855 locksmithd[1179]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 21:46:47.657904 kubelet[1542]: E0209 21:46:47.657796 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:48.658370 kubelet[1542]: E0209 21:46:48.658257 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:49.659312 kubelet[1542]: E0209 21:46:49.659200 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:50.660592 kubelet[1542]: E0209 21:46:50.660481 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:51.661324 kubelet[1542]: E0209 21:46:51.661216 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:52.661976 kubelet[1542]: E0209 21:46:52.661862 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:53.662857 kubelet[1542]: E0209 21:46:53.662738 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:54.663681 kubelet[1542]: E0209 21:46:54.663564 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:55.664762 kubelet[1542]: E0209 21:46:55.664650 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:56.665658 kubelet[1542]: E0209 21:46:56.665550 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:57.666673 kubelet[1542]: E0209 21:46:57.666551 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 21:46:58.667358 kubelet[1542]: E0209 21:46:58.667252 1542 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"