Feb 13 02:39:59.546759 kernel: microcode: microcode updated early to revision 0xf4, date = 2022-07-31 Feb 13 02:39:59.546772 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 13 02:39:59.546779 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 02:39:59.546783 kernel: BIOS-provided physical RAM map: Feb 13 02:39:59.546786 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Feb 13 02:39:59.546790 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Feb 13 02:39:59.546794 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Feb 13 02:39:59.546799 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Feb 13 02:39:59.546803 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Feb 13 02:39:59.546806 kernel: BIOS-e820: [mem 0x0000000040400000-0x000000006dfbbfff] usable Feb 13 02:39:59.546810 kernel: BIOS-e820: [mem 0x000000006dfbc000-0x000000006dfbcfff] ACPI NVS Feb 13 02:39:59.546814 kernel: BIOS-e820: [mem 0x000000006dfbd000-0x000000006dfbdfff] reserved Feb 13 02:39:59.546817 kernel: BIOS-e820: [mem 0x000000006dfbe000-0x0000000077fc4fff] usable Feb 13 02:39:59.546821 kernel: BIOS-e820: [mem 0x0000000077fc5000-0x00000000790a7fff] reserved Feb 13 02:39:59.546827 kernel: BIOS-e820: [mem 0x00000000790a8000-0x0000000079230fff] usable Feb 13 02:39:59.546831 kernel: BIOS-e820: [mem 0x0000000079231000-0x0000000079662fff] ACPI NVS Feb 13 02:39:59.546835 kernel: BIOS-e820: [mem 0x0000000079663000-0x000000007befefff] reserved Feb 13 02:39:59.546839 kernel: BIOS-e820: [mem 0x000000007beff000-0x000000007befffff] usable Feb 13 02:39:59.546843 kernel: BIOS-e820: [mem 0x000000007bf00000-0x000000007f7fffff] reserved Feb 13 02:39:59.546847 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Feb 13 02:39:59.546851 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Feb 13 02:39:59.546855 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Feb 13 02:39:59.546860 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Feb 13 02:39:59.546864 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Feb 13 02:39:59.546868 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000087f7fffff] usable Feb 13 02:39:59.546873 kernel: NX (Execute Disable) protection: active Feb 13 02:39:59.546877 kernel: SMBIOS 3.2.1 present. Feb 13 02:39:59.546881 kernel: DMI: Supermicro PIO-519C-MR-PH004/X11SCH-F, BIOS 1.5 11/17/2020 Feb 13 02:39:59.546885 kernel: tsc: Detected 3400.000 MHz processor Feb 13 02:39:59.546889 kernel: tsc: Detected 3399.906 MHz TSC Feb 13 02:39:59.546893 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 13 02:39:59.546898 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 13 02:39:59.546902 kernel: last_pfn = 0x87f800 max_arch_pfn = 0x400000000 Feb 13 02:39:59.546907 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 13 02:39:59.546911 kernel: last_pfn = 0x7bf00 max_arch_pfn = 0x400000000 Feb 13 02:39:59.546916 kernel: Using GB pages for direct mapping Feb 13 02:39:59.546920 kernel: ACPI: Early table checksum verification disabled Feb 13 02:39:59.546924 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Feb 13 02:39:59.546928 kernel: ACPI: XSDT 0x00000000795440C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Feb 13 02:39:59.546932 kernel: ACPI: FACP 0x0000000079580620 000114 (v06 01072009 AMI 00010013) Feb 13 02:39:59.546938 kernel: ACPI: DSDT 0x0000000079544268 03C3B7 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Feb 13 02:39:59.546944 kernel: ACPI: FACS 0x0000000079662F80 000040 Feb 13 02:39:59.546949 kernel: ACPI: APIC 0x0000000079580738 00012C (v04 01072009 AMI 00010013) Feb 13 02:39:59.546953 kernel: ACPI: FPDT 0x0000000079580868 000044 (v01 01072009 AMI 00010013) Feb 13 02:39:59.546958 kernel: ACPI: FIDT 0x00000000795808B0 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Feb 13 02:39:59.546962 kernel: ACPI: MCFG 0x0000000079580950 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Feb 13 02:39:59.546967 kernel: ACPI: SPMI 0x0000000079580990 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Feb 13 02:39:59.546972 kernel: ACPI: SSDT 0x00000000795809D8 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Feb 13 02:39:59.546977 kernel: ACPI: SSDT 0x00000000795824F8 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Feb 13 02:39:59.546981 kernel: ACPI: SSDT 0x00000000795856C0 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Feb 13 02:39:59.546986 kernel: ACPI: HPET 0x00000000795879F0 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 02:39:59.546991 kernel: ACPI: SSDT 0x0000000079587A28 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Feb 13 02:39:59.546995 kernel: ACPI: SSDT 0x00000000795889D8 0008F7 (v02 INTEL xh_mossb 00000000 INTL 20160527) Feb 13 02:39:59.547000 kernel: ACPI: UEFI 0x00000000795892D0 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 02:39:59.547004 kernel: ACPI: LPIT 0x0000000079589318 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 02:39:59.547009 kernel: ACPI: SSDT 0x00000000795893B0 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Feb 13 02:39:59.547014 kernel: ACPI: SSDT 0x000000007958BB90 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Feb 13 02:39:59.547018 kernel: ACPI: DBGP 0x000000007958D078 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Feb 13 02:39:59.547023 kernel: ACPI: DBG2 0x000000007958D0B0 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Feb 13 02:39:59.547028 kernel: ACPI: SSDT 0x000000007958D108 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Feb 13 02:39:59.547032 kernel: ACPI: DMAR 0x000000007958EC70 0000A8 (v01 INTEL EDK2 00000002 01000013) Feb 13 02:39:59.547036 kernel: ACPI: SSDT 0x000000007958ED18 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Feb 13 02:39:59.547041 kernel: ACPI: TPM2 0x000000007958EE60 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Feb 13 02:39:59.547046 kernel: ACPI: SSDT 0x000000007958EE98 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Feb 13 02:39:59.547051 kernel: ACPI: WSMT 0x000000007958FC28 000028 (v01 \xf5m 01072009 AMI 00010013) Feb 13 02:39:59.547056 kernel: ACPI: EINJ 0x000000007958FC50 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Feb 13 02:39:59.547060 kernel: ACPI: ERST 0x000000007958FD80 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Feb 13 02:39:59.547065 kernel: ACPI: BERT 0x000000007958FFB0 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Feb 13 02:39:59.547070 kernel: ACPI: HEST 0x000000007958FFE0 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Feb 13 02:39:59.547074 kernel: ACPI: SSDT 0x0000000079590260 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Feb 13 02:39:59.547079 kernel: ACPI: Reserving FACP table memory at [mem 0x79580620-0x79580733] Feb 13 02:39:59.547083 kernel: ACPI: Reserving DSDT table memory at [mem 0x79544268-0x7958061e] Feb 13 02:39:59.547088 kernel: ACPI: Reserving FACS table memory at [mem 0x79662f80-0x79662fbf] Feb 13 02:39:59.547093 kernel: ACPI: Reserving APIC table memory at [mem 0x79580738-0x79580863] Feb 13 02:39:59.547097 kernel: ACPI: Reserving FPDT table memory at [mem 0x79580868-0x795808ab] Feb 13 02:39:59.547102 kernel: ACPI: Reserving FIDT table memory at [mem 0x795808b0-0x7958094b] Feb 13 02:39:59.547106 kernel: ACPI: Reserving MCFG table memory at [mem 0x79580950-0x7958098b] Feb 13 02:39:59.547111 kernel: ACPI: Reserving SPMI table memory at [mem 0x79580990-0x795809d0] Feb 13 02:39:59.547116 kernel: ACPI: Reserving SSDT table memory at [mem 0x795809d8-0x795824f3] Feb 13 02:39:59.547120 kernel: ACPI: Reserving SSDT table memory at [mem 0x795824f8-0x795856bd] Feb 13 02:39:59.547124 kernel: ACPI: Reserving SSDT table memory at [mem 0x795856c0-0x795879ea] Feb 13 02:39:59.547129 kernel: ACPI: Reserving HPET table memory at [mem 0x795879f0-0x79587a27] Feb 13 02:39:59.547134 kernel: ACPI: Reserving SSDT table memory at [mem 0x79587a28-0x795889d5] Feb 13 02:39:59.547139 kernel: ACPI: Reserving SSDT table memory at [mem 0x795889d8-0x795892ce] Feb 13 02:39:59.547143 kernel: ACPI: Reserving UEFI table memory at [mem 0x795892d0-0x79589311] Feb 13 02:39:59.547148 kernel: ACPI: Reserving LPIT table memory at [mem 0x79589318-0x795893ab] Feb 13 02:39:59.547152 kernel: ACPI: Reserving SSDT table memory at [mem 0x795893b0-0x7958bb8d] Feb 13 02:39:59.547157 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958bb90-0x7958d071] Feb 13 02:39:59.547161 kernel: ACPI: Reserving DBGP table memory at [mem 0x7958d078-0x7958d0ab] Feb 13 02:39:59.547166 kernel: ACPI: Reserving DBG2 table memory at [mem 0x7958d0b0-0x7958d103] Feb 13 02:39:59.547170 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958d108-0x7958ec6e] Feb 13 02:39:59.547176 kernel: ACPI: Reserving DMAR table memory at [mem 0x7958ec70-0x7958ed17] Feb 13 02:39:59.547180 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958ed18-0x7958ee5b] Feb 13 02:39:59.547185 kernel: ACPI: Reserving TPM2 table memory at [mem 0x7958ee60-0x7958ee93] Feb 13 02:39:59.547189 kernel: ACPI: Reserving SSDT table memory at [mem 0x7958ee98-0x7958fc26] Feb 13 02:39:59.547194 kernel: ACPI: Reserving WSMT table memory at [mem 0x7958fc28-0x7958fc4f] Feb 13 02:39:59.547198 kernel: ACPI: Reserving EINJ table memory at [mem 0x7958fc50-0x7958fd7f] Feb 13 02:39:59.547203 kernel: ACPI: Reserving ERST table memory at [mem 0x7958fd80-0x7958ffaf] Feb 13 02:39:59.547207 kernel: ACPI: Reserving BERT table memory at [mem 0x7958ffb0-0x7958ffdf] Feb 13 02:39:59.547212 kernel: ACPI: Reserving HEST table memory at [mem 0x7958ffe0-0x7959025b] Feb 13 02:39:59.547217 kernel: ACPI: Reserving SSDT table memory at [mem 0x79590260-0x795903c1] Feb 13 02:39:59.547222 kernel: No NUMA configuration found Feb 13 02:39:59.547226 kernel: Faking a node at [mem 0x0000000000000000-0x000000087f7fffff] Feb 13 02:39:59.547231 kernel: NODE_DATA(0) allocated [mem 0x87f7fa000-0x87f7fffff] Feb 13 02:39:59.547235 kernel: Zone ranges: Feb 13 02:39:59.547240 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 13 02:39:59.547244 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 13 02:39:59.547249 kernel: Normal [mem 0x0000000100000000-0x000000087f7fffff] Feb 13 02:39:59.547254 kernel: Movable zone start for each node Feb 13 02:39:59.547259 kernel: Early memory node ranges Feb 13 02:39:59.547263 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Feb 13 02:39:59.547268 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Feb 13 02:39:59.547272 kernel: node 0: [mem 0x0000000040400000-0x000000006dfbbfff] Feb 13 02:39:59.547277 kernel: node 0: [mem 0x000000006dfbe000-0x0000000077fc4fff] Feb 13 02:39:59.547282 kernel: node 0: [mem 0x00000000790a8000-0x0000000079230fff] Feb 13 02:39:59.547286 kernel: node 0: [mem 0x000000007beff000-0x000000007befffff] Feb 13 02:39:59.547291 kernel: node 0: [mem 0x0000000100000000-0x000000087f7fffff] Feb 13 02:39:59.547295 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000087f7fffff] Feb 13 02:39:59.547304 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 13 02:39:59.547308 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Feb 13 02:39:59.547313 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Feb 13 02:39:59.547319 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Feb 13 02:39:59.547324 kernel: On node 0, zone DMA32: 4323 pages in unavailable ranges Feb 13 02:39:59.547329 kernel: On node 0, zone DMA32: 11470 pages in unavailable ranges Feb 13 02:39:59.547334 kernel: On node 0, zone Normal: 16640 pages in unavailable ranges Feb 13 02:39:59.547339 kernel: On node 0, zone Normal: 2048 pages in unavailable ranges Feb 13 02:39:59.547344 kernel: ACPI: PM-Timer IO Port: 0x1808 Feb 13 02:39:59.547349 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Feb 13 02:39:59.547354 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Feb 13 02:39:59.547359 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Feb 13 02:39:59.547364 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Feb 13 02:39:59.547368 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Feb 13 02:39:59.547373 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Feb 13 02:39:59.547378 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Feb 13 02:39:59.547383 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Feb 13 02:39:59.547389 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Feb 13 02:39:59.547393 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Feb 13 02:39:59.547398 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Feb 13 02:39:59.547403 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Feb 13 02:39:59.547408 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Feb 13 02:39:59.547413 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Feb 13 02:39:59.547418 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Feb 13 02:39:59.547422 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Feb 13 02:39:59.547427 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Feb 13 02:39:59.547433 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 13 02:39:59.547438 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 13 02:39:59.547443 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 13 02:39:59.547447 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 13 02:39:59.547452 kernel: TSC deadline timer available Feb 13 02:39:59.547460 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Feb 13 02:39:59.547481 kernel: [mem 0x7f800000-0xdfffffff] available for PCI devices Feb 13 02:39:59.547486 kernel: Booting paravirtualized kernel on bare hardware Feb 13 02:39:59.547491 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 13 02:39:59.547497 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Feb 13 02:39:59.547515 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u262144 Feb 13 02:39:59.547520 kernel: pcpu-alloc: s185624 r8192 d31464 u262144 alloc=1*2097152 Feb 13 02:39:59.547524 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Feb 13 02:39:59.547529 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8222327 Feb 13 02:39:59.547534 kernel: Policy zone: Normal Feb 13 02:39:59.547539 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 02:39:59.547545 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 13 02:39:59.547550 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Feb 13 02:39:59.547555 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Feb 13 02:39:59.547560 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 13 02:39:59.547565 kernel: Memory: 32683728K/33411988K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 728000K reserved, 0K cma-reserved) Feb 13 02:39:59.547570 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Feb 13 02:39:59.547575 kernel: ftrace: allocating 34475 entries in 135 pages Feb 13 02:39:59.547580 kernel: ftrace: allocated 135 pages with 4 groups Feb 13 02:39:59.547585 kernel: rcu: Hierarchical RCU implementation. Feb 13 02:39:59.547590 kernel: rcu: RCU event tracing is enabled. Feb 13 02:39:59.547595 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Feb 13 02:39:59.547600 kernel: Rude variant of Tasks RCU enabled. Feb 13 02:39:59.547605 kernel: Tracing variant of Tasks RCU enabled. Feb 13 02:39:59.547610 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 13 02:39:59.547615 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Feb 13 02:39:59.547620 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Feb 13 02:39:59.547625 kernel: random: crng init done Feb 13 02:39:59.547629 kernel: Console: colour dummy device 80x25 Feb 13 02:39:59.547634 kernel: printk: console [tty0] enabled Feb 13 02:39:59.547640 kernel: printk: console [ttyS1] enabled Feb 13 02:39:59.547645 kernel: ACPI: Core revision 20210730 Feb 13 02:39:59.547650 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 79635855245 ns Feb 13 02:39:59.547655 kernel: APIC: Switch to symmetric I/O mode setup Feb 13 02:39:59.547659 kernel: DMAR: Host address width 39 Feb 13 02:39:59.547664 kernel: DMAR: DRHD base: 0x000000fed90000 flags: 0x0 Feb 13 02:39:59.547669 kernel: DMAR: dmar0: reg_base_addr fed90000 ver 1:0 cap 1c0000c40660462 ecap 19e2ff0505e Feb 13 02:39:59.547674 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Feb 13 02:39:59.547679 kernel: DMAR: dmar1: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Feb 13 02:39:59.547684 kernel: DMAR: RMRR base: 0x00000079f11000 end: 0x0000007a15afff Feb 13 02:39:59.547689 kernel: DMAR: RMRR base: 0x0000007d000000 end: 0x0000007f7fffff Feb 13 02:39:59.547694 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 1 Feb 13 02:39:59.547699 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Feb 13 02:39:59.547704 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Feb 13 02:39:59.547709 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Feb 13 02:39:59.547713 kernel: x2apic enabled Feb 13 02:39:59.547718 kernel: Switched APIC routing to cluster x2apic. Feb 13 02:39:59.547723 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 13 02:39:59.547729 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Feb 13 02:39:59.547734 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Feb 13 02:39:59.547739 kernel: CPU0: Thermal monitoring enabled (TM1) Feb 13 02:39:59.547744 kernel: process: using mwait in idle threads Feb 13 02:39:59.547748 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 13 02:39:59.547753 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 13 02:39:59.547758 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 13 02:39:59.547763 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Feb 13 02:39:59.547768 kernel: Spectre V2 : Mitigation: Enhanced IBRS Feb 13 02:39:59.547774 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 13 02:39:59.547779 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Feb 13 02:39:59.547784 kernel: RETBleed: Mitigation: Enhanced IBRS Feb 13 02:39:59.547788 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 13 02:39:59.547793 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 13 02:39:59.547798 kernel: TAA: Mitigation: TSX disabled Feb 13 02:39:59.547803 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Feb 13 02:39:59.547808 kernel: SRBDS: Mitigation: Microcode Feb 13 02:39:59.547813 kernel: GDS: Vulnerable: No microcode Feb 13 02:39:59.547818 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 13 02:39:59.547823 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 13 02:39:59.547828 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 13 02:39:59.547833 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Feb 13 02:39:59.547838 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Feb 13 02:39:59.547843 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 13 02:39:59.547848 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Feb 13 02:39:59.547852 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Feb 13 02:39:59.547857 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Feb 13 02:39:59.547863 kernel: Freeing SMP alternatives memory: 32K Feb 13 02:39:59.547868 kernel: pid_max: default: 32768 minimum: 301 Feb 13 02:39:59.547873 kernel: LSM: Security Framework initializing Feb 13 02:39:59.547878 kernel: SELinux: Initializing. Feb 13 02:39:59.547883 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 02:39:59.547888 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 13 02:39:59.547892 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Feb 13 02:39:59.547897 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Feb 13 02:39:59.547902 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Feb 13 02:39:59.547908 kernel: ... version: 4 Feb 13 02:39:59.547913 kernel: ... bit width: 48 Feb 13 02:39:59.547917 kernel: ... generic registers: 4 Feb 13 02:39:59.547922 kernel: ... value mask: 0000ffffffffffff Feb 13 02:39:59.547927 kernel: ... max period: 00007fffffffffff Feb 13 02:39:59.547932 kernel: ... fixed-purpose events: 3 Feb 13 02:39:59.547937 kernel: ... event mask: 000000070000000f Feb 13 02:39:59.547941 kernel: signal: max sigframe size: 2032 Feb 13 02:39:59.547946 kernel: rcu: Hierarchical SRCU implementation. Feb 13 02:39:59.547952 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Feb 13 02:39:59.547957 kernel: smp: Bringing up secondary CPUs ... Feb 13 02:39:59.547962 kernel: x86: Booting SMP configuration: Feb 13 02:39:59.547966 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Feb 13 02:39:59.547971 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 13 02:39:59.547976 kernel: #9 #10 #11 #12 #13 #14 #15 Feb 13 02:39:59.547981 kernel: smp: Brought up 1 node, 16 CPUs Feb 13 02:39:59.547986 kernel: smpboot: Max logical packages: 1 Feb 13 02:39:59.547992 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Feb 13 02:39:59.547996 kernel: devtmpfs: initialized Feb 13 02:39:59.548001 kernel: x86/mm: Memory block size: 128MB Feb 13 02:39:59.548006 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x6dfbc000-0x6dfbcfff] (4096 bytes) Feb 13 02:39:59.548011 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x79231000-0x79662fff] (4399104 bytes) Feb 13 02:39:59.548016 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 13 02:39:59.548021 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Feb 13 02:39:59.548026 kernel: pinctrl core: initialized pinctrl subsystem Feb 13 02:39:59.548030 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 13 02:39:59.548036 kernel: audit: initializing netlink subsys (disabled) Feb 13 02:39:59.548041 kernel: audit: type=2000 audit(1707791994.119:1): state=initialized audit_enabled=0 res=1 Feb 13 02:39:59.548046 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 13 02:39:59.548051 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 13 02:39:59.548055 kernel: cpuidle: using governor menu Feb 13 02:39:59.548060 kernel: ACPI: bus type PCI registered Feb 13 02:39:59.548065 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 13 02:39:59.548070 kernel: dca service started, version 1.12.1 Feb 13 02:39:59.548075 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Feb 13 02:39:59.548080 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Feb 13 02:39:59.548085 kernel: PCI: Using configuration type 1 for base access Feb 13 02:39:59.548090 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Feb 13 02:39:59.548095 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 13 02:39:59.548100 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 13 02:39:59.548104 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 13 02:39:59.548109 kernel: ACPI: Added _OSI(Module Device) Feb 13 02:39:59.548114 kernel: ACPI: Added _OSI(Processor Device) Feb 13 02:39:59.548119 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 13 02:39:59.548125 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 13 02:39:59.548129 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 13 02:39:59.548134 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 13 02:39:59.548139 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 13 02:39:59.548144 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Feb 13 02:39:59.548149 kernel: ACPI: Dynamic OEM Table Load: Feb 13 02:39:59.548153 kernel: ACPI: SSDT 0xFFFF9F9280215600 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Feb 13 02:39:59.548159 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Feb 13 02:39:59.548163 kernel: ACPI: Dynamic OEM Table Load: Feb 13 02:39:59.548169 kernel: ACPI: SSDT 0xFFFF9F9281CED800 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Feb 13 02:39:59.548174 kernel: ACPI: Dynamic OEM Table Load: Feb 13 02:39:59.548178 kernel: ACPI: SSDT 0xFFFF9F9281C5C000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Feb 13 02:39:59.548183 kernel: ACPI: Dynamic OEM Table Load: Feb 13 02:39:59.548188 kernel: ACPI: SSDT 0xFFFF9F9281C5A000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Feb 13 02:39:59.548193 kernel: ACPI: Dynamic OEM Table Load: Feb 13 02:39:59.548198 kernel: ACPI: SSDT 0xFFFF9F9280149000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Feb 13 02:39:59.548202 kernel: ACPI: Dynamic OEM Table Load: Feb 13 02:39:59.548207 kernel: ACPI: SSDT 0xFFFF9F9281CEA800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Feb 13 02:39:59.548212 kernel: ACPI: Interpreter enabled Feb 13 02:39:59.548218 kernel: ACPI: PM: (supports S0 S5) Feb 13 02:39:59.548223 kernel: ACPI: Using IOAPIC for interrupt routing Feb 13 02:39:59.548227 kernel: HEST: Enabling Firmware First mode for corrected errors. Feb 13 02:39:59.548232 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Feb 13 02:39:59.548237 kernel: HEST: Table parsing has been initialized. Feb 13 02:39:59.548242 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Feb 13 02:39:59.548247 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 13 02:39:59.548252 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Feb 13 02:39:59.548256 kernel: ACPI: PM: Power Resource [USBC] Feb 13 02:39:59.548262 kernel: ACPI: PM: Power Resource [V0PR] Feb 13 02:39:59.548267 kernel: ACPI: PM: Power Resource [V1PR] Feb 13 02:39:59.548272 kernel: ACPI: PM: Power Resource [V2PR] Feb 13 02:39:59.548276 kernel: ACPI: PM: Power Resource [WRST] Feb 13 02:39:59.548281 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Feb 13 02:39:59.548286 kernel: ACPI: PM: Power Resource [FN00] Feb 13 02:39:59.548291 kernel: ACPI: PM: Power Resource [FN01] Feb 13 02:39:59.548296 kernel: ACPI: PM: Power Resource [FN02] Feb 13 02:39:59.548300 kernel: ACPI: PM: Power Resource [FN03] Feb 13 02:39:59.548306 kernel: ACPI: PM: Power Resource [FN04] Feb 13 02:39:59.548311 kernel: ACPI: PM: Power Resource [PIN] Feb 13 02:39:59.548316 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Feb 13 02:39:59.548378 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Feb 13 02:39:59.548423 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Feb 13 02:39:59.548484 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Feb 13 02:39:59.548491 kernel: PCI host bridge to bus 0000:00 Feb 13 02:39:59.548549 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 13 02:39:59.548589 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 13 02:39:59.548625 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 13 02:39:59.548661 kernel: pci_bus 0000:00: root bus resource [mem 0x7f800000-0xdfffffff window] Feb 13 02:39:59.548696 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Feb 13 02:39:59.548732 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Feb 13 02:39:59.548782 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Feb 13 02:39:59.548831 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Feb 13 02:39:59.548875 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Feb 13 02:39:59.548922 kernel: pci 0000:00:01.1: [8086:1905] type 01 class 0x060400 Feb 13 02:39:59.548965 kernel: pci 0000:00:01.1: PME# supported from D0 D3hot D3cold Feb 13 02:39:59.549010 kernel: pci 0000:00:02.0: [8086:3e9a] type 00 class 0x038000 Feb 13 02:39:59.549052 kernel: pci 0000:00:02.0: reg 0x10: [mem 0x94000000-0x94ffffff 64bit] Feb 13 02:39:59.549095 kernel: pci 0000:00:02.0: reg 0x18: [mem 0x80000000-0x8fffffff 64bit pref] Feb 13 02:39:59.549135 kernel: pci 0000:00:02.0: reg 0x20: [io 0x6000-0x603f] Feb 13 02:39:59.549184 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Feb 13 02:39:59.549225 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9651f000-0x9651ffff 64bit] Feb 13 02:39:59.549271 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Feb 13 02:39:59.549311 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9651e000-0x9651efff 64bit] Feb 13 02:39:59.549355 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Feb 13 02:39:59.549398 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x96500000-0x9650ffff 64bit] Feb 13 02:39:59.549439 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Feb 13 02:39:59.549520 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Feb 13 02:39:59.549560 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x96512000-0x96513fff 64bit] Feb 13 02:39:59.549601 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9651d000-0x9651dfff 64bit] Feb 13 02:39:59.549646 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Feb 13 02:39:59.549690 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 02:39:59.549733 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Feb 13 02:39:59.549774 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 02:39:59.549820 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Feb 13 02:39:59.549861 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9651a000-0x9651afff 64bit] Feb 13 02:39:59.549909 kernel: pci 0000:00:16.0: PME# supported from D3hot Feb 13 02:39:59.549955 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Feb 13 02:39:59.549997 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x96519000-0x96519fff 64bit] Feb 13 02:39:59.550037 kernel: pci 0000:00:16.1: PME# supported from D3hot Feb 13 02:39:59.550081 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Feb 13 02:39:59.550122 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x96518000-0x96518fff 64bit] Feb 13 02:39:59.550162 kernel: pci 0000:00:16.4: PME# supported from D3hot Feb 13 02:39:59.550206 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Feb 13 02:39:59.550249 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x96510000-0x96511fff] Feb 13 02:39:59.550290 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x96517000-0x965170ff] Feb 13 02:39:59.550329 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6090-0x6097] Feb 13 02:39:59.550370 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6080-0x6083] Feb 13 02:39:59.550410 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6060-0x607f] Feb 13 02:39:59.550451 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x96516000-0x965167ff] Feb 13 02:39:59.550524 kernel: pci 0000:00:17.0: PME# supported from D3hot Feb 13 02:39:59.550574 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Feb 13 02:39:59.550616 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Feb 13 02:39:59.550661 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Feb 13 02:39:59.550706 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Feb 13 02:39:59.550753 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Feb 13 02:39:59.550795 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Feb 13 02:39:59.550840 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Feb 13 02:39:59.550881 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Feb 13 02:39:59.550927 kernel: pci 0000:00:1c.1: [8086:a339] type 01 class 0x060400 Feb 13 02:39:59.550970 kernel: pci 0000:00:1c.1: PME# supported from D0 D3hot D3cold Feb 13 02:39:59.551017 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Feb 13 02:39:59.551058 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Feb 13 02:39:59.551103 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Feb 13 02:39:59.551148 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Feb 13 02:39:59.551190 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x96514000-0x965140ff 64bit] Feb 13 02:39:59.551230 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Feb 13 02:39:59.551276 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Feb 13 02:39:59.551317 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Feb 13 02:39:59.551359 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 02:39:59.551408 kernel: pci 0000:02:00.0: [15b3:1015] type 00 class 0x020000 Feb 13 02:39:59.551452 kernel: pci 0000:02:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Feb 13 02:39:59.551531 kernel: pci 0000:02:00.0: reg 0x30: [mem 0x96200000-0x962fffff pref] Feb 13 02:39:59.551573 kernel: pci 0000:02:00.0: PME# supported from D3cold Feb 13 02:39:59.551618 kernel: pci 0000:02:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 02:39:59.551660 kernel: pci 0000:02:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 02:39:59.551707 kernel: pci 0000:02:00.1: [15b3:1015] type 00 class 0x020000 Feb 13 02:39:59.551751 kernel: pci 0000:02:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Feb 13 02:39:59.551793 kernel: pci 0000:02:00.1: reg 0x30: [mem 0x96100000-0x961fffff pref] Feb 13 02:39:59.551836 kernel: pci 0000:02:00.1: PME# supported from D3cold Feb 13 02:39:59.551878 kernel: pci 0000:02:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Feb 13 02:39:59.551922 kernel: pci 0000:02:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Feb 13 02:39:59.551963 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 13 02:39:59.552005 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 13 02:39:59.552047 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 02:39:59.552089 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 13 02:39:59.552135 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Feb 13 02:39:59.552179 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x96400000-0x9647ffff] Feb 13 02:39:59.552223 kernel: pci 0000:04:00.0: reg 0x18: [io 0x5000-0x501f] Feb 13 02:39:59.552265 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x96480000-0x96483fff] Feb 13 02:39:59.552307 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Feb 13 02:39:59.552349 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 13 02:39:59.552390 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 02:39:59.552431 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 13 02:39:59.552501 kernel: pci 0000:05:00.0: [8086:1533] type 00 class 0x020000 Feb 13 02:39:59.552565 kernel: pci 0000:05:00.0: reg 0x10: [mem 0x96300000-0x9637ffff] Feb 13 02:39:59.552608 kernel: pci 0000:05:00.0: reg 0x18: [io 0x4000-0x401f] Feb 13 02:39:59.552650 kernel: pci 0000:05:00.0: reg 0x1c: [mem 0x96380000-0x96383fff] Feb 13 02:39:59.552693 kernel: pci 0000:05:00.0: PME# supported from D0 D3hot D3cold Feb 13 02:39:59.552734 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 13 02:39:59.552775 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 02:39:59.552816 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 13 02:39:59.552857 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 13 02:39:59.552906 kernel: pci 0000:07:00.0: [1a03:1150] type 01 class 0x060400 Feb 13 02:39:59.552949 kernel: pci 0000:07:00.0: enabling Extended Tags Feb 13 02:39:59.552992 kernel: pci 0000:07:00.0: supports D1 D2 Feb 13 02:39:59.553034 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 02:39:59.553075 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 13 02:39:59.553116 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 13 02:39:59.553157 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 13 02:39:59.553203 kernel: pci_bus 0000:08: extended config space not accessible Feb 13 02:39:59.553289 kernel: pci 0000:08:00.0: [1a03:2000] type 00 class 0x030000 Feb 13 02:39:59.553356 kernel: pci 0000:08:00.0: reg 0x10: [mem 0x95000000-0x95ffffff] Feb 13 02:39:59.553403 kernel: pci 0000:08:00.0: reg 0x14: [mem 0x96000000-0x9601ffff] Feb 13 02:39:59.553447 kernel: pci 0000:08:00.0: reg 0x18: [io 0x3000-0x307f] Feb 13 02:39:59.553533 kernel: pci 0000:08:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 13 02:39:59.553577 kernel: pci 0000:08:00.0: supports D1 D2 Feb 13 02:39:59.553621 kernel: pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold Feb 13 02:39:59.553666 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 13 02:39:59.553709 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 13 02:39:59.553752 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 13 02:39:59.553759 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Feb 13 02:39:59.553765 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Feb 13 02:39:59.553770 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Feb 13 02:39:59.553775 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Feb 13 02:39:59.553781 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Feb 13 02:39:59.553787 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Feb 13 02:39:59.553793 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Feb 13 02:39:59.553798 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Feb 13 02:39:59.553803 kernel: iommu: Default domain type: Translated Feb 13 02:39:59.553808 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 13 02:39:59.553851 kernel: pci 0000:08:00.0: vgaarb: setting as boot VGA device Feb 13 02:39:59.553896 kernel: pci 0000:08:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 13 02:39:59.553941 kernel: pci 0000:08:00.0: vgaarb: bridge control possible Feb 13 02:39:59.553948 kernel: vgaarb: loaded Feb 13 02:39:59.553955 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 13 02:39:59.553960 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 13 02:39:59.553966 kernel: PTP clock support registered Feb 13 02:39:59.553971 kernel: PCI: Using ACPI for IRQ routing Feb 13 02:39:59.553976 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 13 02:39:59.553981 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Feb 13 02:39:59.553987 kernel: e820: reserve RAM buffer [mem 0x6dfbc000-0x6fffffff] Feb 13 02:39:59.553992 kernel: e820: reserve RAM buffer [mem 0x77fc5000-0x77ffffff] Feb 13 02:39:59.553997 kernel: e820: reserve RAM buffer [mem 0x79231000-0x7bffffff] Feb 13 02:39:59.554003 kernel: e820: reserve RAM buffer [mem 0x7bf00000-0x7bffffff] Feb 13 02:39:59.554008 kernel: e820: reserve RAM buffer [mem 0x87f800000-0x87fffffff] Feb 13 02:39:59.554013 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0 Feb 13 02:39:59.554018 kernel: hpet0: 8 comparators, 64-bit 24.000000 MHz counter Feb 13 02:39:59.554023 kernel: clocksource: Switched to clocksource tsc-early Feb 13 02:39:59.554028 kernel: VFS: Disk quotas dquot_6.6.0 Feb 13 02:39:59.554034 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 13 02:39:59.554039 kernel: pnp: PnP ACPI init Feb 13 02:39:59.554082 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Feb 13 02:39:59.554126 kernel: pnp 00:02: [dma 0 disabled] Feb 13 02:39:59.554168 kernel: pnp 00:03: [dma 0 disabled] Feb 13 02:39:59.554208 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Feb 13 02:39:59.554246 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Feb 13 02:39:59.554290 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Feb 13 02:39:59.554333 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Feb 13 02:39:59.554373 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Feb 13 02:39:59.554409 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Feb 13 02:39:59.554447 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Feb 13 02:39:59.554529 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Feb 13 02:39:59.554566 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Feb 13 02:39:59.554603 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Feb 13 02:39:59.554639 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Feb 13 02:39:59.554681 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Feb 13 02:39:59.554718 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Feb 13 02:39:59.554755 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Feb 13 02:39:59.554791 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Feb 13 02:39:59.554828 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Feb 13 02:39:59.554863 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Feb 13 02:39:59.554902 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Feb 13 02:39:59.554942 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Feb 13 02:39:59.554949 kernel: pnp: PnP ACPI: found 10 devices Feb 13 02:39:59.554955 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 13 02:39:59.554960 kernel: NET: Registered PF_INET protocol family Feb 13 02:39:59.554965 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 02:39:59.554970 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 13 02:39:59.554975 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 13 02:39:59.554982 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 13 02:39:59.554987 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 13 02:39:59.554992 kernel: TCP: Hash tables configured (established 262144 bind 65536) Feb 13 02:39:59.554998 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 02:39:59.555003 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Feb 13 02:39:59.555008 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 13 02:39:59.555013 kernel: NET: Registered PF_XDP protocol family Feb 13 02:39:59.555055 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x7f800000-0x7f800fff 64bit] Feb 13 02:39:59.555097 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x7f801000-0x7f801fff 64bit] Feb 13 02:39:59.555140 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x7f802000-0x7f802fff 64bit] Feb 13 02:39:59.555182 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Feb 13 02:39:59.555226 kernel: pci 0000:02:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 02:39:59.555269 kernel: pci 0000:02:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 02:39:59.555312 kernel: pci 0000:02:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Feb 13 02:39:59.555358 kernel: pci 0000:02:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Feb 13 02:39:59.555400 kernel: pci 0000:00:01.1: PCI bridge to [bus 02] Feb 13 02:39:59.555442 kernel: pci 0000:00:01.1: bridge window [mem 0x96100000-0x962fffff] Feb 13 02:39:59.555527 kernel: pci 0000:00:01.1: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 02:39:59.555569 kernel: pci 0000:00:1b.0: PCI bridge to [bus 03] Feb 13 02:39:59.555611 kernel: pci 0000:00:1b.4: PCI bridge to [bus 04] Feb 13 02:39:59.555653 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Feb 13 02:39:59.555694 kernel: pci 0000:00:1b.4: bridge window [mem 0x96400000-0x964fffff] Feb 13 02:39:59.555739 kernel: pci 0000:00:1b.5: PCI bridge to [bus 05] Feb 13 02:39:59.555781 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Feb 13 02:39:59.555823 kernel: pci 0000:00:1b.5: bridge window [mem 0x96300000-0x963fffff] Feb 13 02:39:59.555865 kernel: pci 0000:00:1c.0: PCI bridge to [bus 06] Feb 13 02:39:59.555909 kernel: pci 0000:07:00.0: PCI bridge to [bus 08] Feb 13 02:39:59.555952 kernel: pci 0000:07:00.0: bridge window [io 0x3000-0x3fff] Feb 13 02:39:59.555995 kernel: pci 0000:07:00.0: bridge window [mem 0x95000000-0x960fffff] Feb 13 02:39:59.556037 kernel: pci 0000:00:1c.1: PCI bridge to [bus 07-08] Feb 13 02:39:59.556081 kernel: pci 0000:00:1c.1: bridge window [io 0x3000-0x3fff] Feb 13 02:39:59.556122 kernel: pci 0000:00:1c.1: bridge window [mem 0x95000000-0x960fffff] Feb 13 02:39:59.556160 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Feb 13 02:39:59.556196 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 13 02:39:59.556232 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 13 02:39:59.556270 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 13 02:39:59.556305 kernel: pci_bus 0000:00: resource 7 [mem 0x7f800000-0xdfffffff window] Feb 13 02:39:59.556341 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Feb 13 02:39:59.556383 kernel: pci_bus 0000:02: resource 1 [mem 0x96100000-0x962fffff] Feb 13 02:39:59.556425 kernel: pci_bus 0000:02: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Feb 13 02:39:59.556493 kernel: pci_bus 0000:04: resource 0 [io 0x5000-0x5fff] Feb 13 02:39:59.556552 kernel: pci_bus 0000:04: resource 1 [mem 0x96400000-0x964fffff] Feb 13 02:39:59.556596 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Feb 13 02:39:59.556634 kernel: pci_bus 0000:05: resource 1 [mem 0x96300000-0x963fffff] Feb 13 02:39:59.556677 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Feb 13 02:39:59.556717 kernel: pci_bus 0000:07: resource 1 [mem 0x95000000-0x960fffff] Feb 13 02:39:59.556758 kernel: pci_bus 0000:08: resource 0 [io 0x3000-0x3fff] Feb 13 02:39:59.556798 kernel: pci_bus 0000:08: resource 1 [mem 0x95000000-0x960fffff] Feb 13 02:39:59.556805 kernel: PCI: CLS 64 bytes, default 64 Feb 13 02:39:59.556811 kernel: DMAR: No ATSR found Feb 13 02:39:59.556816 kernel: DMAR: No SATC found Feb 13 02:39:59.556821 kernel: DMAR: IOMMU feature fl1gp_support inconsistent Feb 13 02:39:59.556826 kernel: DMAR: IOMMU feature pgsel_inv inconsistent Feb 13 02:39:59.556833 kernel: DMAR: IOMMU feature nwfs inconsistent Feb 13 02:39:59.556838 kernel: DMAR: IOMMU feature pasid inconsistent Feb 13 02:39:59.556843 kernel: DMAR: IOMMU feature eafs inconsistent Feb 13 02:39:59.556849 kernel: DMAR: IOMMU feature prs inconsistent Feb 13 02:39:59.556854 kernel: DMAR: IOMMU feature nest inconsistent Feb 13 02:39:59.556859 kernel: DMAR: IOMMU feature mts inconsistent Feb 13 02:39:59.556864 kernel: DMAR: IOMMU feature sc_support inconsistent Feb 13 02:39:59.556869 kernel: DMAR: IOMMU feature dev_iotlb_support inconsistent Feb 13 02:39:59.556875 kernel: DMAR: dmar0: Using Queued invalidation Feb 13 02:39:59.556881 kernel: DMAR: dmar1: Using Queued invalidation Feb 13 02:39:59.556923 kernel: pci 0000:00:00.0: Adding to iommu group 0 Feb 13 02:39:59.556966 kernel: pci 0000:00:01.0: Adding to iommu group 1 Feb 13 02:39:59.557006 kernel: pci 0000:00:01.1: Adding to iommu group 1 Feb 13 02:39:59.557048 kernel: pci 0000:00:02.0: Adding to iommu group 2 Feb 13 02:39:59.557088 kernel: pci 0000:00:08.0: Adding to iommu group 3 Feb 13 02:39:59.557129 kernel: pci 0000:00:12.0: Adding to iommu group 4 Feb 13 02:39:59.557170 kernel: pci 0000:00:14.0: Adding to iommu group 5 Feb 13 02:39:59.557215 kernel: pci 0000:00:14.2: Adding to iommu group 5 Feb 13 02:39:59.557255 kernel: pci 0000:00:15.0: Adding to iommu group 6 Feb 13 02:39:59.557295 kernel: pci 0000:00:15.1: Adding to iommu group 6 Feb 13 02:39:59.557335 kernel: pci 0000:00:16.0: Adding to iommu group 7 Feb 13 02:39:59.557376 kernel: pci 0000:00:16.1: Adding to iommu group 7 Feb 13 02:39:59.557418 kernel: pci 0000:00:16.4: Adding to iommu group 7 Feb 13 02:39:59.557461 kernel: pci 0000:00:17.0: Adding to iommu group 8 Feb 13 02:39:59.557526 kernel: pci 0000:00:1b.0: Adding to iommu group 9 Feb 13 02:39:59.557569 kernel: pci 0000:00:1b.4: Adding to iommu group 10 Feb 13 02:39:59.557612 kernel: pci 0000:00:1b.5: Adding to iommu group 11 Feb 13 02:39:59.557653 kernel: pci 0000:00:1c.0: Adding to iommu group 12 Feb 13 02:39:59.557695 kernel: pci 0000:00:1c.1: Adding to iommu group 13 Feb 13 02:39:59.557737 kernel: pci 0000:00:1e.0: Adding to iommu group 14 Feb 13 02:39:59.557778 kernel: pci 0000:00:1f.0: Adding to iommu group 15 Feb 13 02:39:59.557820 kernel: pci 0000:00:1f.4: Adding to iommu group 15 Feb 13 02:39:59.557861 kernel: pci 0000:00:1f.5: Adding to iommu group 15 Feb 13 02:39:59.557906 kernel: pci 0000:02:00.0: Adding to iommu group 1 Feb 13 02:39:59.557949 kernel: pci 0000:02:00.1: Adding to iommu group 1 Feb 13 02:39:59.557992 kernel: pci 0000:04:00.0: Adding to iommu group 16 Feb 13 02:39:59.558036 kernel: pci 0000:05:00.0: Adding to iommu group 17 Feb 13 02:39:59.558079 kernel: pci 0000:07:00.0: Adding to iommu group 18 Feb 13 02:39:59.558124 kernel: pci 0000:08:00.0: Adding to iommu group 18 Feb 13 02:39:59.558131 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Feb 13 02:39:59.558137 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 13 02:39:59.558144 kernel: software IO TLB: mapped [mem 0x0000000073fc5000-0x0000000077fc5000] (64MB) Feb 13 02:39:59.558149 kernel: RAPL PMU: API unit is 2^-32 Joules, 4 fixed counters, 655360 ms ovfl timer Feb 13 02:39:59.558154 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Feb 13 02:39:59.558160 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Feb 13 02:39:59.558165 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Feb 13 02:39:59.558171 kernel: RAPL PMU: hw unit of domain pp1-gpu 2^-14 Joules Feb 13 02:39:59.558215 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Feb 13 02:39:59.558223 kernel: Initialise system trusted keyrings Feb 13 02:39:59.558230 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Feb 13 02:39:59.558235 kernel: Key type asymmetric registered Feb 13 02:39:59.558240 kernel: Asymmetric key parser 'x509' registered Feb 13 02:39:59.558245 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 13 02:39:59.558251 kernel: io scheduler mq-deadline registered Feb 13 02:39:59.558256 kernel: io scheduler kyber registered Feb 13 02:39:59.558261 kernel: io scheduler bfq registered Feb 13 02:39:59.558304 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 122 Feb 13 02:39:59.558346 kernel: pcieport 0000:00:01.1: PME: Signaling with IRQ 123 Feb 13 02:39:59.558391 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 124 Feb 13 02:39:59.558433 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 125 Feb 13 02:39:59.558477 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 126 Feb 13 02:39:59.558519 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 127 Feb 13 02:39:59.558562 kernel: pcieport 0000:00:1c.1: PME: Signaling with IRQ 128 Feb 13 02:39:59.558608 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Feb 13 02:39:59.558616 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Feb 13 02:39:59.558623 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Feb 13 02:39:59.558628 kernel: pstore: Registered erst as persistent store backend Feb 13 02:39:59.558634 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 13 02:39:59.558639 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 13 02:39:59.558644 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 13 02:39:59.558650 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 13 02:39:59.558692 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Feb 13 02:39:59.558700 kernel: i8042: PNP: No PS/2 controller found. Feb 13 02:39:59.558739 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Feb 13 02:39:59.558778 kernel: rtc_cmos rtc_cmos: registered as rtc0 Feb 13 02:39:59.558816 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-02-13T02:39:58 UTC (1707791998) Feb 13 02:39:59.558854 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Feb 13 02:39:59.558861 kernel: fail to initialize ptp_kvm Feb 13 02:39:59.558867 kernel: intel_pstate: Intel P-state driver initializing Feb 13 02:39:59.558872 kernel: intel_pstate: Disabling energy efficiency optimization Feb 13 02:39:59.558877 kernel: intel_pstate: HWP enabled Feb 13 02:39:59.558884 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Feb 13 02:39:59.558889 kernel: vesafb: scrolling: redraw Feb 13 02:39:59.558895 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Feb 13 02:39:59.558900 kernel: vesafb: framebuffer at 0x95000000, mapped to 0x00000000029046f7, using 768k, total 768k Feb 13 02:39:59.558905 kernel: Console: switching to colour frame buffer device 128x48 Feb 13 02:39:59.558910 kernel: fb0: VESA VGA frame buffer device Feb 13 02:39:59.558916 kernel: NET: Registered PF_INET6 protocol family Feb 13 02:39:59.558921 kernel: Segment Routing with IPv6 Feb 13 02:39:59.558926 kernel: In-situ OAM (IOAM) with IPv6 Feb 13 02:39:59.558932 kernel: NET: Registered PF_PACKET protocol family Feb 13 02:39:59.558938 kernel: Key type dns_resolver registered Feb 13 02:39:59.558943 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Feb 13 02:39:59.558948 kernel: microcode: Microcode Update Driver: v2.2. Feb 13 02:39:59.558953 kernel: IPI shorthand broadcast: enabled Feb 13 02:39:59.558959 kernel: sched_clock: Marking stable (1848399065, 1360192562)->(4633166359, -1424574732) Feb 13 02:39:59.558964 kernel: registered taskstats version 1 Feb 13 02:39:59.558969 kernel: Loading compiled-in X.509 certificates Feb 13 02:39:59.558975 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 13 02:39:59.558981 kernel: Key type .fscrypt registered Feb 13 02:39:59.558986 kernel: Key type fscrypt-provisioning registered Feb 13 02:39:59.558991 kernel: pstore: Using crash dump compression: deflate Feb 13 02:39:59.558997 kernel: ima: Allocated hash algorithm: sha1 Feb 13 02:39:59.559002 kernel: ima: No architecture policies found Feb 13 02:39:59.559007 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 13 02:39:59.559013 kernel: Write protecting the kernel read-only data: 28672k Feb 13 02:39:59.559018 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 13 02:39:59.559023 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 13 02:39:59.559029 kernel: Run /init as init process Feb 13 02:39:59.559035 kernel: with arguments: Feb 13 02:39:59.559040 kernel: /init Feb 13 02:39:59.559045 kernel: with environment: Feb 13 02:39:59.559050 kernel: HOME=/ Feb 13 02:39:59.559056 kernel: TERM=linux Feb 13 02:39:59.559061 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 13 02:39:59.559067 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 02:39:59.559075 systemd[1]: Detected architecture x86-64. Feb 13 02:39:59.559080 systemd[1]: Running in initrd. Feb 13 02:39:59.559086 systemd[1]: No hostname configured, using default hostname. Feb 13 02:39:59.559091 systemd[1]: Hostname set to . Feb 13 02:39:59.559096 systemd[1]: Initializing machine ID from random generator. Feb 13 02:39:59.559102 systemd[1]: Queued start job for default target initrd.target. Feb 13 02:39:59.559108 systemd[1]: Started systemd-ask-password-console.path. Feb 13 02:39:59.559113 systemd[1]: Reached target cryptsetup.target. Feb 13 02:39:59.559119 systemd[1]: Reached target paths.target. Feb 13 02:39:59.559125 systemd[1]: Reached target slices.target. Feb 13 02:39:59.559130 systemd[1]: Reached target swap.target. Feb 13 02:39:59.559135 systemd[1]: Reached target timers.target. Feb 13 02:39:59.559141 systemd[1]: Listening on iscsid.socket. Feb 13 02:39:59.559146 systemd[1]: Listening on iscsiuio.socket. Feb 13 02:39:59.559152 systemd[1]: Listening on systemd-journald-audit.socket. Feb 13 02:39:59.559157 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 13 02:39:59.559164 systemd[1]: Listening on systemd-journald.socket. Feb 13 02:39:59.559169 systemd[1]: Listening on systemd-networkd.socket. Feb 13 02:39:59.559175 kernel: tsc: Refined TSC clocksource calibration: 3408.000 MHz Feb 13 02:39:59.559180 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 02:39:59.559186 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Feb 13 02:39:59.559191 kernel: clocksource: Switched to clocksource tsc Feb 13 02:39:59.559196 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 02:39:59.559202 systemd[1]: Reached target sockets.target. Feb 13 02:39:59.559208 systemd[1]: Starting kmod-static-nodes.service... Feb 13 02:39:59.559214 systemd[1]: Finished network-cleanup.service. Feb 13 02:39:59.559219 systemd[1]: Starting systemd-fsck-usr.service... Feb 13 02:39:59.559225 systemd[1]: Starting systemd-journald.service... Feb 13 02:39:59.559230 systemd[1]: Starting systemd-modules-load.service... Feb 13 02:39:59.559238 systemd-journald[268]: Journal started Feb 13 02:39:59.559264 systemd-journald[268]: Runtime Journal (/run/log/journal/c762f6083bed451c80f3dbaf1d93f104) is 8.0M, max 639.3M, 631.3M free. Feb 13 02:39:59.562114 systemd-modules-load[269]: Inserted module 'overlay' Feb 13 02:39:59.568000 audit: BPF prog-id=6 op=LOAD Feb 13 02:39:59.586497 kernel: audit: type=1334 audit(1707791999.568:2): prog-id=6 op=LOAD Feb 13 02:39:59.586528 systemd[1]: Starting systemd-resolved.service... Feb 13 02:39:59.635513 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 13 02:39:59.635528 systemd[1]: Starting systemd-vconsole-setup.service... Feb 13 02:39:59.667502 kernel: Bridge firewalling registered Feb 13 02:39:59.667518 systemd[1]: Started systemd-journald.service. Feb 13 02:39:59.681535 systemd-modules-load[269]: Inserted module 'br_netfilter' Feb 13 02:39:59.731019 kernel: audit: type=1130 audit(1707791999.689:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:59.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:59.687875 systemd-resolved[271]: Positive Trust Anchors: Feb 13 02:39:59.806436 kernel: SCSI subsystem initialized Feb 13 02:39:59.806449 kernel: audit: type=1130 audit(1707791999.742:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:59.806457 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 13 02:39:59.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:59.687881 systemd-resolved[271]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 02:39:59.906874 kernel: device-mapper: uevent: version 1.0.3 Feb 13 02:39:59.906884 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 13 02:39:59.906894 kernel: audit: type=1130 audit(1707791999.863:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:59.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:59.687899 systemd-resolved[271]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 02:39:59.980711 kernel: audit: type=1130 audit(1707791999.915:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:59.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:59.689461 systemd-resolved[271]: Defaulting to hostname 'linux'. Feb 13 02:39:59.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:59.689720 systemd[1]: Finished kmod-static-nodes.service. Feb 13 02:40:00.088546 kernel: audit: type=1130 audit(1707791999.989:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:00.088559 kernel: audit: type=1130 audit(1707792000.042:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:00.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:39:59.742593 systemd[1]: Started systemd-resolved.service. Feb 13 02:39:59.864488 systemd[1]: Finished systemd-fsck-usr.service. Feb 13 02:39:59.907382 systemd-modules-load[269]: Inserted module 'dm_multipath' Feb 13 02:39:59.915762 systemd[1]: Finished systemd-modules-load.service. Feb 13 02:39:59.989823 systemd[1]: Finished systemd-vconsole-setup.service. Feb 13 02:40:00.042755 systemd[1]: Reached target nss-lookup.target. Feb 13 02:40:00.097058 systemd[1]: Starting dracut-cmdline-ask.service... Feb 13 02:40:00.104026 systemd[1]: Starting systemd-sysctl.service... Feb 13 02:40:00.117032 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 02:40:00.117737 systemd[1]: Finished systemd-sysctl.service. Feb 13 02:40:00.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:00.119757 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 02:40:00.165461 kernel: audit: type=1130 audit(1707792000.117:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:00.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:00.180782 systemd[1]: Finished dracut-cmdline-ask.service. Feb 13 02:40:00.245531 kernel: audit: type=1130 audit(1707792000.180:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:00.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:00.238045 systemd[1]: Starting dracut-cmdline.service... Feb 13 02:40:00.259567 dracut-cmdline[293]: dracut-dracut-053 Feb 13 02:40:00.259567 dracut-cmdline[293]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Feb 13 02:40:00.259567 dracut-cmdline[293]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 13 02:40:00.327547 kernel: Loading iSCSI transport class v2.0-870. Feb 13 02:40:00.327559 kernel: iscsi: registered transport (tcp) Feb 13 02:40:00.377535 kernel: iscsi: registered transport (qla4xxx) Feb 13 02:40:00.377553 kernel: QLogic iSCSI HBA Driver Feb 13 02:40:00.393745 systemd[1]: Finished dracut-cmdline.service. Feb 13 02:40:00.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:00.403251 systemd[1]: Starting dracut-pre-udev.service... Feb 13 02:40:00.459531 kernel: raid6: avx2x4 gen() 48974 MB/s Feb 13 02:40:00.495493 kernel: raid6: avx2x4 xor() 17157 MB/s Feb 13 02:40:00.530492 kernel: raid6: avx2x2 gen() 53044 MB/s Feb 13 02:40:00.565498 kernel: raid6: avx2x2 xor() 32116 MB/s Feb 13 02:40:00.600535 kernel: raid6: avx2x1 gen() 44005 MB/s Feb 13 02:40:00.635532 kernel: raid6: avx2x1 xor() 26640 MB/s Feb 13 02:40:00.670534 kernel: raid6: sse2x4 gen() 21199 MB/s Feb 13 02:40:00.703535 kernel: raid6: sse2x4 xor() 11973 MB/s Feb 13 02:40:00.737492 kernel: raid6: sse2x2 gen() 21647 MB/s Feb 13 02:40:00.771531 kernel: raid6: sse2x2 xor() 13441 MB/s Feb 13 02:40:00.805531 kernel: raid6: sse2x1 gen() 18306 MB/s Feb 13 02:40:00.857170 kernel: raid6: sse2x1 xor() 8931 MB/s Feb 13 02:40:00.857185 kernel: raid6: using algorithm avx2x2 gen() 53044 MB/s Feb 13 02:40:00.857193 kernel: raid6: .... xor() 32116 MB/s, rmw enabled Feb 13 02:40:00.875279 kernel: raid6: using avx2x2 recovery algorithm Feb 13 02:40:00.921464 kernel: xor: automatically using best checksumming function avx Feb 13 02:40:01.000493 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 13 02:40:01.005224 systemd[1]: Finished dracut-pre-udev.service. Feb 13 02:40:01.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:01.013000 audit: BPF prog-id=7 op=LOAD Feb 13 02:40:01.013000 audit: BPF prog-id=8 op=LOAD Feb 13 02:40:01.014439 systemd[1]: Starting systemd-udevd.service... Feb 13 02:40:01.022593 systemd-udevd[473]: Using default interface naming scheme 'v252'. Feb 13 02:40:01.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:01.028658 systemd[1]: Started systemd-udevd.service. Feb 13 02:40:01.069594 dracut-pre-trigger[485]: rd.md=0: removing MD RAID activation Feb 13 02:40:01.045200 systemd[1]: Starting dracut-pre-trigger.service... Feb 13 02:40:01.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:01.074710 systemd[1]: Finished dracut-pre-trigger.service. Feb 13 02:40:01.086677 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 02:40:01.137682 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 02:40:01.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:01.164470 kernel: cryptd: max_cpu_qlen set to 1000 Feb 13 02:40:01.166465 kernel: libata version 3.00 loaded. Feb 13 02:40:01.166490 kernel: ACPI: bus type USB registered Feb 13 02:40:01.219591 kernel: usbcore: registered new interface driver usbfs Feb 13 02:40:01.219627 kernel: usbcore: registered new interface driver hub Feb 13 02:40:01.219635 kernel: ahci 0000:00:17.0: version 3.0 Feb 13 02:40:01.219720 kernel: usbcore: registered new device driver usb Feb 13 02:40:01.236968 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 8 ports 6 Gbps 0xff impl SATA mode Feb 13 02:40:01.278498 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Feb 13 02:40:01.279464 kernel: AVX2 version of gcm_enc/dec engaged. Feb 13 02:40:01.311669 kernel: AES CTR mode by8 optimization enabled Feb 13 02:40:01.312464 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Feb 13 02:40:01.342528 kernel: scsi host0: ahci Feb 13 02:40:01.342563 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Feb 13 02:40:01.343515 kernel: scsi host1: ahci Feb 13 02:40:01.386089 kernel: scsi host2: ahci Feb 13 02:40:01.386184 kernel: scsi host3: ahci Feb 13 02:40:01.412958 kernel: pps pps0: new PPS source ptp0 Feb 13 02:40:01.413032 kernel: scsi host4: ahci Feb 13 02:40:01.413047 kernel: igb 0000:04:00.0: added PHC on eth0 Feb 13 02:40:01.438872 kernel: scsi host5: ahci Feb 13 02:40:01.438895 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 02:40:01.477158 kernel: scsi host6: ahci Feb 13 02:40:01.477230 kernel: igb 0000:04:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:07:2c Feb 13 02:40:01.477288 kernel: scsi host7: ahci Feb 13 02:40:01.515994 kernel: igb 0000:04:00.0: eth0: PBA No: 010000-000 Feb 13 02:40:01.516063 kernel: ata1: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516100 irq 129 Feb 13 02:40:01.516072 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 02:40:01.560577 kernel: ata2: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516180 irq 129 Feb 13 02:40:01.560593 kernel: pps pps1: new PPS source ptp1 Feb 13 02:40:01.560656 kernel: ata3: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516200 irq 129 Feb 13 02:40:01.571759 kernel: igb 0000:05:00.0: added PHC on eth1 Feb 13 02:40:01.586748 kernel: ata4: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516280 irq 129 Feb 13 02:40:01.613987 kernel: igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection Feb 13 02:40:01.614059 kernel: ata5: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516300 irq 129 Feb 13 02:40:01.628827 kernel: igb 0000:05:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:72:07:2d Feb 13 02:40:01.644490 kernel: ata6: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516380 irq 129 Feb 13 02:40:01.676100 kernel: igb 0000:05:00.0: eth1: PBA No: 010000-000 Feb 13 02:40:01.676172 kernel: ata7: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516400 irq 129 Feb 13 02:40:01.690021 kernel: igb 0000:05:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Feb 13 02:40:01.706523 kernel: ata8: SATA max UDMA/133 abar m2048@0x96516000 port 0x96516480 irq 129 Feb 13 02:40:01.758535 kernel: mlx5_core 0000:02:00.0: firmware version: 14.28.2006 Feb 13 02:40:01.758610 kernel: mlx5_core 0000:02:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 02:40:02.059463 kernel: mlx5_core 0000:02:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 13 02:40:02.059559 kernel: ata3: SATA link down (SStatus 0 SControl 300) Feb 13 02:40:02.082506 kernel: port_module: 8 callbacks suppressed Feb 13 02:40:02.082541 kernel: mlx5_core 0000:02:00.0: Port module event: module 0, Cable plugged Feb 13 02:40:02.082605 kernel: ata5: SATA link down (SStatus 0 SControl 300) Feb 13 02:40:02.115530 kernel: mlx5_core 0000:02:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 02:40:02.115614 kernel: ata6: SATA link down (SStatus 0 SControl 300) Feb 13 02:40:02.165474 kernel: ata8: SATA link down (SStatus 0 SControl 300) Feb 13 02:40:02.181496 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 02:40:02.198496 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Feb 13 02:40:02.214506 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 02:40:02.232531 kernel: ata4: SATA link down (SStatus 0 SControl 300) Feb 13 02:40:02.248545 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Feb 13 02:40:02.266536 kernel: ata7: SATA link down (SStatus 0 SControl 300) Feb 13 02:40:02.317042 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 02:40:02.317057 kernel: ata1.00: Features: NCQ-prio Feb 13 02:40:02.317064 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Feb 13 02:40:02.348735 kernel: ata2.00: Features: NCQ-prio Feb 13 02:40:02.348751 kernel: mlx5_core 0000:02:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 02:40:02.369521 kernel: ata1.00: configured for UDMA/133 Feb 13 02:40:02.384466 kernel: mlx5_core 0000:02:00.1: firmware version: 14.28.2006 Feb 13 02:40:02.384578 kernel: ata2.00: configured for UDMA/133 Feb 13 02:40:02.384587 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 02:40:02.416811 kernel: mlx5_core 0000:02:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Feb 13 02:40:02.417505 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Feb 13 02:40:02.496469 kernel: igb 0000:04:00.0 eno1: renamed from eth0 Feb 13 02:40:02.496561 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 02:40:02.531842 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Feb 13 02:40:02.571307 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Feb 13 02:40:02.571399 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Feb 13 02:40:02.571451 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Feb 13 02:40:02.590687 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Feb 13 02:40:02.625052 kernel: hub 1-0:1.0: USB hub found Feb 13 02:40:02.625149 kernel: igb 0000:05:00.0 eno2: renamed from eth1 Feb 13 02:40:02.625214 kernel: hub 1-0:1.0: 16 ports detected Feb 13 02:40:02.672002 kernel: hub 2-0:1.0: USB hub found Feb 13 02:40:02.672087 kernel: hub 2-0:1.0: 10 ports detected Feb 13 02:40:02.703327 kernel: usb: port power management may be unreliable Feb 13 02:40:02.703462 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 02:40:02.718864 kernel: mlx5_core 0000:02:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Feb 13 02:40:02.718937 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 02:40:02.754340 kernel: mlx5_core 0000:02:00.1: Port module event: module 1, Cable plugged Feb 13 02:40:02.754426 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 02:40:02.754509 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Feb 13 02:40:02.754576 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 13 02:40:02.754631 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 13 02:40:02.754684 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Feb 13 02:40:02.754753 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 02:40:02.754805 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 02:40:02.756463 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 13 02:40:02.756478 kernel: GPT:9289727 != 937703087 Feb 13 02:40:02.756487 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 13 02:40:02.756494 kernel: GPT:9289727 != 937703087 Feb 13 02:40:02.756500 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 13 02:40:02.756506 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 02:40:02.756512 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 02:40:02.756519 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 13 02:40:02.808895 kernel: mlx5_core 0000:02:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 13 02:40:02.808970 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Feb 13 02:40:02.809034 kernel: sd 1:0:0:0: [sdb] Write Protect is off Feb 13 02:40:02.935236 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Feb 13 02:40:02.935264 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Feb 13 02:40:03.012623 kernel: mlx5_core 0000:02:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Feb 13 02:40:03.012694 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 13 02:40:03.112714 kernel: hub 1-14:1.0: USB hub found Feb 13 02:40:03.112806 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 02:40:03.112815 kernel: hub 1-14:1.0: 4 ports detected Feb 13 02:40:03.112874 kernel: ata2.00: Enabling discard_zeroes_data Feb 13 02:40:03.171464 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Feb 13 02:40:03.189464 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: renamed from eth0 Feb 13 02:40:03.214525 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: renamed from eth2 Feb 13 02:40:03.214612 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (562) Feb 13 02:40:03.215086 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 13 02:40:03.244878 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 13 02:40:03.261672 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 13 02:40:03.296376 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 13 02:40:03.318076 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 02:40:03.332924 systemd[1]: Starting disk-uuid.service... Feb 13 02:40:03.354887 disk-uuid[695]: Primary Header is updated. Feb 13 02:40:03.354887 disk-uuid[695]: Secondary Entries is updated. Feb 13 02:40:03.354887 disk-uuid[695]: Secondary Header is updated. Feb 13 02:40:03.417492 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 02:40:03.417505 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 02:40:03.417512 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 02:40:03.417518 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 02:40:03.454467 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Feb 13 02:40:03.603476 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 13 02:40:03.638024 kernel: usbcore: registered new interface driver usbhid Feb 13 02:40:03.638049 kernel: usbhid: USB HID core driver Feb 13 02:40:03.672512 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Feb 13 02:40:03.790815 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Feb 13 02:40:03.790938 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Feb 13 02:40:03.790947 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Feb 13 02:40:04.406027 kernel: ata1.00: Enabling discard_zeroes_data Feb 13 02:40:04.425197 disk-uuid[696]: The operation has completed successfully. Feb 13 02:40:04.433575 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 13 02:40:04.461519 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 13 02:40:04.552427 kernel: audit: type=1130 audit(1707792004.461:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:04.552441 kernel: audit: type=1131 audit(1707792004.461:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:04.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:04.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:04.461575 systemd[1]: Finished disk-uuid.service. Feb 13 02:40:04.582500 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 13 02:40:04.464748 systemd[1]: Starting verity-setup.service... Feb 13 02:40:04.639440 systemd[1]: Found device dev-mapper-usr.device. Feb 13 02:40:04.648446 systemd[1]: Mounting sysusr-usr.mount... Feb 13 02:40:04.654728 systemd[1]: Finished verity-setup.service. Feb 13 02:40:04.735218 kernel: audit: type=1130 audit(1707792004.673:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:04.735232 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 13 02:40:04.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:04.749100 systemd[1]: Mounted sysusr-usr.mount. Feb 13 02:40:04.756761 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 13 02:40:04.757146 systemd[1]: Starting ignition-setup.service... Feb 13 02:40:04.848589 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 02:40:04.848608 kernel: BTRFS info (device sda6): using free space tree Feb 13 02:40:04.848618 kernel: BTRFS info (device sda6): has skinny extents Feb 13 02:40:04.848628 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 02:40:04.792391 systemd[1]: Starting parse-ip-for-networkd.service... Feb 13 02:40:04.866009 systemd[1]: Finished parse-ip-for-networkd.service. Feb 13 02:40:04.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:04.882949 systemd[1]: Finished ignition-setup.service. Feb 13 02:40:04.989780 kernel: audit: type=1130 audit(1707792004.882:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:04.989794 kernel: audit: type=1130 audit(1707792004.940:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:04.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:04.941529 systemd[1]: Starting ignition-fetch-offline.service... Feb 13 02:40:05.020466 kernel: audit: type=1334 audit(1707792004.998:24): prog-id=9 op=LOAD Feb 13 02:40:04.998000 audit: BPF prog-id=9 op=LOAD Feb 13 02:40:04.999516 systemd[1]: Starting systemd-networkd.service... Feb 13 02:40:05.036346 systemd-networkd[869]: lo: Link UP Feb 13 02:40:05.036349 systemd-networkd[869]: lo: Gained carrier Feb 13 02:40:05.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:05.036713 systemd-networkd[869]: Enumeration completed Feb 13 02:40:05.111560 kernel: audit: type=1130 audit(1707792005.044:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:05.036754 systemd[1]: Started systemd-networkd.service. Feb 13 02:40:05.037415 systemd-networkd[869]: enp2s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 02:40:05.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:05.044652 systemd[1]: Reached target network.target. Feb 13 02:40:05.201712 kernel: audit: type=1130 audit(1707792005.134:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:05.130026 ignition[868]: Ignition 2.14.0 Feb 13 02:40:05.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:05.214575 iscsid[879]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 13 02:40:05.214575 iscsid[879]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 13 02:40:05.214575 iscsid[879]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 13 02:40:05.214575 iscsid[879]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 13 02:40:05.214575 iscsid[879]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 13 02:40:05.214575 iscsid[879]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 13 02:40:05.214575 iscsid[879]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 13 02:40:05.396712 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 13 02:40:05.396805 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f1np1: link becomes ready Feb 13 02:40:05.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:05.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:05.105080 systemd[1]: Starting iscsiuio.service... Feb 13 02:40:05.130046 ignition[868]: Stage: fetch-offline Feb 13 02:40:05.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:05.118993 systemd[1]: Started iscsiuio.service. Feb 13 02:40:05.130162 ignition[868]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 02:40:05.136863 systemd[1]: Starting iscsid.service... Feb 13 02:40:05.475635 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 13 02:40:05.130222 ignition[868]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 02:40:05.169862 unknown[868]: fetched base config from "system" Feb 13 02:40:05.140557 ignition[868]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 02:40:05.169866 unknown[868]: fetched user config from "system" Feb 13 02:40:05.140882 ignition[868]: parsed url from cmdline: "" Feb 13 02:40:05.194845 systemd[1]: Started iscsid.service. Feb 13 02:40:05.140891 ignition[868]: no config URL provided Feb 13 02:40:05.208844 systemd[1]: Finished ignition-fetch-offline.service. Feb 13 02:40:05.140904 ignition[868]: reading system config file "/usr/lib/ignition/user.ign" Feb 13 02:40:05.223356 systemd[1]: Starting dracut-initqueue.service... Feb 13 02:40:05.158157 ignition[868]: parsing config with SHA512: fc959aa3ce6babc287802250350596820c1657cddf0e32f7cf4ba2fa020550eb1180b920600d8796cdd8e83acc1998f8bf49469231a42128c748833e8d47cb9b Feb 13 02:40:05.246266 systemd-networkd[869]: enp2s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 02:40:05.170146 ignition[868]: fetch-offline: fetch-offline passed Feb 13 02:40:05.259542 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Feb 13 02:40:05.170149 ignition[868]: POST message to Packet Timeline Feb 13 02:40:05.259921 systemd[1]: Starting ignition-kargs.service... Feb 13 02:40:05.170154 ignition[868]: POST Status error: resource requires networking Feb 13 02:40:05.302653 systemd[1]: Finished dracut-initqueue.service. Feb 13 02:40:05.170184 ignition[868]: Ignition finished successfully Feb 13 02:40:05.332592 systemd[1]: Reached target remote-fs-pre.target. Feb 13 02:40:05.272853 ignition[895]: Ignition 2.14.0 Feb 13 02:40:05.340737 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 02:40:05.272856 ignition[895]: Stage: kargs Feb 13 02:40:05.357718 systemd[1]: Reached target remote-fs.target. Feb 13 02:40:05.272914 ignition[895]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 02:40:05.385815 systemd[1]: Starting dracut-pre-mount.service... Feb 13 02:40:05.272924 ignition[895]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 02:40:05.403795 systemd[1]: Finished dracut-pre-mount.service. Feb 13 02:40:05.275029 ignition[895]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 02:40:05.470981 systemd-networkd[869]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 02:40:05.275658 ignition[895]: kargs: kargs passed Feb 13 02:40:05.500090 systemd-networkd[869]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 13 02:40:05.275661 ignition[895]: POST message to Packet Timeline Feb 13 02:40:05.530347 systemd-networkd[869]: enp2s0f1np1: Link UP Feb 13 02:40:05.275671 ignition[895]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 02:40:05.530811 systemd-networkd[869]: enp2s0f1np1: Gained carrier Feb 13 02:40:05.277071 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:59090->[::1]:53: read: connection refused Feb 13 02:40:05.541952 systemd-networkd[869]: enp2s0f0np0: Link UP Feb 13 02:40:05.477486 ignition[895]: GET https://metadata.packet.net/metadata: attempt #2 Feb 13 02:40:05.542316 systemd-networkd[869]: eno2: Link UP Feb 13 02:40:05.478236 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:59385->[::1]:53: read: connection refused Feb 13 02:40:05.542710 systemd-networkd[869]: eno1: Link UP Feb 13 02:40:05.879349 ignition[895]: GET https://metadata.packet.net/metadata: attempt #3 Feb 13 02:40:05.880720 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:53715->[::1]:53: read: connection refused Feb 13 02:40:06.272498 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp2s0f0np0: link becomes ready Feb 13 02:40:06.272438 systemd-networkd[869]: enp2s0f0np0: Gained carrier Feb 13 02:40:06.302658 systemd-networkd[869]: enp2s0f0np0: DHCPv4 address 136.144.54.113/31, gateway 136.144.54.112 acquired from 145.40.83.140 Feb 13 02:40:06.681133 ignition[895]: GET https://metadata.packet.net/metadata: attempt #4 Feb 13 02:40:06.682444 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:49922->[::1]:53: read: connection refused Feb 13 02:40:07.017918 systemd-networkd[869]: enp2s0f1np1: Gained IPv6LL Feb 13 02:40:08.169929 systemd-networkd[869]: enp2s0f0np0: Gained IPv6LL Feb 13 02:40:08.283631 ignition[895]: GET https://metadata.packet.net/metadata: attempt #5 Feb 13 02:40:08.284895 ignition[895]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:43036->[::1]:53: read: connection refused Feb 13 02:40:11.488404 ignition[895]: GET https://metadata.packet.net/metadata: attempt #6 Feb 13 02:40:11.528939 ignition[895]: GET result: OK Feb 13 02:40:11.724751 ignition[895]: Ignition finished successfully Feb 13 02:40:11.728958 systemd[1]: Finished ignition-kargs.service. Feb 13 02:40:11.814157 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 13 02:40:11.814176 kernel: audit: type=1130 audit(1707792011.739:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:11.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:11.747543 ignition[913]: Ignition 2.14.0 Feb 13 02:40:11.742129 systemd[1]: Starting ignition-disks.service... Feb 13 02:40:11.747547 ignition[913]: Stage: disks Feb 13 02:40:11.747604 ignition[913]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 02:40:11.747615 ignition[913]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 02:40:11.748920 ignition[913]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 02:40:11.750445 ignition[913]: disks: disks passed Feb 13 02:40:11.750448 ignition[913]: POST message to Packet Timeline Feb 13 02:40:11.750462 ignition[913]: GET https://metadata.packet.net/metadata: attempt #1 Feb 13 02:40:11.775223 ignition[913]: GET result: OK Feb 13 02:40:11.984777 ignition[913]: Ignition finished successfully Feb 13 02:40:11.987773 systemd[1]: Finished ignition-disks.service. Feb 13 02:40:11.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.054522 kernel: audit: type=1130 audit(1707792011.999:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.000041 systemd[1]: Reached target initrd-root-device.target. Feb 13 02:40:12.062672 systemd[1]: Reached target local-fs-pre.target. Feb 13 02:40:12.062707 systemd[1]: Reached target local-fs.target. Feb 13 02:40:12.086685 systemd[1]: Reached target sysinit.target. Feb 13 02:40:12.100677 systemd[1]: Reached target basic.target. Feb 13 02:40:12.114326 systemd[1]: Starting systemd-fsck-root.service... Feb 13 02:40:12.132807 systemd-fsck[929]: ROOT: clean, 602/553520 files, 56013/553472 blocks Feb 13 02:40:12.146786 systemd[1]: Finished systemd-fsck-root.service. Feb 13 02:40:12.237216 kernel: audit: type=1130 audit(1707792012.154:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.237233 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 13 02:40:12.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.175023 systemd[1]: Mounting sysroot.mount... Feb 13 02:40:12.246091 systemd[1]: Mounted sysroot.mount. Feb 13 02:40:12.259722 systemd[1]: Reached target initrd-root-fs.target. Feb 13 02:40:12.267297 systemd[1]: Mounting sysroot-usr.mount... Feb 13 02:40:12.293253 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 13 02:40:12.301953 systemd[1]: Starting flatcar-static-network.service... Feb 13 02:40:12.317535 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 13 02:40:12.317566 systemd[1]: Reached target ignition-diskful.target. Feb 13 02:40:12.337195 systemd[1]: Mounted sysroot-usr.mount. Feb 13 02:40:12.360810 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 02:40:12.497606 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (942) Feb 13 02:40:12.497625 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 02:40:12.497633 kernel: BTRFS info (device sda6): using free space tree Feb 13 02:40:12.497640 kernel: BTRFS info (device sda6): has skinny extents Feb 13 02:40:12.497647 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 02:40:12.373140 systemd[1]: Starting initrd-setup-root.service... Feb 13 02:40:12.571226 kernel: audit: type=1130 audit(1707792012.516:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.571265 coreos-metadata[936]: Feb 13 02:40:12.460 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 02:40:12.571265 coreos-metadata[936]: Feb 13 02:40:12.503 INFO Fetch successful Feb 13 02:40:12.571265 coreos-metadata[936]: Feb 13 02:40:12.520 INFO wrote hostname ci-3510.3.2-a-0e0f1f5bff to /sysroot/etc/hostname Feb 13 02:40:12.665081 kernel: audit: type=1130 audit(1707792012.609:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.665121 coreos-metadata[937]: Feb 13 02:40:12.460 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 02:40:12.665121 coreos-metadata[937]: Feb 13 02:40:12.503 INFO Fetch successful Feb 13 02:40:12.801682 kernel: audit: type=1130 audit(1707792012.673:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.801746 kernel: audit: type=1131 audit(1707792012.673:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.801981 initrd-setup-root[947]: cut: /sysroot/etc/passwd: No such file or directory Feb 13 02:40:12.433461 systemd[1]: Finished initrd-setup-root.service. Feb 13 02:40:12.826563 initrd-setup-root[955]: cut: /sysroot/etc/group: No such file or directory Feb 13 02:40:12.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.517612 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 02:40:12.900680 kernel: audit: type=1130 audit(1707792012.835:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.900744 initrd-setup-root[963]: cut: /sysroot/etc/shadow: No such file or directory Feb 13 02:40:12.580796 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 13 02:40:12.919720 initrd-setup-root[971]: cut: /sysroot/etc/gshadow: No such file or directory Feb 13 02:40:12.609751 systemd[1]: flatcar-static-network.service: Deactivated successfully. Feb 13 02:40:12.940679 ignition[1010]: INFO : Ignition 2.14.0 Feb 13 02:40:12.940679 ignition[1010]: INFO : Stage: mount Feb 13 02:40:12.940679 ignition[1010]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 02:40:12.940679 ignition[1010]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 02:40:12.940679 ignition[1010]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 02:40:12.940679 ignition[1010]: INFO : mount: mount passed Feb 13 02:40:12.940679 ignition[1010]: INFO : POST message to Packet Timeline Feb 13 02:40:12.940679 ignition[1010]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 02:40:12.940679 ignition[1010]: INFO : GET result: OK Feb 13 02:40:12.609795 systemd[1]: Finished flatcar-static-network.service. Feb 13 02:40:12.674076 systemd[1]: Starting ignition-mount.service... Feb 13 02:40:12.793035 systemd[1]: Starting sysroot-boot.service... Feb 13 02:40:12.810838 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 13 02:40:13.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:13.119235 ignition[1010]: INFO : Ignition finished successfully Feb 13 02:40:13.134618 kernel: audit: type=1130 audit(1707792013.060:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:12.811062 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 13 02:40:13.180558 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1026) Feb 13 02:40:13.180570 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 13 02:40:12.824452 systemd[1]: Finished sysroot-boot.service. Feb 13 02:40:13.224540 kernel: BTRFS info (device sda6): using free space tree Feb 13 02:40:13.224551 kernel: BTRFS info (device sda6): has skinny extents Feb 13 02:40:13.224558 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 13 02:40:13.049141 systemd[1]: Finished ignition-mount.service. Feb 13 02:40:13.062685 systemd[1]: Starting ignition-files.service... Feb 13 02:40:13.128387 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 13 02:40:13.288726 ignition[1045]: INFO : Ignition 2.14.0 Feb 13 02:40:13.288726 ignition[1045]: INFO : Stage: files Feb 13 02:40:13.288726 ignition[1045]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 02:40:13.288726 ignition[1045]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 02:40:13.288726 ignition[1045]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 02:40:13.288726 ignition[1045]: DEBUG : files: compiled without relabeling support, skipping Feb 13 02:40:13.288726 ignition[1045]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 13 02:40:13.288726 ignition[1045]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 13 02:40:13.288726 ignition[1045]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 13 02:40:13.288726 ignition[1045]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 13 02:40:13.288726 ignition[1045]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 13 02:40:13.288726 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 13 02:40:13.288726 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 13 02:40:13.259376 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 13 02:40:13.285092 unknown[1045]: wrote ssh authorized keys file for user: core Feb 13 02:40:13.935874 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 13 02:40:14.030831 ignition[1045]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 13 02:40:14.030831 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 13 02:40:14.073685 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 13 02:40:14.073685 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 13 02:40:14.433386 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 13 02:40:14.488789 ignition[1045]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 13 02:40:14.488789 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 13 02:40:14.532682 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 13 02:40:14.532682 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 13 02:40:14.725870 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 13 02:40:15.029799 ignition[1045]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 13 02:40:15.029799 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 13 02:40:15.069695 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 13 02:40:15.069695 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 13 02:40:15.102714 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 13 02:40:15.672946 ignition[1045]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 13 02:40:15.672946 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 13 02:40:15.725675 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1054) Feb 13 02:40:15.712870 systemd[1]: mnt-oem2194611420.mount: Deactivated successfully. Feb 13 02:40:15.734533 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 13 02:40:15.734533 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 13 02:40:15.734533 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 13 02:40:15.734533 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 13 02:40:15.734533 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 02:40:15.734533 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 13 02:40:15.734533 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 02:40:15.734533 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 13 02:40:15.734533 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2194611420" Feb 13 02:40:15.734533 ignition[1045]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2194611420": device or resource busy Feb 13 02:40:15.734533 ignition[1045]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2194611420", trying btrfs: device or resource busy Feb 13 02:40:15.734533 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2194611420" Feb 13 02:40:15.734533 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2194611420" Feb 13 02:40:15.734533 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2194611420" Feb 13 02:40:15.734533 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2194611420" Feb 13 02:40:16.043689 kernel: audit: type=1130 audit(1707792015.948:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:15.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:15.930825 systemd[1]: Finished ignition-files.service. Feb 13 02:40:16.057673 ignition[1045]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(e): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(e): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(f): [started] processing unit "packet-phone-home.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(f): [finished] processing unit "packet-phone-home.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(10): [started] processing unit "prepare-critools.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(10): op(11): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(10): op(11): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(10): [finished] processing unit "prepare-critools.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(12): [started] processing unit "prepare-cni-plugins.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(12): op(13): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(12): op(13): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(12): [finished] processing unit "prepare-cni-plugins.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(14): [started] setting preset to enabled for "packet-phone-home.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(14): [finished] setting preset to enabled for "packet-phone-home.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(15): [started] setting preset to enabled for "prepare-critools.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(15): [finished] setting preset to enabled for "prepare-critools.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(16): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 13 02:40:16.057673 ignition[1045]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 13 02:40:16.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:15.954239 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 13 02:40:16.461783 ignition[1045]: INFO : files: op(17): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 02:40:16.461783 ignition[1045]: INFO : files: op(17): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 13 02:40:16.461783 ignition[1045]: INFO : files: createResultFile: createFiles: op(18): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 13 02:40:16.461783 ignition[1045]: INFO : files: createResultFile: createFiles: op(18): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 13 02:40:16.461783 ignition[1045]: INFO : files: files passed Feb 13 02:40:16.461783 ignition[1045]: INFO : POST message to Packet Timeline Feb 13 02:40:16.461783 ignition[1045]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 02:40:16.461783 ignition[1045]: INFO : GET result: OK Feb 13 02:40:16.461783 ignition[1045]: INFO : Ignition finished successfully Feb 13 02:40:16.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.642897 initrd-setup-root-after-ignition[1080]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 13 02:40:16.015731 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 13 02:40:16.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.016041 systemd[1]: Starting ignition-quench.service... Feb 13 02:40:16.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.050841 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 13 02:40:16.067894 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 13 02:40:16.067978 systemd[1]: Finished ignition-quench.service. Feb 13 02:40:16.094090 systemd[1]: Reached target ignition-complete.target. Feb 13 02:40:16.117527 systemd[1]: Starting initrd-parse-etc.service... Feb 13 02:40:16.865431 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 13 02:40:16.865447 kernel: audit: type=1131 audit(1707792016.783:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.162098 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 13 02:40:16.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.929495 kernel: audit: type=1131 audit(1707792016.873:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.162336 systemd[1]: Finished initrd-parse-etc.service. Feb 13 02:40:16.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.168120 systemd[1]: Reached target initrd-fs.target. Feb 13 02:40:17.012728 kernel: audit: type=1131 audit(1707792016.937:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.012742 ignition[1095]: INFO : Ignition 2.14.0 Feb 13 02:40:17.012742 ignition[1095]: INFO : Stage: umount Feb 13 02:40:17.012742 ignition[1095]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 13 02:40:17.012742 ignition[1095]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Feb 13 02:40:17.012742 ignition[1095]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Feb 13 02:40:17.012742 ignition[1095]: INFO : umount: umount passed Feb 13 02:40:17.012742 ignition[1095]: INFO : POST message to Packet Timeline Feb 13 02:40:17.012742 ignition[1095]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Feb 13 02:40:17.012742 ignition[1095]: INFO : GET result: OK Feb 13 02:40:17.458675 kernel: audit: type=1131 audit(1707792017.050:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.458695 kernel: audit: type=1131 audit(1707792017.123:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.458703 kernel: audit: type=1131 audit(1707792017.189:56): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.458715 kernel: audit: type=1131 audit(1707792017.254:57): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.458722 kernel: audit: type=1131 audit(1707792017.322:58): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.458729 kernel: audit: type=1131 audit(1707792017.398:59): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.200728 systemd[1]: Reached target initrd.target. Feb 13 02:40:17.526475 kernel: audit: type=1131 audit(1707792017.467:60): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.526529 iscsid[879]: iscsid shutting down. Feb 13 02:40:17.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.541741 ignition[1095]: INFO : Ignition finished successfully Feb 13 02:40:17.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.224907 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 13 02:40:16.227104 systemd[1]: Starting dracut-pre-pivot.service... Feb 13 02:40:17.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.261597 systemd[1]: Finished dracut-pre-pivot.service. Feb 13 02:40:17.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.282556 systemd[1]: Starting initrd-cleanup.service... Feb 13 02:40:16.316032 systemd[1]: Stopped target nss-lookup.target. Feb 13 02:40:16.325062 systemd[1]: Stopped target remote-cryptsetup.target. Feb 13 02:40:16.346108 systemd[1]: Stopped target timers.target. Feb 13 02:40:16.366066 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 13 02:40:17.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.366432 systemd[1]: Stopped dracut-pre-pivot.service. Feb 13 02:40:17.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.692000 audit: BPF prog-id=6 op=UNLOAD Feb 13 02:40:16.387332 systemd[1]: Stopped target initrd.target. Feb 13 02:40:16.407196 systemd[1]: Stopped target basic.target. Feb 13 02:40:16.429058 systemd[1]: Stopped target ignition-complete.target. Feb 13 02:40:17.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.452193 systemd[1]: Stopped target ignition-diskful.target. Feb 13 02:40:17.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.471180 systemd[1]: Stopped target initrd-root-device.target. Feb 13 02:40:17.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.495203 systemd[1]: Stopped target remote-fs.target. Feb 13 02:40:16.518050 systemd[1]: Stopped target remote-fs-pre.target. Feb 13 02:40:16.542074 systemd[1]: Stopped target sysinit.target. Feb 13 02:40:17.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.567064 systemd[1]: Stopped target local-fs.target. Feb 13 02:40:16.583182 systemd[1]: Stopped target local-fs-pre.target. Feb 13 02:40:16.601187 systemd[1]: Stopped target swap.target. Feb 13 02:40:17.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.617947 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 13 02:40:17.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.618310 systemd[1]: Stopped dracut-pre-mount.service. Feb 13 02:40:17.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.634411 systemd[1]: Stopped target cryptsetup.target. Feb 13 02:40:16.651953 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 13 02:40:17.914000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.652317 systemd[1]: Stopped dracut-initqueue.service. Feb 13 02:40:17.930000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.675344 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 13 02:40:17.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.675725 systemd[1]: Stopped ignition-fetch-offline.service. Feb 13 02:40:17.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:17.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.702398 systemd[1]: Stopped target paths.target. Feb 13 02:40:16.716046 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 13 02:40:16.717707 systemd[1]: Stopped systemd-ask-password-console.path. Feb 13 02:40:16.733068 systemd[1]: Stopped target slices.target. Feb 13 02:40:16.748006 systemd[1]: Stopped target sockets.target. Feb 13 02:40:16.765198 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 13 02:40:16.765613 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 13 02:40:16.784162 systemd[1]: ignition-files.service: Deactivated successfully. Feb 13 02:40:16.784531 systemd[1]: Stopped ignition-files.service. Feb 13 02:40:16.873650 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 13 02:40:18.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:16.873708 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 13 02:40:16.938343 systemd[1]: Stopping ignition-mount.service... Feb 13 02:40:17.005848 systemd[1]: Stopping iscsid.service... Feb 13 02:40:17.021092 systemd[1]: Stopping sysroot-boot.service... Feb 13 02:40:17.035692 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 13 02:40:17.036081 systemd[1]: Stopped systemd-udev-trigger.service. Feb 13 02:40:17.051035 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 13 02:40:17.051341 systemd[1]: Stopped dracut-pre-trigger.service. Feb 13 02:40:17.125053 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 13 02:40:17.125442 systemd[1]: iscsid.service: Deactivated successfully. Feb 13 02:40:17.125492 systemd[1]: Stopped iscsid.service. Feb 13 02:40:17.189893 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 13 02:40:17.189931 systemd[1]: Stopped sysroot-boot.service. Feb 13 02:40:17.254894 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 13 02:40:18.139470 systemd-journald[268]: Received SIGTERM from PID 1 (n/a). Feb 13 02:40:17.254933 systemd[1]: Stopped ignition-mount.service. Feb 13 02:40:17.322917 systemd[1]: iscsid.socket: Deactivated successfully. Feb 13 02:40:17.322963 systemd[1]: Closed iscsid.socket. Feb 13 02:40:17.388698 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 13 02:40:17.388720 systemd[1]: Stopped ignition-disks.service. Feb 13 02:40:17.398820 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 13 02:40:17.398857 systemd[1]: Stopped ignition-kargs.service. Feb 13 02:40:17.467690 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 13 02:40:17.467712 systemd[1]: Stopped ignition-setup.service. Feb 13 02:40:17.534786 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 13 02:40:17.534822 systemd[1]: Stopped initrd-setup-root.service. Feb 13 02:40:17.550828 systemd[1]: Stopping iscsiuio.service... Feb 13 02:40:17.566882 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 13 02:40:17.566937 systemd[1]: Stopped iscsiuio.service. Feb 13 02:40:17.584884 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 13 02:40:17.584946 systemd[1]: Finished initrd-cleanup.service. Feb 13 02:40:17.601436 systemd[1]: Stopped target network.target. Feb 13 02:40:17.615814 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 13 02:40:17.615884 systemd[1]: Closed iscsiuio.socket. Feb 13 02:40:17.631187 systemd[1]: Stopping systemd-networkd.service... Feb 13 02:40:17.640606 systemd-networkd[869]: enp2s0f1np1: DHCPv6 lease lost Feb 13 02:40:17.644999 systemd[1]: Stopping systemd-resolved.service... Feb 13 02:40:17.649582 systemd-networkd[869]: enp2s0f0np0: DHCPv6 lease lost Feb 13 02:40:17.660297 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 13 02:40:18.139000 audit: BPF prog-id=9 op=UNLOAD Feb 13 02:40:17.660559 systemd[1]: Stopped systemd-resolved.service. Feb 13 02:40:17.675526 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 13 02:40:17.675760 systemd[1]: Stopped systemd-networkd.service. Feb 13 02:40:17.691172 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 13 02:40:17.691248 systemd[1]: Closed systemd-networkd.socket. Feb 13 02:40:17.708239 systemd[1]: Stopping network-cleanup.service... Feb 13 02:40:17.721673 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 13 02:40:17.721813 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 13 02:40:17.737820 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 13 02:40:17.737934 systemd[1]: Stopped systemd-sysctl.service. Feb 13 02:40:17.754249 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 13 02:40:17.754390 systemd[1]: Stopped systemd-modules-load.service. Feb 13 02:40:17.770005 systemd[1]: Stopping systemd-udevd.service... Feb 13 02:40:17.788367 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 13 02:40:17.789483 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 13 02:40:17.789541 systemd[1]: Stopped systemd-udevd.service. Feb 13 02:40:17.807048 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 13 02:40:17.807088 systemd[1]: Closed systemd-udevd-control.socket. Feb 13 02:40:17.820644 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 13 02:40:17.820751 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 13 02:40:17.836613 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 13 02:40:17.836866 systemd[1]: Stopped dracut-pre-udev.service. Feb 13 02:40:17.852997 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 13 02:40:17.853145 systemd[1]: Stopped dracut-cmdline.service. Feb 13 02:40:17.868676 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 13 02:40:17.868774 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 13 02:40:17.885243 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 13 02:40:17.899549 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 13 02:40:17.899683 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 13 02:40:17.914838 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 13 02:40:17.914894 systemd[1]: Stopped kmod-static-nodes.service. Feb 13 02:40:17.930827 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 13 02:40:17.930942 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 13 02:40:17.948113 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 13 02:40:17.949360 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 13 02:40:17.949567 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 13 02:40:18.038615 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 13 02:40:18.038656 systemd[1]: Stopped network-cleanup.service. Feb 13 02:40:18.051995 systemd[1]: Reached target initrd-switch-root.target. Feb 13 02:40:18.071291 systemd[1]: Starting initrd-switch-root.service... Feb 13 02:40:18.096120 systemd[1]: Switching root. Feb 13 02:40:18.140754 systemd-journald[268]: Journal stopped Feb 13 02:40:22.082750 kernel: SELinux: Class mctp_socket not defined in policy. Feb 13 02:40:22.082766 kernel: SELinux: Class anon_inode not defined in policy. Feb 13 02:40:22.082773 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 13 02:40:22.082779 kernel: SELinux: policy capability network_peer_controls=1 Feb 13 02:40:22.082785 kernel: SELinux: policy capability open_perms=1 Feb 13 02:40:22.082794 kernel: SELinux: policy capability extended_socket_class=1 Feb 13 02:40:22.082804 kernel: SELinux: policy capability always_check_network=0 Feb 13 02:40:22.082811 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 13 02:40:22.082819 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 13 02:40:22.082824 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 13 02:40:22.082829 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 13 02:40:22.082835 systemd[1]: Successfully loaded SELinux policy in 328.280ms. Feb 13 02:40:22.082842 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.950ms. Feb 13 02:40:22.082849 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 13 02:40:22.082857 systemd[1]: Detected architecture x86-64. Feb 13 02:40:22.082863 systemd[1]: Detected first boot. Feb 13 02:40:22.082869 systemd[1]: Hostname set to . Feb 13 02:40:22.082875 systemd[1]: Initializing machine ID from random generator. Feb 13 02:40:22.082881 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 13 02:40:22.082888 systemd[1]: Populated /etc with preset unit settings. Feb 13 02:40:22.082894 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 02:40:22.082900 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 02:40:22.082907 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 02:40:22.082913 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 13 02:40:22.082919 systemd[1]: Stopped initrd-switch-root.service. Feb 13 02:40:22.082925 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 13 02:40:22.082933 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 13 02:40:22.082940 systemd[1]: Created slice system-addon\x2drun.slice. Feb 13 02:40:22.082946 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 13 02:40:22.082952 systemd[1]: Created slice system-getty.slice. Feb 13 02:40:22.082958 systemd[1]: Created slice system-modprobe.slice. Feb 13 02:40:22.082964 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 13 02:40:22.082971 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 13 02:40:22.082977 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 13 02:40:22.082984 systemd[1]: Created slice user.slice. Feb 13 02:40:22.082990 systemd[1]: Started systemd-ask-password-console.path. Feb 13 02:40:22.082996 systemd[1]: Started systemd-ask-password-wall.path. Feb 13 02:40:22.083004 systemd[1]: Set up automount boot.automount. Feb 13 02:40:22.083015 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 13 02:40:22.083023 systemd[1]: Stopped target initrd-switch-root.target. Feb 13 02:40:22.083031 systemd[1]: Stopped target initrd-fs.target. Feb 13 02:40:22.083037 systemd[1]: Stopped target initrd-root-fs.target. Feb 13 02:40:22.083044 systemd[1]: Reached target integritysetup.target. Feb 13 02:40:22.083051 systemd[1]: Reached target remote-cryptsetup.target. Feb 13 02:40:22.083057 systemd[1]: Reached target remote-fs.target. Feb 13 02:40:22.083064 systemd[1]: Reached target slices.target. Feb 13 02:40:22.083070 systemd[1]: Reached target swap.target. Feb 13 02:40:22.083076 systemd[1]: Reached target torcx.target. Feb 13 02:40:22.083083 systemd[1]: Reached target veritysetup.target. Feb 13 02:40:22.083089 systemd[1]: Listening on systemd-coredump.socket. Feb 13 02:40:22.083095 systemd[1]: Listening on systemd-initctl.socket. Feb 13 02:40:22.083102 systemd[1]: Listening on systemd-networkd.socket. Feb 13 02:40:22.083109 systemd[1]: Listening on systemd-udevd-control.socket. Feb 13 02:40:22.083115 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 13 02:40:22.083122 systemd[1]: Listening on systemd-userdbd.socket. Feb 13 02:40:22.083129 systemd[1]: Mounting dev-hugepages.mount... Feb 13 02:40:22.083136 systemd[1]: Mounting dev-mqueue.mount... Feb 13 02:40:22.083143 systemd[1]: Mounting media.mount... Feb 13 02:40:22.083149 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 02:40:22.083156 systemd[1]: Mounting sys-kernel-debug.mount... Feb 13 02:40:22.083162 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 13 02:40:22.083168 systemd[1]: Mounting tmp.mount... Feb 13 02:40:22.083175 systemd[1]: Starting flatcar-tmpfiles.service... Feb 13 02:40:22.083181 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 13 02:40:22.083188 systemd[1]: Starting kmod-static-nodes.service... Feb 13 02:40:22.083195 systemd[1]: Starting modprobe@configfs.service... Feb 13 02:40:22.083218 systemd[1]: Starting modprobe@dm_mod.service... Feb 13 02:40:22.083224 systemd[1]: Starting modprobe@drm.service... Feb 13 02:40:22.083230 systemd[1]: Starting modprobe@efi_pstore.service... Feb 13 02:40:22.083237 systemd[1]: Starting modprobe@fuse.service... Feb 13 02:40:22.083243 kernel: fuse: init (API version 7.34) Feb 13 02:40:22.083249 systemd[1]: Starting modprobe@loop.service... Feb 13 02:40:22.083255 kernel: loop: module loaded Feb 13 02:40:22.083262 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 13 02:40:22.083269 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 13 02:40:22.083275 systemd[1]: Stopped systemd-fsck-root.service. Feb 13 02:40:22.083281 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 13 02:40:22.083288 systemd[1]: Stopped systemd-fsck-usr.service. Feb 13 02:40:22.083294 kernel: kauditd_printk_skb: 50 callbacks suppressed Feb 13 02:40:22.083299 kernel: audit: type=1131 audit(1707792021.813:104): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.083305 systemd[1]: Stopped systemd-journald.service. Feb 13 02:40:22.083313 kernel: audit: type=1130 audit(1707792021.886:105): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.083319 kernel: audit: type=1131 audit(1707792021.886:106): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.083324 kernel: audit: type=1334 audit(1707792021.968:107): prog-id=15 op=LOAD Feb 13 02:40:22.083330 kernel: audit: type=1334 audit(1707792021.985:108): prog-id=16 op=LOAD Feb 13 02:40:22.083336 kernel: audit: type=1334 audit(1707792022.002:109): prog-id=17 op=LOAD Feb 13 02:40:22.083341 kernel: audit: type=1334 audit(1707792022.019:110): prog-id=13 op=UNLOAD Feb 13 02:40:22.083347 systemd[1]: Starting systemd-journald.service... Feb 13 02:40:22.083353 kernel: audit: type=1334 audit(1707792022.019:111): prog-id=14 op=UNLOAD Feb 13 02:40:22.083360 systemd[1]: Starting systemd-modules-load.service... Feb 13 02:40:22.083366 kernel: audit: type=1305 audit(1707792022.080:112): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 02:40:22.083374 systemd-journald[1248]: Journal started Feb 13 02:40:22.083398 systemd-journald[1248]: Runtime Journal (/run/log/journal/7d912c170f00400b80974b8c6a58b831) is 8.0M, max 639.3M, 631.3M free. Feb 13 02:40:18.627000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 13 02:40:18.902000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 02:40:18.904000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 02:40:18.904000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 13 02:40:18.904000 audit: BPF prog-id=10 op=LOAD Feb 13 02:40:18.904000 audit: BPF prog-id=10 op=UNLOAD Feb 13 02:40:18.904000 audit: BPF prog-id=11 op=LOAD Feb 13 02:40:18.904000 audit: BPF prog-id=11 op=UNLOAD Feb 13 02:40:18.982000 audit[1137]: AVC avc: denied { associate } for pid=1137 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 13 02:40:18.982000 audit[1137]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a78dc a1=c00002ce58 a2=c00002bb00 a3=32 items=0 ppid=1120 pid=1137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:18.982000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 02:40:19.009000 audit[1137]: AVC avc: denied { associate } for pid=1137 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 13 02:40:19.009000 audit[1137]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a79b5 a2=1ed a3=0 items=2 ppid=1120 pid=1137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:19.009000 audit: CWD cwd="/" Feb 13 02:40:19.009000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:19.009000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:19.009000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 13 02:40:20.517000 audit: BPF prog-id=12 op=LOAD Feb 13 02:40:20.517000 audit: BPF prog-id=3 op=UNLOAD Feb 13 02:40:20.517000 audit: BPF prog-id=13 op=LOAD Feb 13 02:40:20.517000 audit: BPF prog-id=14 op=LOAD Feb 13 02:40:20.517000 audit: BPF prog-id=4 op=UNLOAD Feb 13 02:40:20.517000 audit: BPF prog-id=5 op=UNLOAD Feb 13 02:40:20.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:20.543000 audit: BPF prog-id=12 op=UNLOAD Feb 13 02:40:20.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:20.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:21.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:21.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:21.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:21.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:21.968000 audit: BPF prog-id=15 op=LOAD Feb 13 02:40:21.985000 audit: BPF prog-id=16 op=LOAD Feb 13 02:40:22.002000 audit: BPF prog-id=17 op=LOAD Feb 13 02:40:22.019000 audit: BPF prog-id=13 op=UNLOAD Feb 13 02:40:22.019000 audit: BPF prog-id=14 op=UNLOAD Feb 13 02:40:22.080000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 13 02:40:18.980497 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 02:40:20.515672 systemd[1]: Queued start job for default target multi-user.target. Feb 13 02:40:18.981045 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 02:40:20.518315 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 13 02:40:18.981056 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 02:40:18.981075 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 13 02:40:18.981081 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 13 02:40:18.981099 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 13 02:40:18.981106 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 13 02:40:18.981220 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 13 02:40:18.981240 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 13 02:40:18.981248 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 13 02:40:18.981823 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 13 02:40:18.981842 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 13 02:40:18.981852 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 13 02:40:18.981860 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 13 02:40:18.981869 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 13 02:40:18.981877 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 13 02:40:20.169439 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:20Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 02:40:20.169582 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:20Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 02:40:20.169637 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:20Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 02:40:20.169733 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:20Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 13 02:40:20.169763 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:20Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 13 02:40:20.169797 /usr/lib/systemd/system-generators/torcx-generator[1137]: time="2024-02-13T02:40:20Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 13 02:40:22.080000 audit[1248]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffe556a30a0 a2=4000 a3=7ffe556a313c items=0 ppid=1 pid=1248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:22.080000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 13 02:40:22.131470 kernel: audit: type=1300 audit(1707792022.080:112): arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffe556a30a0 a2=4000 a3=7ffe556a313c items=0 ppid=1 pid=1248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:22.227507 systemd[1]: Starting systemd-network-generator.service... Feb 13 02:40:22.255649 systemd[1]: Starting systemd-remount-fs.service... Feb 13 02:40:22.281508 systemd[1]: Starting systemd-udev-trigger.service... Feb 13 02:40:22.324670 systemd[1]: verity-setup.service: Deactivated successfully. Feb 13 02:40:22.324698 systemd[1]: Stopped verity-setup.service. Feb 13 02:40:22.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.370509 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 13 02:40:22.370531 systemd[1]: Started systemd-journald.service. Feb 13 02:40:22.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.398093 systemd[1]: Mounted dev-hugepages.mount. Feb 13 02:40:22.405822 systemd[1]: Mounted dev-mqueue.mount. Feb 13 02:40:22.412714 systemd[1]: Mounted media.mount. Feb 13 02:40:22.419727 systemd[1]: Mounted sys-kernel-debug.mount. Feb 13 02:40:22.428713 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 13 02:40:22.436724 systemd[1]: Mounted tmp.mount. Feb 13 02:40:22.443801 systemd[1]: Finished flatcar-tmpfiles.service. Feb 13 02:40:22.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.452806 systemd[1]: Finished kmod-static-nodes.service. Feb 13 02:40:22.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.460806 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 13 02:40:22.460913 systemd[1]: Finished modprobe@configfs.service. Feb 13 02:40:22.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.469924 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 13 02:40:22.470100 systemd[1]: Finished modprobe@dm_mod.service. Feb 13 02:40:22.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.479070 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 13 02:40:22.479312 systemd[1]: Finished modprobe@drm.service. Feb 13 02:40:22.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.488302 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 13 02:40:22.488618 systemd[1]: Finished modprobe@efi_pstore.service. Feb 13 02:40:22.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.497277 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 13 02:40:22.497678 systemd[1]: Finished modprobe@fuse.service. Feb 13 02:40:22.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.505000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.506253 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 13 02:40:22.506563 systemd[1]: Finished modprobe@loop.service. Feb 13 02:40:22.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.515300 systemd[1]: Finished systemd-modules-load.service. Feb 13 02:40:22.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.524355 systemd[1]: Finished systemd-network-generator.service. Feb 13 02:40:22.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.533245 systemd[1]: Finished systemd-remount-fs.service. Feb 13 02:40:22.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.542273 systemd[1]: Finished systemd-udev-trigger.service. Feb 13 02:40:22.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.551836 systemd[1]: Reached target network-pre.target. Feb 13 02:40:22.563451 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 13 02:40:22.574162 systemd[1]: Mounting sys-kernel-config.mount... Feb 13 02:40:22.580725 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 13 02:40:22.584003 systemd[1]: Starting systemd-hwdb-update.service... Feb 13 02:40:22.591026 systemd[1]: Starting systemd-journal-flush.service... Feb 13 02:40:22.594408 systemd-journald[1248]: Time spent on flushing to /var/log/journal/7d912c170f00400b80974b8c6a58b831 is 15.653ms for 1627 entries. Feb 13 02:40:22.594408 systemd-journald[1248]: System Journal (/var/log/journal/7d912c170f00400b80974b8c6a58b831) is 8.0M, max 195.6M, 187.6M free. Feb 13 02:40:22.635208 systemd-journald[1248]: Received client request to flush runtime journal. Feb 13 02:40:22.607625 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 13 02:40:22.609012 systemd[1]: Starting systemd-random-seed.service... Feb 13 02:40:22.624566 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 13 02:40:22.625265 systemd[1]: Starting systemd-sysctl.service... Feb 13 02:40:22.632455 systemd[1]: Starting systemd-sysusers.service... Feb 13 02:40:22.640064 systemd[1]: Starting systemd-udev-settle.service... Feb 13 02:40:22.647598 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 13 02:40:22.656636 systemd[1]: Mounted sys-kernel-config.mount. Feb 13 02:40:22.664658 systemd[1]: Finished systemd-journal-flush.service. Feb 13 02:40:22.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.672683 systemd[1]: Finished systemd-random-seed.service. Feb 13 02:40:22.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.680673 systemd[1]: Finished systemd-sysctl.service. Feb 13 02:40:22.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.688662 systemd[1]: Finished systemd-sysusers.service. Feb 13 02:40:22.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.697639 systemd[1]: Reached target first-boot-complete.target. Feb 13 02:40:22.706152 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 13 02:40:22.715560 udevadm[1264]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 13 02:40:22.724120 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 13 02:40:22.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.888402 systemd[1]: Finished systemd-hwdb-update.service. Feb 13 02:40:22.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.897000 audit: BPF prog-id=18 op=LOAD Feb 13 02:40:22.898000 audit: BPF prog-id=19 op=LOAD Feb 13 02:40:22.898000 audit: BPF prog-id=7 op=UNLOAD Feb 13 02:40:22.898000 audit: BPF prog-id=8 op=UNLOAD Feb 13 02:40:22.898840 systemd[1]: Starting systemd-udevd.service... Feb 13 02:40:22.910560 systemd-udevd[1267]: Using default interface naming scheme 'v252'. Feb 13 02:40:22.928041 systemd[1]: Started systemd-udevd.service. Feb 13 02:40:22.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:22.939977 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Feb 13 02:40:22.940000 audit: BPF prog-id=20 op=LOAD Feb 13 02:40:22.941320 systemd[1]: Starting systemd-networkd.service... Feb 13 02:40:22.964000 audit: BPF prog-id=21 op=LOAD Feb 13 02:40:22.964000 audit: BPF prog-id=22 op=LOAD Feb 13 02:40:22.964000 audit: BPF prog-id=23 op=LOAD Feb 13 02:40:22.965276 systemd[1]: Starting systemd-userdbd.service... Feb 13 02:40:22.965544 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Feb 13 02:40:22.985469 kernel: ACPI: button: Sleep Button [SLPB] Feb 13 02:40:22.985528 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1274) Feb 13 02:40:22.985544 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 13 02:40:23.016582 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 13 02:40:23.051465 kernel: mousedev: PS/2 mouse device common for all mice Feb 13 02:40:23.051499 kernel: ACPI: button: Power Button [PWRF] Feb 13 02:40:22.999000 audit[1339]: AVC avc: denied { confidentiality } for pid=1339 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 13 02:40:23.089470 kernel: IPMI message handler: version 39.2 Feb 13 02:40:23.118733 systemd[1]: Started systemd-userdbd.service. Feb 13 02:40:22.999000 audit[1339]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f819b94810 a1=4d8bc a2=7f7db30a7bc5 a3=5 items=42 ppid=1267 pid=1339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:22.999000 audit: CWD cwd="/" Feb 13 02:40:22.999000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=1 name=(null) inode=28703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=2 name=(null) inode=28703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=3 name=(null) inode=28704 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=4 name=(null) inode=28703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=5 name=(null) inode=28705 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=6 name=(null) inode=28703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=7 name=(null) inode=28706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=8 name=(null) inode=28706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=9 name=(null) inode=28707 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=10 name=(null) inode=28706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=11 name=(null) inode=28708 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=12 name=(null) inode=28706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=13 name=(null) inode=28709 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=14 name=(null) inode=28706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=15 name=(null) inode=28710 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=16 name=(null) inode=28706 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=17 name=(null) inode=28711 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=18 name=(null) inode=28703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=19 name=(null) inode=28712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=20 name=(null) inode=28712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=21 name=(null) inode=28713 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=22 name=(null) inode=28712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=23 name=(null) inode=28714 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=24 name=(null) inode=28712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=25 name=(null) inode=28715 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=26 name=(null) inode=28712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=27 name=(null) inode=28716 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=28 name=(null) inode=28712 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=29 name=(null) inode=28717 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=30 name=(null) inode=28703 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=31 name=(null) inode=28718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=32 name=(null) inode=28718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=33 name=(null) inode=28719 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=34 name=(null) inode=28718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=35 name=(null) inode=28720 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=36 name=(null) inode=28718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=37 name=(null) inode=28721 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=38 name=(null) inode=28718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=39 name=(null) inode=28722 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=40 name=(null) inode=28718 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PATH item=41 name=(null) inode=28723 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:40:22.999000 audit: PROCTITLE proctitle="(udev-worker)" Feb 13 02:40:23.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:23.139503 kernel: ipmi device interface Feb 13 02:40:23.139541 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Feb 13 02:40:23.178796 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Feb 13 02:40:23.199469 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Feb 13 02:40:23.243523 kernel: ipmi_si: IPMI System Interface driver Feb 13 02:40:23.243548 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Feb 13 02:40:23.243616 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Feb 13 02:40:23.264508 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Feb 13 02:40:23.283955 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Feb 13 02:40:23.325464 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Feb 13 02:40:23.329464 kernel: iTCO_vendor_support: vendor-support=0 Feb 13 02:40:23.329488 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Feb 13 02:40:23.329579 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Feb 13 02:40:23.426229 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Feb 13 02:40:23.426422 kernel: ipmi_si: Adding ACPI-specified kcs state machine Feb 13 02:40:23.426447 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Feb 13 02:40:23.480471 kernel: iTCO_wdt iTCO_wdt: unable to reset NO_REBOOT flag, device disabled by hardware/BIOS Feb 13 02:40:23.480764 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Feb 13 02:40:23.550123 systemd-networkd[1311]: bond0: netdev ready Feb 13 02:40:23.552574 systemd-networkd[1311]: lo: Link UP Feb 13 02:40:23.552577 systemd-networkd[1311]: lo: Gained carrier Feb 13 02:40:23.553048 systemd-networkd[1311]: Enumeration completed Feb 13 02:40:23.553109 systemd[1]: Started systemd-networkd.service. Feb 13 02:40:23.553329 systemd-networkd[1311]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Feb 13 02:40:23.561210 systemd-networkd[1311]: enp2s0f1np1: Configuring with /etc/systemd/network/10-04:3f:72:d7:77:67.network. Feb 13 02:40:23.568327 kernel: intel_rapl_common: Found RAPL domain package Feb 13 02:40:23.568364 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b11, dev_id: 0x20) Feb 13 02:40:23.568479 kernel: intel_rapl_common: Found RAPL domain core Feb 13 02:40:23.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:23.604212 kernel: intel_rapl_common: Found RAPL domain uncore Feb 13 02:40:23.604236 kernel: intel_rapl_common: Found RAPL domain dram Feb 13 02:40:23.665463 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Feb 13 02:40:23.684498 kernel: ipmi_ssif: IPMI SSIF Interface driver Feb 13 02:40:23.687735 systemd[1]: Finished systemd-udev-settle.service. Feb 13 02:40:23.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:23.696213 systemd[1]: Starting lvm2-activation-early.service... Feb 13 02:40:23.712017 lvm[1371]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 02:40:23.739915 systemd[1]: Finished lvm2-activation-early.service. Feb 13 02:40:23.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:23.748546 systemd[1]: Reached target cryptsetup.target. Feb 13 02:40:23.757196 systemd[1]: Starting lvm2-activation.service... Feb 13 02:40:23.759363 lvm[1372]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 13 02:40:23.785957 systemd[1]: Finished lvm2-activation.service. Feb 13 02:40:23.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:23.794556 systemd[1]: Reached target local-fs-pre.target. Feb 13 02:40:23.802561 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 13 02:40:23.802576 systemd[1]: Reached target local-fs.target. Feb 13 02:40:23.810505 systemd[1]: Reached target machines.target. Feb 13 02:40:23.819188 systemd[1]: Starting ldconfig.service... Feb 13 02:40:23.826231 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 13 02:40:23.826252 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 02:40:23.826887 systemd[1]: Starting systemd-boot-update.service... Feb 13 02:40:23.833947 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 13 02:40:23.844188 systemd[1]: Starting systemd-machine-id-commit.service... Feb 13 02:40:23.844286 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 13 02:40:23.844312 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 13 02:40:23.844816 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 13 02:40:23.845021 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1374 (bootctl) Feb 13 02:40:23.845788 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 13 02:40:23.854814 systemd-tmpfiles[1378]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 13 02:40:23.858432 systemd-tmpfiles[1378]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 13 02:40:23.864879 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 13 02:40:23.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:23.865867 systemd-tmpfiles[1378]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 13 02:40:24.136517 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 13 02:40:24.162463 kernel: bond0: (slave enp2s0f1np1): Enslaving as a backup interface with an up link Feb 13 02:40:24.163094 systemd-networkd[1311]: enp2s0f0np0: Configuring with /etc/systemd/network/10-04:3f:72:d7:77:66.network. Feb 13 02:40:24.199464 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 02:40:24.211678 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 13 02:40:24.212112 systemd[1]: Finished systemd-machine-id-commit.service. Feb 13 02:40:24.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:24.238949 systemd-fsck[1383]: fsck.fat 4.2 (2021-01-31) Feb 13 02:40:24.238949 systemd-fsck[1383]: /dev/sda1: 789 files, 115339/258078 clusters Feb 13 02:40:24.239670 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 13 02:40:24.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:24.252351 systemd[1]: Mounting boot.mount... Feb 13 02:40:24.269234 systemd[1]: Mounted boot.mount. Feb 13 02:40:24.287036 systemd[1]: Finished systemd-boot-update.service. Feb 13 02:40:24.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:24.312463 kernel: mlx5_core 0000:02:00.0 enp2s0f0np0: Link up Feb 13 02:40:24.312627 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 02:40:24.318383 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 13 02:40:24.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:24.350165 systemd[1]: Starting audit-rules.service... Feb 13 02:40:24.356469 kernel: bond0: (slave enp2s0f0np0): Enslaving as a backup interface with an up link Feb 13 02:40:24.356502 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Feb 13 02:40:24.372000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 13 02:40:24.372000 audit[1403]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdbf86e5e0 a2=420 a3=0 items=0 ppid=1388 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:24.372000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 13 02:40:24.372974 augenrules[1403]: No rules Feb 13 02:40:24.374379 systemd[1]: Starting clean-ca-certificates.service... Feb 13 02:40:24.375765 systemd-networkd[1311]: bond0: Link UP Feb 13 02:40:24.375951 systemd-networkd[1311]: enp2s0f1np1: Link UP Feb 13 02:40:24.376081 systemd-networkd[1311]: enp2s0f1np1: Gained carrier Feb 13 02:40:24.377022 systemd-networkd[1311]: enp2s0f1np1: Reconfiguring with /etc/systemd/network/10-04:3f:72:d7:77:66.network. Feb 13 02:40:24.383165 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 13 02:40:24.392488 systemd[1]: Starting systemd-resolved.service... Feb 13 02:40:24.400480 systemd[1]: Starting systemd-timesyncd.service... Feb 13 02:40:24.408986 systemd[1]: Starting systemd-update-utmp.service... Feb 13 02:40:24.422803 systemd[1]: Finished audit-rules.service. Feb 13 02:40:24.431462 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.444681 systemd[1]: Finished clean-ca-certificates.service. Feb 13 02:40:24.453462 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.454499 ldconfig[1373]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 13 02:40:24.468672 systemd[1]: Finished ldconfig.service. Feb 13 02:40:24.473461 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.488671 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 13 02:40:24.493462 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.511325 systemd[1]: Starting systemd-update-done.service... Feb 13 02:40:24.513497 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.527571 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 13 02:40:24.528098 systemd[1]: Finished systemd-update-done.service. Feb 13 02:40:24.532464 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.548210 systemd[1]: Finished systemd-update-utmp.service. Feb 13 02:40:24.553462 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.573462 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.579578 systemd-resolved[1411]: Positive Trust Anchors: Feb 13 02:40:24.579583 systemd-resolved[1411]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 13 02:40:24.579602 systemd-resolved[1411]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 13 02:40:24.583394 systemd-resolved[1411]: Using system hostname 'ci-3510.3.2-a-0e0f1f5bff'. Feb 13 02:40:24.591464 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.595902 systemd[1]: Started systemd-timesyncd.service. Feb 13 02:40:24.610463 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.625583 systemd[1]: Reached target time-set.target. Feb 13 02:40:24.629461 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.649462 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.667464 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.685463 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.703465 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.721469 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.737466 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.738507 systemd-networkd[1311]: enp2s0f0np0: Link UP Feb 13 02:40:24.738724 systemd-networkd[1311]: bond0: Gained carrier Feb 13 02:40:24.738839 systemd-networkd[1311]: enp2s0f0np0: Gained carrier Feb 13 02:40:24.738895 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 02:40:24.739585 systemd[1]: Started systemd-resolved.service. Feb 13 02:40:24.754472 kernel: bond0: (slave enp2s0f1np1): link status down again after 200 ms Feb 13 02:40:24.754535 kernel: bond0: (slave enp2s0f1np1): link status definitely down, disabling slave Feb 13 02:40:24.754555 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Feb 13 02:40:24.780725 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 02:40:24.787764 systemd[1]: Reached target network.target. Feb 13 02:40:24.804114 systemd-networkd[1311]: enp2s0f1np1: Link DOWN Feb 13 02:40:24.804116 systemd-networkd[1311]: enp2s0f1np1: Lost carrier Feb 13 02:40:24.804461 kernel: bond0: (slave enp2s0f0np0): link status definitely up, 10000 Mbps full duplex Feb 13 02:40:24.804500 kernel: bond0: active interface up! Feb 13 02:40:24.821608 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 02:40:24.821775 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 02:40:24.823502 systemd[1]: Reached target nss-lookup.target. Feb 13 02:40:24.831503 systemd[1]: Reached target sysinit.target. Feb 13 02:40:24.840538 systemd[1]: Started motdgen.path. Feb 13 02:40:24.847512 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 13 02:40:24.856570 systemd[1]: Started logrotate.timer. Feb 13 02:40:24.863590 systemd[1]: Started mdadm.timer. Feb 13 02:40:24.870500 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 13 02:40:24.878519 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 13 02:40:24.878535 systemd[1]: Reached target paths.target. Feb 13 02:40:24.885491 systemd[1]: Reached target timers.target. Feb 13 02:40:24.892639 systemd[1]: Listening on dbus.socket. Feb 13 02:40:24.900077 systemd[1]: Starting docker.socket... Feb 13 02:40:24.907899 systemd[1]: Listening on sshd.socket. Feb 13 02:40:24.914549 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 02:40:24.914797 systemd[1]: Listening on docker.socket. Feb 13 02:40:24.921527 systemd[1]: Reached target sockets.target. Feb 13 02:40:24.927864 systemd[1]: Reached target basic.target. Feb 13 02:40:24.934562 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 02:40:24.934577 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 13 02:40:24.935041 systemd[1]: Starting containerd.service... Feb 13 02:40:24.942884 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 13 02:40:24.951973 systemd[1]: Starting coreos-metadata.service... Feb 13 02:40:24.959995 systemd[1]: Starting dbus.service... Feb 13 02:40:24.971473 systemd[1]: Starting enable-oem-cloudinit.service... Feb 13 02:40:24.973227 coreos-metadata[1422]: Feb 13 02:40:24.973 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 02:40:24.977039 jq[1429]: false Feb 13 02:40:24.978982 dbus-daemon[1428]: [system] SELinux support is enabled Feb 13 02:40:24.979464 kernel: mlx5_core 0000:02:00.1 enp2s0f1np1: Link up Feb 13 02:40:24.984643 systemd-networkd[1311]: enp2s0f1np1: Link UP Feb 13 02:40:24.984796 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 02:40:24.984807 systemd-networkd[1311]: enp2s0f1np1: Gained carrier Feb 13 02:40:24.984834 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 02:40:24.986496 coreos-metadata[1425]: Feb 13 02:40:24.986 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Feb 13 02:40:24.987043 systemd[1]: Starting extend-filesystems.service... Feb 13 02:40:24.993194 coreos-metadata[1422]: Feb 13 02:40:24.993 INFO Fetch successful Feb 13 02:40:24.993506 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 13 02:40:24.994045 extend-filesystems[1432]: Found sda Feb 13 02:40:24.994236 extend-filesystems[1432]: Found sda1 Feb 13 02:40:24.994236 extend-filesystems[1432]: Found sda2 Feb 13 02:40:24.994236 extend-filesystems[1432]: Found sda3 Feb 13 02:40:24.994236 extend-filesystems[1432]: Found usr Feb 13 02:40:24.994236 extend-filesystems[1432]: Found sda4 Feb 13 02:40:25.100617 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Feb 13 02:40:25.100639 kernel: bond0: (slave enp2s0f1np1): link status up, enabling it in 200 ms Feb 13 02:40:25.100649 kernel: bond0: (slave enp2s0f1np1): invalid new link 3 on slave Feb 13 02:40:24.994176 systemd[1]: Starting motdgen.service... Feb 13 02:40:25.100700 extend-filesystems[1432]: Found sda6 Feb 13 02:40:25.100700 extend-filesystems[1432]: Found sda7 Feb 13 02:40:25.100700 extend-filesystems[1432]: Found sda9 Feb 13 02:40:25.100700 extend-filesystems[1432]: Checking size of /dev/sda9 Feb 13 02:40:25.100700 extend-filesystems[1432]: Resized partition /dev/sda9 Feb 13 02:40:25.162570 coreos-metadata[1425]: Feb 13 02:40:25.005 INFO Fetch successful Feb 13 02:40:25.000891 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 02:40:25.162637 extend-filesystems[1446]: resize2fs 1.46.5 (30-Dec-2021) Feb 13 02:40:25.000948 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 02:40:25.001103 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 02:40:25.005380 systemd[1]: Starting prepare-cni-plugins.service... Feb 13 02:40:25.023583 unknown[1422]: wrote ssh authorized keys file for user: core Feb 13 02:40:25.058206 systemd[1]: Starting prepare-critools.service... Feb 13 02:40:25.072002 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 13 02:40:25.086005 systemd[1]: Starting sshd-keygen.service... Feb 13 02:40:25.179177 jq[1461]: true Feb 13 02:40:25.108811 systemd[1]: Starting systemd-logind.service... Feb 13 02:40:25.121496 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 13 02:40:25.122033 systemd[1]: Starting tcsd.service... Feb 13 02:40:25.130863 systemd-logind[1458]: Watching system buttons on /dev/input/event3 (Power Button) Feb 13 02:40:25.130872 systemd-logind[1458]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 13 02:40:25.130880 systemd-logind[1458]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Feb 13 02:40:25.130987 systemd-logind[1458]: New seat seat0. Feb 13 02:40:25.139729 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 13 02:40:25.140076 systemd[1]: Starting update-engine.service... Feb 13 02:40:25.155129 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 13 02:40:25.170798 systemd[1]: Started dbus.service. Feb 13 02:40:25.180702 update_engine[1460]: I0213 02:40:25.180142 1460 main.cc:92] Flatcar Update Engine starting Feb 13 02:40:25.183781 update_engine[1460]: I0213 02:40:25.183771 1460 update_check_scheduler.cc:74] Next update check in 8m27s Feb 13 02:40:25.187927 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 13 02:40:25.188015 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 13 02:40:25.188180 systemd[1]: motdgen.service: Deactivated successfully. Feb 13 02:40:25.188251 systemd[1]: Finished motdgen.service. Feb 13 02:40:25.195228 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 13 02:40:25.195311 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 13 02:40:25.205364 systemd[1]: Finished coreos-metadata.service. Feb 13 02:40:25.207662 jq[1467]: true Feb 13 02:40:25.212689 tar[1465]: ./ Feb 13 02:40:25.212689 tar[1465]: ./loopback Feb 13 02:40:25.216231 dbus-daemon[1428]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 13 02:40:25.216971 tar[1466]: crictl Feb 13 02:40:25.221308 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Feb 13 02:40:25.221408 systemd[1]: Condition check resulted in tcsd.service being skipped. Feb 13 02:40:25.221563 update-ssh-keys[1463]: Updated "/home/core/.ssh/authorized_keys" Feb 13 02:40:25.221672 env[1468]: time="2024-02-13T02:40:25.221575613Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 13 02:40:25.222534 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 13 02:40:25.230467 env[1468]: time="2024-02-13T02:40:25.230420717Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 13 02:40:25.230511 env[1468]: time="2024-02-13T02:40:25.230489658Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 13 02:40:25.231113 env[1468]: time="2024-02-13T02:40:25.231066128Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 13 02:40:25.231113 env[1468]: time="2024-02-13T02:40:25.231082083Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 13 02:40:25.233150 env[1468]: time="2024-02-13T02:40:25.233113471Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 02:40:25.233150 env[1468]: time="2024-02-13T02:40:25.233132384Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 13 02:40:25.233150 env[1468]: time="2024-02-13T02:40:25.233140755Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 13 02:40:25.233150 env[1468]: time="2024-02-13T02:40:25.233146375Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 13 02:40:25.233235 env[1468]: time="2024-02-13T02:40:25.233206851Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 13 02:40:25.233499 env[1468]: time="2024-02-13T02:40:25.233444539Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 13 02:40:25.233714 env[1468]: time="2024-02-13T02:40:25.233683495Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 13 02:40:25.233761 env[1468]: time="2024-02-13T02:40:25.233712962Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 13 02:40:25.233868 env[1468]: time="2024-02-13T02:40:25.233810648Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 13 02:40:25.233932 env[1468]: time="2024-02-13T02:40:25.233918478Z" level=info msg="metadata content store policy set" policy=shared Feb 13 02:40:25.236780 systemd[1]: Started systemd-logind.service. Feb 13 02:40:25.241282 env[1468]: time="2024-02-13T02:40:25.241270385Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 13 02:40:25.241314 env[1468]: time="2024-02-13T02:40:25.241286480Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 13 02:40:25.241314 env[1468]: time="2024-02-13T02:40:25.241294981Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 13 02:40:25.241347 env[1468]: time="2024-02-13T02:40:25.241312799Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 13 02:40:25.241347 env[1468]: time="2024-02-13T02:40:25.241325847Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 13 02:40:25.241347 env[1468]: time="2024-02-13T02:40:25.241334164Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 13 02:40:25.241347 env[1468]: time="2024-02-13T02:40:25.241341106Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 13 02:40:25.243238 env[1468]: time="2024-02-13T02:40:25.241350090Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 13 02:40:25.243238 env[1468]: time="2024-02-13T02:40:25.241359314Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 13 02:40:25.243238 env[1468]: time="2024-02-13T02:40:25.241373837Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 13 02:40:25.243238 env[1468]: time="2024-02-13T02:40:25.241384697Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 13 02:40:25.243238 env[1468]: time="2024-02-13T02:40:25.241392168Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 13 02:40:25.243238 env[1468]: time="2024-02-13T02:40:25.242835093Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 13 02:40:25.243238 env[1468]: time="2024-02-13T02:40:25.243225762Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 13 02:40:25.243363 env[1468]: time="2024-02-13T02:40:25.243354742Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 13 02:40:25.243381 env[1468]: time="2024-02-13T02:40:25.243371610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 13 02:40:25.243398 env[1468]: time="2024-02-13T02:40:25.243380397Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 13 02:40:25.243415 bash[1499]: Updated "/home/core/.ssh/authorized_keys" Feb 13 02:40:25.243525 env[1468]: time="2024-02-13T02:40:25.243407105Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 13 02:40:25.243525 env[1468]: time="2024-02-13T02:40:25.243415074Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 13 02:40:25.243525 env[1468]: time="2024-02-13T02:40:25.243424115Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 13 02:40:25.243525 env[1468]: time="2024-02-13T02:40:25.243430905Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 13 02:40:25.243525 env[1468]: time="2024-02-13T02:40:25.243439392Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 13 02:40:25.243525 env[1468]: time="2024-02-13T02:40:25.243446424Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 13 02:40:25.243525 env[1468]: time="2024-02-13T02:40:25.243452928Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 13 02:40:25.243525 env[1468]: time="2024-02-13T02:40:25.243462278Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 13 02:40:25.243525 env[1468]: time="2024-02-13T02:40:25.243472233Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 13 02:40:25.243664 env[1468]: time="2024-02-13T02:40:25.243537126Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 13 02:40:25.243664 env[1468]: time="2024-02-13T02:40:25.243551895Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 13 02:40:25.243664 env[1468]: time="2024-02-13T02:40:25.243559225Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 13 02:40:25.243664 env[1468]: time="2024-02-13T02:40:25.243565462Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 13 02:40:25.243664 env[1468]: time="2024-02-13T02:40:25.243572802Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 13 02:40:25.243664 env[1468]: time="2024-02-13T02:40:25.243579481Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 13 02:40:25.243664 env[1468]: time="2024-02-13T02:40:25.243589849Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 13 02:40:25.243664 env[1468]: time="2024-02-13T02:40:25.243611281Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 13 02:40:25.243800 env[1468]: time="2024-02-13T02:40:25.243725293Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 13 02:40:25.243800 env[1468]: time="2024-02-13T02:40:25.243756109Z" level=info msg="Connect containerd service" Feb 13 02:40:25.243800 env[1468]: time="2024-02-13T02:40:25.243775257Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 13 02:40:25.245491 env[1468]: time="2024-02-13T02:40:25.244048051Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 02:40:25.245491 env[1468]: time="2024-02-13T02:40:25.244148008Z" level=info msg="Start subscribing containerd event" Feb 13 02:40:25.245491 env[1468]: time="2024-02-13T02:40:25.244168590Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 13 02:40:25.245491 env[1468]: time="2024-02-13T02:40:25.244182438Z" level=info msg="Start recovering state" Feb 13 02:40:25.245491 env[1468]: time="2024-02-13T02:40:25.244191392Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 13 02:40:25.245491 env[1468]: time="2024-02-13T02:40:25.244216890Z" level=info msg="Start event monitor" Feb 13 02:40:25.245491 env[1468]: time="2024-02-13T02:40:25.244219276Z" level=info msg="containerd successfully booted in 0.025183s" Feb 13 02:40:25.245491 env[1468]: time="2024-02-13T02:40:25.244227535Z" level=info msg="Start snapshots syncer" Feb 13 02:40:25.245491 env[1468]: time="2024-02-13T02:40:25.244233045Z" level=info msg="Start cni network conf syncer for default" Feb 13 02:40:25.245491 env[1468]: time="2024-02-13T02:40:25.244237378Z" level=info msg="Start streaming server" Feb 13 02:40:25.245673 tar[1465]: ./bandwidth Feb 13 02:40:25.250982 systemd[1]: Started containerd.service. Feb 13 02:40:25.259467 kernel: bond0: (slave enp2s0f1np1): link status definitely up, 10000 Mbps full duplex Feb 13 02:40:25.265651 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 13 02:40:25.266595 tar[1465]: ./ptp Feb 13 02:40:25.275566 systemd[1]: Started update-engine.service. Feb 13 02:40:25.285111 systemd[1]: Started locksmithd.service. Feb 13 02:40:25.290223 tar[1465]: ./vlan Feb 13 02:40:25.293283 systemd[1]: Started packet-phone-home.service. Feb 13 02:40:25.299106 curl[1508]: % Total % Received % Xferd Average Speed Time Time Time Current Feb 13 02:40:25.299216 curl[1508]: Dload Upload Total Spent Left Speed Feb 13 02:40:25.302586 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 13 02:40:25.302668 systemd[1]: Reached target system-config.target. Feb 13 02:40:25.311559 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 13 02:40:25.311633 systemd[1]: Reached target user-config.target. Feb 13 02:40:25.313492 tar[1465]: ./host-device Feb 13 02:40:25.334916 tar[1465]: ./tuning Feb 13 02:40:25.342374 locksmithd[1507]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 13 02:40:25.353702 tar[1465]: ./vrf Feb 13 02:40:25.373341 tar[1465]: ./sbr Feb 13 02:40:25.392579 tar[1465]: ./tap Feb 13 02:40:25.414577 tar[1465]: ./dhcp Feb 13 02:40:25.470559 tar[1465]: ./static Feb 13 02:40:25.481249 systemd[1]: Finished prepare-critools.service. Feb 13 02:40:25.486669 tar[1465]: ./firewall Feb 13 02:40:25.511036 tar[1465]: ./macvlan Feb 13 02:40:25.517463 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Feb 13 02:40:25.546072 extend-filesystems[1446]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 13 02:40:25.546072 extend-filesystems[1446]: old_desc_blocks = 1, new_desc_blocks = 56 Feb 13 02:40:25.546072 extend-filesystems[1446]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Feb 13 02:40:25.582563 extend-filesystems[1432]: Resized filesystem in /dev/sda9 Feb 13 02:40:25.582563 extend-filesystems[1432]: Found sdb Feb 13 02:40:25.597549 tar[1465]: ./dummy Feb 13 02:40:25.597549 tar[1465]: ./bridge Feb 13 02:40:25.546554 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 13 02:40:25.546641 systemd[1]: Finished extend-filesystems.service. Feb 13 02:40:25.609204 tar[1465]: ./ipvlan Feb 13 02:40:25.631137 tar[1465]: ./portmap Feb 13 02:40:25.651465 tar[1465]: ./host-local Feb 13 02:40:25.675389 systemd[1]: Finished prepare-cni-plugins.service. Feb 13 02:40:25.694761 sshd_keygen[1457]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 13 02:40:25.706259 systemd[1]: Finished sshd-keygen.service. Feb 13 02:40:25.714579 systemd[1]: Starting issuegen.service... Feb 13 02:40:25.722888 systemd[1]: issuegen.service: Deactivated successfully. Feb 13 02:40:25.722959 systemd[1]: Finished issuegen.service. Feb 13 02:40:25.730380 systemd[1]: Starting systemd-user-sessions.service... Feb 13 02:40:25.738888 systemd[1]: Finished systemd-user-sessions.service. Feb 13 02:40:25.749266 systemd[1]: Started getty@tty1.service. Feb 13 02:40:25.758374 systemd[1]: Started serial-getty@ttyS1.service. Feb 13 02:40:25.766762 systemd[1]: Reached target getty.target. Feb 13 02:40:25.773958 systemd[1]: Reached target multi-user.target. Feb 13 02:40:25.785536 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 13 02:40:25.803501 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 13 02:40:25.803861 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 13 02:40:25.813966 systemd[1]: Startup finished in 2.017s (kernel) + 19.447s (initrd) + 7.535s (userspace) = 29.000s. Feb 13 02:40:25.849130 login[1532]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 02:40:25.856407 login[1531]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 13 02:40:25.859967 systemd-logind[1458]: New session 1 of user core. Feb 13 02:40:25.860726 systemd[1]: Created slice user-500.slice. Feb 13 02:40:25.861464 systemd[1]: Starting user-runtime-dir@500.service... Feb 13 02:40:25.863091 systemd-logind[1458]: New session 2 of user core. Feb 13 02:40:25.867581 systemd[1]: Finished user-runtime-dir@500.service. Feb 13 02:40:25.868239 systemd[1]: Starting user@500.service... Feb 13 02:40:25.870169 (systemd)[1535]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:40:25.935365 systemd[1535]: Queued start job for default target default.target. Feb 13 02:40:25.935605 systemd[1535]: Reached target paths.target. Feb 13 02:40:25.935616 systemd[1535]: Reached target sockets.target. Feb 13 02:40:25.935624 systemd[1535]: Reached target timers.target. Feb 13 02:40:25.935632 systemd[1535]: Reached target basic.target. Feb 13 02:40:25.935651 systemd[1535]: Reached target default.target. Feb 13 02:40:25.935665 systemd[1535]: Startup finished in 62ms. Feb 13 02:40:25.935709 systemd[1]: Started user@500.service. Feb 13 02:40:25.936259 systemd[1]: Started session-1.scope. Feb 13 02:40:25.936580 systemd[1]: Started session-2.scope. Feb 13 02:40:26.345559 systemd-networkd[1311]: bond0: Gained IPv6LL Feb 13 02:40:26.345815 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 02:40:26.473871 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 02:40:26.473926 systemd-timesyncd[1412]: Network configuration changed, trying to establish connection. Feb 13 02:40:27.175667 kernel: mlx5_core 0000:02:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Feb 13 02:40:32.551611 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:2 port 2:2 Feb 13 02:40:32.551767 kernel: mlx5_core 0000:02:00.0: modify lag map port 1:1 port 2:2 Feb 13 02:40:34.055287 systemd[1]: Created slice system-sshd.slice. Feb 13 02:40:34.055926 systemd[1]: Started sshd@0-136.144.54.113:22-139.178.68.195:36246.service. Feb 13 02:40:34.096081 sshd[1558]: Accepted publickey for core from 139.178.68.195 port 36246 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:40:34.097237 sshd[1558]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:40:34.101068 systemd-logind[1458]: New session 3 of user core. Feb 13 02:40:34.101996 systemd[1]: Started session-3.scope. Feb 13 02:40:34.157404 systemd[1]: Started sshd@1-136.144.54.113:22-139.178.68.195:36258.service. Feb 13 02:40:34.185672 sshd[1563]: Accepted publickey for core from 139.178.68.195 port 36258 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:40:34.186349 sshd[1563]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:40:34.188864 systemd-logind[1458]: New session 4 of user core. Feb 13 02:40:34.189257 systemd[1]: Started session-4.scope. Feb 13 02:40:34.239755 sshd[1563]: pam_unix(sshd:session): session closed for user core Feb 13 02:40:34.242010 systemd[1]: sshd@1-136.144.54.113:22-139.178.68.195:36258.service: Deactivated successfully. Feb 13 02:40:34.242517 systemd[1]: session-4.scope: Deactivated successfully. Feb 13 02:40:34.243084 systemd-logind[1458]: Session 4 logged out. Waiting for processes to exit. Feb 13 02:40:34.244017 systemd[1]: Started sshd@2-136.144.54.113:22-139.178.68.195:36274.service. Feb 13 02:40:34.244890 systemd-logind[1458]: Removed session 4. Feb 13 02:40:34.275343 sshd[1569]: Accepted publickey for core from 139.178.68.195 port 36274 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:40:34.276219 sshd[1569]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:40:34.279106 systemd-logind[1458]: New session 5 of user core. Feb 13 02:40:34.279699 systemd[1]: Started session-5.scope. Feb 13 02:40:34.332568 sshd[1569]: pam_unix(sshd:session): session closed for user core Feb 13 02:40:34.334082 systemd[1]: sshd@2-136.144.54.113:22-139.178.68.195:36274.service: Deactivated successfully. Feb 13 02:40:34.334370 systemd[1]: session-5.scope: Deactivated successfully. Feb 13 02:40:34.334774 systemd-logind[1458]: Session 5 logged out. Waiting for processes to exit. Feb 13 02:40:34.335274 systemd[1]: Started sshd@3-136.144.54.113:22-139.178.68.195:36290.service. Feb 13 02:40:34.335859 systemd-logind[1458]: Removed session 5. Feb 13 02:40:34.364695 sshd[1575]: Accepted publickey for core from 139.178.68.195 port 36290 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:40:34.365648 sshd[1575]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:40:34.369166 systemd-logind[1458]: New session 6 of user core. Feb 13 02:40:34.369914 systemd[1]: Started session-6.scope. Feb 13 02:40:34.425488 sshd[1575]: pam_unix(sshd:session): session closed for user core Feb 13 02:40:34.426891 systemd[1]: sshd@3-136.144.54.113:22-139.178.68.195:36290.service: Deactivated successfully. Feb 13 02:40:34.427196 systemd[1]: session-6.scope: Deactivated successfully. Feb 13 02:40:34.427466 systemd-logind[1458]: Session 6 logged out. Waiting for processes to exit. Feb 13 02:40:34.427995 systemd[1]: Started sshd@4-136.144.54.113:22-139.178.68.195:36304.service. Feb 13 02:40:34.428394 systemd-logind[1458]: Removed session 6. Feb 13 02:40:34.457254 sshd[1581]: Accepted publickey for core from 139.178.68.195 port 36304 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:40:34.458297 sshd[1581]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:40:34.461893 systemd-logind[1458]: New session 7 of user core. Feb 13 02:40:34.462757 systemd[1]: Started session-7.scope. Feb 13 02:40:34.545077 sudo[1584]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 13 02:40:34.545690 sudo[1584]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 02:40:34.565104 dbus-daemon[1428]: \xd0\xed\u0005\xa8\xccU: received setenforce notice (enforcing=-2101062400) Feb 13 02:40:34.570099 sudo[1584]: pam_unix(sudo:session): session closed for user root Feb 13 02:40:34.575502 sshd[1581]: pam_unix(sshd:session): session closed for user core Feb 13 02:40:34.584384 systemd[1]: sshd@4-136.144.54.113:22-139.178.68.195:36304.service: Deactivated successfully. Feb 13 02:40:34.586024 systemd[1]: session-7.scope: Deactivated successfully. Feb 13 02:40:34.587717 systemd-logind[1458]: Session 7 logged out. Waiting for processes to exit. Feb 13 02:40:34.590396 systemd[1]: Started sshd@5-136.144.54.113:22-139.178.68.195:36316.service. Feb 13 02:40:34.592872 systemd-logind[1458]: Removed session 7. Feb 13 02:40:34.652022 sshd[1588]: Accepted publickey for core from 139.178.68.195 port 36316 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:40:34.654324 sshd[1588]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:40:34.661717 systemd-logind[1458]: New session 8 of user core. Feb 13 02:40:34.663418 systemd[1]: Started session-8.scope. Feb 13 02:40:34.734036 sudo[1592]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 13 02:40:34.734143 sudo[1592]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 02:40:34.735924 sudo[1592]: pam_unix(sudo:session): session closed for user root Feb 13 02:40:34.738191 sudo[1591]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 13 02:40:34.738297 sudo[1591]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 02:40:34.743697 systemd[1]: Stopping audit-rules.service... Feb 13 02:40:34.743000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 02:40:34.744464 auditctl[1595]: No rules Feb 13 02:40:34.744662 systemd[1]: audit-rules.service: Deactivated successfully. Feb 13 02:40:34.744749 systemd[1]: Stopped audit-rules.service. Feb 13 02:40:34.745528 systemd[1]: Starting audit-rules.service... Feb 13 02:40:34.749880 kernel: kauditd_printk_skb: 95 callbacks suppressed Feb 13 02:40:34.749911 kernel: audit: type=1305 audit(1707792034.743:160): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 13 02:40:34.756433 augenrules[1612]: No rules Feb 13 02:40:34.756766 systemd[1]: Finished audit-rules.service. Feb 13 02:40:34.757266 sudo[1591]: pam_unix(sudo:session): session closed for user root Feb 13 02:40:34.758105 sshd[1588]: pam_unix(sshd:session): session closed for user core Feb 13 02:40:34.759770 systemd[1]: sshd@5-136.144.54.113:22-139.178.68.195:36316.service: Deactivated successfully. Feb 13 02:40:34.760142 systemd[1]: session-8.scope: Deactivated successfully. Feb 13 02:40:34.760553 systemd-logind[1458]: Session 8 logged out. Waiting for processes to exit. Feb 13 02:40:34.761099 systemd[1]: Started sshd@6-136.144.54.113:22-139.178.68.195:36328.service. Feb 13 02:40:34.761662 systemd-logind[1458]: Removed session 8. Feb 13 02:40:34.743000 audit[1595]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa3bf60d0 a2=420 a3=0 items=0 ppid=1 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:34.796407 kernel: audit: type=1300 audit(1707792034.743:160): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffa3bf60d0 a2=420 a3=0 items=0 ppid=1 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:34.796478 kernel: audit: type=1327 audit(1707792034.743:160): proctitle=2F7362696E2F617564697463746C002D44 Feb 13 02:40:34.743000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 13 02:40:34.805970 kernel: audit: type=1131 audit(1707792034.744:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.828415 kernel: audit: type=1130 audit(1707792034.756:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.829244 sshd[1618]: Accepted publickey for core from 139.178.68.195 port 36328 ssh2: RSA SHA256:SI20tmcLhMJrRXFSJfFiMLkgQ5/JIIloz0aulBy/J9I Feb 13 02:40:34.830762 sshd[1618]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 13 02:40:34.832775 systemd-logind[1458]: New session 9 of user core. Feb 13 02:40:34.833216 systemd[1]: Started session-9.scope. Feb 13 02:40:34.850861 kernel: audit: type=1106 audit(1707792034.756:163): pid=1591 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.756000 audit[1591]: USER_END pid=1591 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.876826 kernel: audit: type=1104 audit(1707792034.756:164): pid=1591 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.756000 audit[1591]: CRED_DISP pid=1591 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.880139 sudo[1621]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 13 02:40:34.880246 sudo[1621]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 13 02:40:34.900407 kernel: audit: type=1106 audit(1707792034.758:165): pid=1588 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:40:34.758000 audit[1588]: USER_END pid=1588 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:40:34.758000 audit[1588]: CRED_DISP pid=1588 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:40:34.958545 kernel: audit: type=1104 audit(1707792034.758:166): pid=1588 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:40:34.958577 kernel: audit: type=1131 audit(1707792034.759:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-136.144.54.113:22-139.178.68.195:36316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-136.144.54.113:22-139.178.68.195:36316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.760000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-136.144.54.113:22-139.178.68.195:36328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.828000 audit[1618]: USER_ACCT pid=1618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:40:34.830000 audit[1618]: CRED_ACQ pid=1618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:40:34.830000 audit[1618]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff114b9b90 a2=3 a3=0 items=0 ppid=1 pid=1618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:34.830000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 13 02:40:34.834000 audit[1618]: USER_START pid=1618 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:40:34.835000 audit[1620]: CRED_ACQ pid=1620 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:40:34.879000 audit[1621]: USER_ACCT pid=1621 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.879000 audit[1621]: CRED_REFR pid=1621 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 02:40:34.880000 audit[1621]: USER_START pid=1621 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 02:40:35.497172 curl[1508]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:02 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:03 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:04 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:05 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:06 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:07 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:08 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:09 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:10 --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- 0:00:10 --:--:-- 0 Feb 13 02:40:35.499566 systemd[1]: packet-phone-home.service: Deactivated successfully. Feb 13 02:40:35.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=packet-phone-home comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:38.928236 systemd[1]: Reloading. Feb 13 02:40:38.956868 /usr/lib/systemd/system-generators/torcx-generator[1652]: time="2024-02-13T02:40:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 02:40:38.956895 /usr/lib/systemd/system-generators/torcx-generator[1652]: time="2024-02-13T02:40:38Z" level=info msg="torcx already run" Feb 13 02:40:39.016118 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 02:40:39.016129 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 02:40:39.032520 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 02:40:39.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit: BPF prog-id=31 op=LOAD Feb 13 02:40:39.075000 audit: BPF prog-id=21 op=UNLOAD Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit: BPF prog-id=32 op=LOAD Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.075000 audit: BPF prog-id=33 op=LOAD Feb 13 02:40:39.075000 audit: BPF prog-id=22 op=UNLOAD Feb 13 02:40:39.075000 audit: BPF prog-id=23 op=UNLOAD Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit: BPF prog-id=34 op=LOAD Feb 13 02:40:39.076000 audit: BPF prog-id=15 op=UNLOAD Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit: BPF prog-id=35 op=LOAD Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit: BPF prog-id=36 op=LOAD Feb 13 02:40:39.076000 audit: BPF prog-id=16 op=UNLOAD Feb 13 02:40:39.076000 audit: BPF prog-id=17 op=UNLOAD Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit: BPF prog-id=37 op=LOAD Feb 13 02:40:39.077000 audit: BPF prog-id=20 op=UNLOAD Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit: BPF prog-id=38 op=LOAD Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.077000 audit: BPF prog-id=39 op=LOAD Feb 13 02:40:39.077000 audit: BPF prog-id=18 op=UNLOAD Feb 13 02:40:39.077000 audit: BPF prog-id=19 op=UNLOAD Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit: BPF prog-id=40 op=LOAD Feb 13 02:40:39.078000 audit: BPF prog-id=24 op=UNLOAD Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.078000 audit: BPF prog-id=41 op=LOAD Feb 13 02:40:39.078000 audit: BPF prog-id=25 op=UNLOAD Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit: BPF prog-id=42 op=LOAD Feb 13 02:40:39.080000 audit: BPF prog-id=26 op=UNLOAD Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit: BPF prog-id=43 op=LOAD Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit: BPF prog-id=44 op=LOAD Feb 13 02:40:39.080000 audit: BPF prog-id=27 op=UNLOAD Feb 13 02:40:39.080000 audit: BPF prog-id=28 op=UNLOAD Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.081000 audit: BPF prog-id=45 op=LOAD Feb 13 02:40:39.081000 audit: BPF prog-id=29 op=UNLOAD Feb 13 02:40:39.085017 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 13 02:40:39.088616 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 13 02:40:39.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:39.088862 systemd[1]: Reached target network-online.target. Feb 13 02:40:39.089519 systemd[1]: Started kubelet.service. Feb 13 02:40:39.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:39.111728 kubelet[1710]: E0213 02:40:39.111675 1710 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 13 02:40:39.112875 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 13 02:40:39.112942 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 13 02:40:39.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 13 02:40:39.441048 systemd[1]: Stopped kubelet.service. Feb 13 02:40:39.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:39.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:39.454603 systemd[1]: Reloading. Feb 13 02:40:39.487119 /usr/lib/systemd/system-generators/torcx-generator[1811]: time="2024-02-13T02:40:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 13 02:40:39.487136 /usr/lib/systemd/system-generators/torcx-generator[1811]: time="2024-02-13T02:40:39Z" level=info msg="torcx already run" Feb 13 02:40:39.538359 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 13 02:40:39.538367 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 13 02:40:39.550378 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit: BPF prog-id=46 op=LOAD Feb 13 02:40:39.592000 audit: BPF prog-id=31 op=UNLOAD Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit: BPF prog-id=47 op=LOAD Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.592000 audit: BPF prog-id=48 op=LOAD Feb 13 02:40:39.592000 audit: BPF prog-id=32 op=UNLOAD Feb 13 02:40:39.592000 audit: BPF prog-id=33 op=UNLOAD Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit: BPF prog-id=49 op=LOAD Feb 13 02:40:39.593000 audit: BPF prog-id=34 op=UNLOAD Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit: BPF prog-id=50 op=LOAD Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit: BPF prog-id=51 op=LOAD Feb 13 02:40:39.594000 audit: BPF prog-id=35 op=UNLOAD Feb 13 02:40:39.594000 audit: BPF prog-id=36 op=UNLOAD Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit: BPF prog-id=52 op=LOAD Feb 13 02:40:39.594000 audit: BPF prog-id=37 op=UNLOAD Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit: BPF prog-id=53 op=LOAD Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.594000 audit: BPF prog-id=54 op=LOAD Feb 13 02:40:39.594000 audit: BPF prog-id=38 op=UNLOAD Feb 13 02:40:39.594000 audit: BPF prog-id=39 op=UNLOAD Feb 13 02:40:39.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.595000 audit: BPF prog-id=55 op=LOAD Feb 13 02:40:39.595000 audit: BPF prog-id=40 op=UNLOAD Feb 13 02:40:39.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.596000 audit: BPF prog-id=56 op=LOAD Feb 13 02:40:39.596000 audit: BPF prog-id=41 op=UNLOAD Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit: BPF prog-id=57 op=LOAD Feb 13 02:40:39.597000 audit: BPF prog-id=42 op=UNLOAD Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit: BPF prog-id=58 op=LOAD Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.597000 audit: BPF prog-id=59 op=LOAD Feb 13 02:40:39.597000 audit: BPF prog-id=43 op=UNLOAD Feb 13 02:40:39.597000 audit: BPF prog-id=44 op=UNLOAD Feb 13 02:40:39.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.598000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.598000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.598000 audit: BPF prog-id=60 op=LOAD Feb 13 02:40:39.598000 audit: BPF prog-id=45 op=UNLOAD Feb 13 02:40:39.605169 systemd[1]: Started kubelet.service. Feb 13 02:40:39.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:39.627120 kubelet[1871]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 02:40:39.627120 kubelet[1871]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 13 02:40:39.627120 kubelet[1871]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 13 02:40:39.627324 kubelet[1871]: I0213 02:40:39.627116 1871 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 13 02:40:39.861465 kubelet[1871]: I0213 02:40:39.861384 1871 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 13 02:40:39.861465 kubelet[1871]: I0213 02:40:39.861402 1871 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 13 02:40:39.861586 kubelet[1871]: I0213 02:40:39.861580 1871 server.go:837] "Client rotation is on, will bootstrap in background" Feb 13 02:40:39.862772 kubelet[1871]: I0213 02:40:39.862762 1871 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 13 02:40:39.880913 kubelet[1871]: I0213 02:40:39.880876 1871 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 13 02:40:39.881012 kubelet[1871]: I0213 02:40:39.880975 1871 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 13 02:40:39.881012 kubelet[1871]: I0213 02:40:39.881012 1871 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 13 02:40:39.881107 kubelet[1871]: I0213 02:40:39.881021 1871 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 13 02:40:39.881107 kubelet[1871]: I0213 02:40:39.881028 1871 container_manager_linux.go:302] "Creating device plugin manager" Feb 13 02:40:39.881107 kubelet[1871]: I0213 02:40:39.881075 1871 state_mem.go:36] "Initialized new in-memory state store" Feb 13 02:40:39.882651 kubelet[1871]: I0213 02:40:39.882638 1871 kubelet.go:405] "Attempting to sync node with API server" Feb 13 02:40:39.882699 kubelet[1871]: I0213 02:40:39.882657 1871 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 13 02:40:39.882699 kubelet[1871]: I0213 02:40:39.882678 1871 kubelet.go:309] "Adding apiserver pod source" Feb 13 02:40:39.882740 kubelet[1871]: I0213 02:40:39.882726 1871 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 13 02:40:39.882785 kubelet[1871]: E0213 02:40:39.882771 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:39.882956 kubelet[1871]: E0213 02:40:39.882810 1871 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:39.883326 kubelet[1871]: I0213 02:40:39.883317 1871 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 13 02:40:39.883447 kubelet[1871]: W0213 02:40:39.883441 1871 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 13 02:40:39.883682 kubelet[1871]: I0213 02:40:39.883660 1871 server.go:1168] "Started kubelet" Feb 13 02:40:39.883725 kubelet[1871]: I0213 02:40:39.883716 1871 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 13 02:40:39.883725 kubelet[1871]: I0213 02:40:39.883721 1871 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 13 02:40:39.883856 kubelet[1871]: E0213 02:40:39.883847 1871 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 13 02:40:39.883919 kubelet[1871]: E0213 02:40:39.883859 1871 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 13 02:40:39.884345 kubelet[1871]: I0213 02:40:39.884336 1871 server.go:461] "Adding debug handlers to kubelet server" Feb 13 02:40:39.883000 audit[1871]: AVC avc: denied { mac_admin } for pid=1871 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.884413 kubelet[1871]: I0213 02:40:39.884365 1871 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 13 02:40:39.884413 kubelet[1871]: I0213 02:40:39.884385 1871 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 13 02:40:39.884490 kubelet[1871]: I0213 02:40:39.884417 1871 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 13 02:40:39.884490 kubelet[1871]: I0213 02:40:39.884442 1871 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 13 02:40:39.884490 kubelet[1871]: I0213 02:40:39.884469 1871 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 13 02:40:39.884490 kubelet[1871]: E0213 02:40:39.884479 1871 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.35\" not found" Feb 13 02:40:39.889909 kernel: kauditd_printk_skb: 362 callbacks suppressed Feb 13 02:40:39.889993 kernel: audit: type=1400 audit(1707792039.883:528): avc: denied { mac_admin } for pid=1871 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.891483 kubelet[1871]: E0213 02:40:39.891467 1871 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.80.35\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 13 02:40:39.891575 kubelet[1871]: W0213 02:40:39.891558 1871 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.67.80.35" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 13 02:40:39.891575 kubelet[1871]: W0213 02:40:39.891568 1871 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 13 02:40:39.891644 kubelet[1871]: E0213 02:40:39.891585 1871 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 13 02:40:39.891644 kubelet[1871]: E0213 02:40:39.891587 1871 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.67.80.35" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 13 02:40:39.891644 kubelet[1871]: W0213 02:40:39.891611 1871 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 13 02:40:39.891738 kubelet[1871]: E0213 02:40:39.891555 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfdf8130c2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 883649218, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 883649218, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:39.891738 kubelet[1871]: E0213 02:40:39.891625 1871 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 13 02:40:39.892038 kubelet[1871]: E0213 02:40:39.891989 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfdf845168", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 883854184, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 883854184, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:39.895540 kubelet[1871]: I0213 02:40:39.895531 1871 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 13 02:40:39.895540 kubelet[1871]: I0213 02:40:39.895539 1871 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 13 02:40:39.895592 kubelet[1871]: I0213 02:40:39.895546 1871 state_mem.go:36] "Initialized new in-memory state store" Feb 13 02:40:39.895850 kubelet[1871]: E0213 02:40:39.895820 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfe03235c2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.80.35 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895250370, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895250370, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:39.896291 kubelet[1871]: E0213 02:40:39.896263 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfe032413b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.80.35 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895253307, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895253307, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:39.896389 kubelet[1871]: I0213 02:40:39.896338 1871 policy_none.go:49] "None policy: Start" Feb 13 02:40:39.896608 kubelet[1871]: I0213 02:40:39.896602 1871 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 13 02:40:39.896649 kubelet[1871]: I0213 02:40:39.896614 1871 state_mem.go:35] "Initializing new in-memory state store" Feb 13 02:40:39.896735 kubelet[1871]: E0213 02:40:39.896708 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfe03246ce", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.80.35 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895254734, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895254734, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:39.898919 systemd[1]: Created slice kubepods.slice. Feb 13 02:40:39.901256 systemd[1]: Created slice kubepods-besteffort.slice. Feb 13 02:40:39.883000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 02:40:39.939199 kernel: audit: type=1401 audit(1707792039.883:528): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 02:40:39.939230 kernel: audit: type=1300 audit(1707792039.883:528): arch=c000003e syscall=188 success=no exit=-22 a0=c000dfeba0 a1=c000611ed8 a2=c000dfeb70 a3=25 items=0 ppid=1 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:39.883000 audit[1871]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dfeba0 a1=c000611ed8 a2=c000dfeb70 a3=25 items=0 ppid=1 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:39.985667 kubelet[1871]: I0213 02:40:39.985657 1871 kubelet_node_status.go:70] "Attempting to register node" node="10.67.80.35" Feb 13 02:40:39.987697 kubelet[1871]: E0213 02:40:39.987668 1871 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.80.35" Feb 13 02:40:39.987734 kubelet[1871]: E0213 02:40:39.987691 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfe03235c2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.80.35 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895250370, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 985638992, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.35.17b34bcfe03235c2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:39.989128 kubelet[1871]: E0213 02:40:39.989069 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfe032413b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.80.35 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895253307, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 985640976, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.35.17b34bcfe032413b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:39.990393 kubelet[1871]: E0213 02:40:39.990366 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfe03246ce", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.80.35 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895254734, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 985642059, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.35.17b34bcfe03246ce" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:40.020143 kernel: audit: type=1327 audit(1707792039.883:528): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 02:40:39.883000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 02:40:40.093416 kubelet[1871]: E0213 02:40:40.093407 1871 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.80.35\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 13 02:40:40.100208 kernel: audit: type=1400 audit(1707792039.883:529): avc: denied { mac_admin } for pid=1871 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:39.883000 audit[1871]: AVC avc: denied { mac_admin } for pid=1871 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:40.157463 kernel: audit: type=1401 audit(1707792039.883:529): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 02:40:39.883000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 02:40:40.187324 kernel: audit: type=1300 audit(1707792039.883:529): arch=c000003e syscall=188 success=no exit=-22 a0=c00051b0a0 a1=c000611ef0 a2=c000dfec30 a3=25 items=0 ppid=1 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:39.883000 audit[1871]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00051b0a0 a1=c000611ef0 a2=c000dfec30 a3=25 items=0 ppid=1 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.188672 kubelet[1871]: I0213 02:40:40.188665 1871 kubelet_node_status.go:70] "Attempting to register node" node="10.67.80.35" Feb 13 02:40:40.190534 kubelet[1871]: E0213 02:40:40.190460 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfe03235c2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.80.35 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895250370, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 40, 188649973, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.35.17b34bcfe03235c2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:40.190599 kubelet[1871]: E0213 02:40:40.190580 1871 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.80.35" Feb 13 02:40:40.191902 kubelet[1871]: E0213 02:40:40.191874 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfe032413b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.80.35 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895253307, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 40, 188652100, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.35.17b34bcfe032413b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:40.193316 kubelet[1871]: E0213 02:40:40.193263 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfe03246ce", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.80.35 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895254734, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 40, 188653243, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.35.17b34bcfe03246ce" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:40.276532 kernel: audit: type=1327 audit(1707792039.883:529): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 02:40:39.883000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 02:40:40.365000 audit[1899]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1899 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:40.365000 audit[1899]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe8e7d6770 a2=0 a3=7ffe8e7d675c items=0 ppid=1871 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.424005 systemd[1]: Created slice kubepods-burstable.slice. Feb 13 02:40:40.424590 kubelet[1871]: I0213 02:40:40.424554 1871 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 13 02:40:40.424590 kubelet[1871]: I0213 02:40:40.424582 1871 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 13 02:40:40.424702 kubelet[1871]: I0213 02:40:40.424663 1871 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 13 02:40:40.424909 kubelet[1871]: E0213 02:40:40.424900 1871 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.67.80.35\" not found" Feb 13 02:40:40.494518 kubelet[1871]: E0213 02:40:40.494499 1871 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.67.80.35\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 13 02:40:40.517263 kernel: audit: type=1325 audit(1707792040.365:530): table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1899 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:40.517299 kernel: audit: type=1300 audit(1707792040.365:530): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe8e7d6770 a2=0 a3=7ffe8e7d675c items=0 ppid=1871 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 13 02:40:40.365000 audit[1901]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:40.365000 audit[1901]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc5e3510d0 a2=0 a3=7ffc5e3510bc items=0 ppid=1871 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.365000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 13 02:40:40.424000 audit[1871]: AVC avc: denied { mac_admin } for pid=1871 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:40.424000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 13 02:40:40.424000 audit[1871]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007b33e0 a1=c000e8a828 a2=c0007b33b0 a3=25 items=0 ppid=1 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.424000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 13 02:40:40.529646 kubelet[1871]: E0213 02:40:40.529614 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bd005f7b2d2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 40, 528949970, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 40, 528949970, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:40.366000 audit[1903]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:40.366000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff61f88860 a2=0 a3=7fff61f8884c items=0 ppid=1871 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 02:40:40.547000 audit[1909]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:40.547000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdc14ec200 a2=0 a3=7ffdc14ec1ec items=0 ppid=1871 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 02:40:40.574000 audit[1914]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:40.574000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffedbc79080 a2=0 a3=7ffedbc7906c items=0 ppid=1871 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.574000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 13 02:40:40.575148 kubelet[1871]: I0213 02:40:40.575091 1871 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 13 02:40:40.575000 audit[1915]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:40.575000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffca2cd3bb0 a2=0 a3=7ffca2cd3b9c items=0 ppid=1871 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 13 02:40:40.575000 audit[1916]: NETFILTER_CFG table=mangle:8 family=2 entries=1 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:40.575000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb870a1d0 a2=0 a3=7fffb870a1bc items=0 ppid=1871 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.575000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 13 02:40:40.575667 kubelet[1871]: I0213 02:40:40.575551 1871 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 13 02:40:40.575667 kubelet[1871]: I0213 02:40:40.575562 1871 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 13 02:40:40.575667 kubelet[1871]: I0213 02:40:40.575572 1871 kubelet.go:2257] "Starting kubelet main sync loop" Feb 13 02:40:40.575667 kubelet[1871]: E0213 02:40:40.575593 1871 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 13 02:40:40.575000 audit[1917]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:40.575000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffcf54a910 a2=0 a3=7fffcf54a8fc items=0 ppid=1871 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.575000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 13 02:40:40.575000 audit[1918]: NETFILTER_CFG table=mangle:10 family=10 entries=1 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:40.575000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc96c826b0 a2=0 a3=7ffc96c8269c items=0 ppid=1871 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 13 02:40:40.576000 audit[1919]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:40.576000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff26cf81e0 a2=0 a3=7fff26cf81cc items=0 ppid=1871 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 13 02:40:40.576000 audit[1920]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:40.576000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffa78c9c60 a2=0 a3=7fffa78c9c4c items=0 ppid=1871 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 13 02:40:40.576000 audit[1921]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:40.576000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd1150b430 a2=0 a3=7ffd1150b41c items=0 ppid=1871 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:40.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 13 02:40:40.577642 kubelet[1871]: W0213 02:40:40.577582 1871 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 13 02:40:40.577642 kubelet[1871]: E0213 02:40:40.577595 1871 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 13 02:40:40.591714 kubelet[1871]: I0213 02:40:40.591705 1871 kubelet_node_status.go:70] "Attempting to register node" node="10.67.80.35" Feb 13 02:40:40.593726 kubelet[1871]: E0213 02:40:40.593712 1871 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.67.80.35" Feb 13 02:40:40.593776 kubelet[1871]: E0213 02:40:40.593721 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfe03235c2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.67.80.35 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895250370, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 40, 591687043, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.35.17b34bcfe03235c2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:40.595363 kubelet[1871]: E0213 02:40:40.595332 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfe032413b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.67.80.35 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895253307, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 40, 591691500, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.35.17b34bcfe032413b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:40.596756 kubelet[1871]: E0213 02:40:40.596726 1871 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35.17b34bcfe03246ce", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.67.80.35", UID:"10.67.80.35", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.67.80.35 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.67.80.35"}, FirstTimestamp:time.Date(2024, time.February, 13, 2, 40, 39, 895254734, time.Local), LastTimestamp:time.Date(2024, time.February, 13, 2, 40, 40, 591693179, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.67.80.35.17b34bcfe03246ce" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 13 02:40:40.725141 kubelet[1871]: W0213 02:40:40.724931 1871 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.67.80.35" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 13 02:40:40.725141 kubelet[1871]: E0213 02:40:40.725000 1871 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.67.80.35" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 13 02:40:40.833075 kubelet[1871]: W0213 02:40:40.832963 1871 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 13 02:40:40.833075 kubelet[1871]: E0213 02:40:40.833029 1871 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 13 02:40:40.863384 kubelet[1871]: I0213 02:40:40.863311 1871 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 13 02:40:40.883923 kubelet[1871]: E0213 02:40:40.883852 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:41.259001 kubelet[1871]: E0213 02:40:41.258944 1871 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.67.80.35" not found Feb 13 02:40:41.304479 kubelet[1871]: E0213 02:40:41.304375 1871 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.67.80.35\" not found" node="10.67.80.35" Feb 13 02:40:41.395733 kubelet[1871]: I0213 02:40:41.395654 1871 kubelet_node_status.go:70] "Attempting to register node" node="10.67.80.35" Feb 13 02:40:41.402942 kubelet[1871]: I0213 02:40:41.402889 1871 kubelet_node_status.go:73] "Successfully registered node" node="10.67.80.35" Feb 13 02:40:41.413068 kubelet[1871]: E0213 02:40:41.413010 1871 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.35\" not found" Feb 13 02:40:41.514064 kubelet[1871]: E0213 02:40:41.513864 1871 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.35\" not found" Feb 13 02:40:41.614207 kubelet[1871]: E0213 02:40:41.614092 1871 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.35\" not found" Feb 13 02:40:41.631209 sudo[1621]: pam_unix(sudo:session): session closed for user root Feb 13 02:40:41.630000 audit[1621]: USER_END pid=1621 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 02:40:41.631000 audit[1621]: CRED_DISP pid=1621 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 13 02:40:41.634101 sshd[1618]: pam_unix(sshd:session): session closed for user core Feb 13 02:40:41.636000 audit[1618]: USER_END pid=1618 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:40:41.636000 audit[1618]: CRED_DISP pid=1618 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 13 02:40:41.639781 systemd[1]: sshd@6-136.144.54.113:22-139.178.68.195:36328.service: Deactivated successfully. Feb 13 02:40:41.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-136.144.54.113:22-139.178.68.195:36328 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:41.641554 systemd[1]: session-9.scope: Deactivated successfully. Feb 13 02:40:41.643501 systemd-logind[1458]: Session 9 logged out. Waiting for processes to exit. Feb 13 02:40:41.645510 systemd-logind[1458]: Removed session 9. Feb 13 02:40:41.714532 kubelet[1871]: E0213 02:40:41.714419 1871 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.35\" not found" Feb 13 02:40:41.815216 kubelet[1871]: E0213 02:40:41.814990 1871 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.35\" not found" Feb 13 02:40:41.884183 kubelet[1871]: E0213 02:40:41.884083 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:41.915714 kubelet[1871]: E0213 02:40:41.915596 1871 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.35\" not found" Feb 13 02:40:42.016555 kubelet[1871]: E0213 02:40:42.016445 1871 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.35\" not found" Feb 13 02:40:42.117442 kubelet[1871]: E0213 02:40:42.117220 1871 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.35\" not found" Feb 13 02:40:42.217889 kubelet[1871]: E0213 02:40:42.217770 1871 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.35\" not found" Feb 13 02:40:42.318507 kubelet[1871]: E0213 02:40:42.318382 1871 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.35\" not found" Feb 13 02:40:42.419566 kubelet[1871]: E0213 02:40:42.419323 1871 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.67.80.35\" not found" Feb 13 02:40:42.521577 kubelet[1871]: I0213 02:40:42.521513 1871 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 13 02:40:42.522381 env[1468]: time="2024-02-13T02:40:42.522249344Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 13 02:40:42.523241 kubelet[1871]: I0213 02:40:42.523184 1871 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 13 02:40:42.884445 kubelet[1871]: I0213 02:40:42.884215 1871 apiserver.go:52] "Watching apiserver" Feb 13 02:40:42.884445 kubelet[1871]: E0213 02:40:42.884298 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:42.889719 kubelet[1871]: I0213 02:40:42.889653 1871 topology_manager.go:212] "Topology Admit Handler" Feb 13 02:40:42.890037 kubelet[1871]: I0213 02:40:42.889927 1871 topology_manager.go:212] "Topology Admit Handler" Feb 13 02:40:42.890270 kubelet[1871]: I0213 02:40:42.890097 1871 topology_manager.go:212] "Topology Admit Handler" Feb 13 02:40:42.890880 kubelet[1871]: E0213 02:40:42.890831 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:40:42.901802 systemd[1]: Created slice kubepods-besteffort-pod1fba6f88_406e_4a80_933c_dfbc0d605dcb.slice. Feb 13 02:40:42.913520 systemd[1]: Created slice kubepods-besteffort-pod882a84b2_ab15_4980_a025_91fb1c1f8943.slice. Feb 13 02:40:42.986188 kubelet[1871]: I0213 02:40:42.986118 1871 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 13 02:40:43.003401 kubelet[1871]: I0213 02:40:43.003292 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1fba6f88-406e-4a80-933c-dfbc0d605dcb-xtables-lock\") pod \"calico-node-h8krk\" (UID: \"1fba6f88-406e-4a80-933c-dfbc0d605dcb\") " pod="calico-system/calico-node-h8krk" Feb 13 02:40:43.003733 kubelet[1871]: I0213 02:40:43.003566 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1fba6f88-406e-4a80-933c-dfbc0d605dcb-flexvol-driver-host\") pod \"calico-node-h8krk\" (UID: \"1fba6f88-406e-4a80-933c-dfbc0d605dcb\") " pod="calico-system/calico-node-h8krk" Feb 13 02:40:43.003733 kubelet[1871]: I0213 02:40:43.003681 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/9a6268d2-c909-4459-9230-b4453f549c04-socket-dir\") pod \"csi-node-driver-fpkxk\" (UID: \"9a6268d2-c909-4459-9230-b4453f549c04\") " pod="calico-system/csi-node-driver-fpkxk" Feb 13 02:40:43.003969 kubelet[1871]: I0213 02:40:43.003849 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/9a6268d2-c909-4459-9230-b4453f549c04-registration-dir\") pod \"csi-node-driver-fpkxk\" (UID: \"9a6268d2-c909-4459-9230-b4453f549c04\") " pod="calico-system/csi-node-driver-fpkxk" Feb 13 02:40:43.003969 kubelet[1871]: I0213 02:40:43.003958 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4vr8g\" (UniqueName: \"kubernetes.io/projected/9a6268d2-c909-4459-9230-b4453f549c04-kube-api-access-4vr8g\") pod \"csi-node-driver-fpkxk\" (UID: \"9a6268d2-c909-4459-9230-b4453f549c04\") " pod="calico-system/csi-node-driver-fpkxk" Feb 13 02:40:43.004194 kubelet[1871]: I0213 02:40:43.004024 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/882a84b2-ab15-4980-a025-91fb1c1f8943-xtables-lock\") pod \"kube-proxy-q848s\" (UID: \"882a84b2-ab15-4980-a025-91fb1c1f8943\") " pod="kube-system/kube-proxy-q848s" Feb 13 02:40:43.004194 kubelet[1871]: I0213 02:40:43.004091 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1fba6f88-406e-4a80-933c-dfbc0d605dcb-policysync\") pod \"calico-node-h8krk\" (UID: \"1fba6f88-406e-4a80-933c-dfbc0d605dcb\") " pod="calico-system/calico-node-h8krk" Feb 13 02:40:43.004415 kubelet[1871]: I0213 02:40:43.004249 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1fba6f88-406e-4a80-933c-dfbc0d605dcb-tigera-ca-bundle\") pod \"calico-node-h8krk\" (UID: \"1fba6f88-406e-4a80-933c-dfbc0d605dcb\") " pod="calico-system/calico-node-h8krk" Feb 13 02:40:43.004415 kubelet[1871]: I0213 02:40:43.004378 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1fba6f88-406e-4a80-933c-dfbc0d605dcb-cni-log-dir\") pod \"calico-node-h8krk\" (UID: \"1fba6f88-406e-4a80-933c-dfbc0d605dcb\") " pod="calico-system/calico-node-h8krk" Feb 13 02:40:43.004653 kubelet[1871]: I0213 02:40:43.004485 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n8f6p\" (UniqueName: \"kubernetes.io/projected/1fba6f88-406e-4a80-933c-dfbc0d605dcb-kube-api-access-n8f6p\") pod \"calico-node-h8krk\" (UID: \"1fba6f88-406e-4a80-933c-dfbc0d605dcb\") " pod="calico-system/calico-node-h8krk" Feb 13 02:40:43.004653 kubelet[1871]: I0213 02:40:43.004616 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1fba6f88-406e-4a80-933c-dfbc0d605dcb-lib-modules\") pod \"calico-node-h8krk\" (UID: \"1fba6f88-406e-4a80-933c-dfbc0d605dcb\") " pod="calico-system/calico-node-h8krk" Feb 13 02:40:43.004959 kubelet[1871]: I0213 02:40:43.004808 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1fba6f88-406e-4a80-933c-dfbc0d605dcb-node-certs\") pod \"calico-node-h8krk\" (UID: \"1fba6f88-406e-4a80-933c-dfbc0d605dcb\") " pod="calico-system/calico-node-h8krk" Feb 13 02:40:43.005068 kubelet[1871]: I0213 02:40:43.004955 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1fba6f88-406e-4a80-933c-dfbc0d605dcb-var-run-calico\") pod \"calico-node-h8krk\" (UID: \"1fba6f88-406e-4a80-933c-dfbc0d605dcb\") " pod="calico-system/calico-node-h8krk" Feb 13 02:40:43.005068 kubelet[1871]: I0213 02:40:43.005057 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1fba6f88-406e-4a80-933c-dfbc0d605dcb-var-lib-calico\") pod \"calico-node-h8krk\" (UID: \"1fba6f88-406e-4a80-933c-dfbc0d605dcb\") " pod="calico-system/calico-node-h8krk" Feb 13 02:40:43.005275 kubelet[1871]: I0213 02:40:43.005182 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1fba6f88-406e-4a80-933c-dfbc0d605dcb-cni-bin-dir\") pod \"calico-node-h8krk\" (UID: \"1fba6f88-406e-4a80-933c-dfbc0d605dcb\") " pod="calico-system/calico-node-h8krk" Feb 13 02:40:43.005383 kubelet[1871]: I0213 02:40:43.005290 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/9a6268d2-c909-4459-9230-b4453f549c04-varrun\") pod \"csi-node-driver-fpkxk\" (UID: \"9a6268d2-c909-4459-9230-b4453f549c04\") " pod="calico-system/csi-node-driver-fpkxk" Feb 13 02:40:43.005503 kubelet[1871]: I0213 02:40:43.005390 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/882a84b2-ab15-4980-a025-91fb1c1f8943-kube-proxy\") pod \"kube-proxy-q848s\" (UID: \"882a84b2-ab15-4980-a025-91fb1c1f8943\") " pod="kube-system/kube-proxy-q848s" Feb 13 02:40:43.005503 kubelet[1871]: I0213 02:40:43.005492 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1fba6f88-406e-4a80-933c-dfbc0d605dcb-cni-net-dir\") pod \"calico-node-h8krk\" (UID: \"1fba6f88-406e-4a80-933c-dfbc0d605dcb\") " pod="calico-system/calico-node-h8krk" Feb 13 02:40:43.005714 kubelet[1871]: I0213 02:40:43.005573 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/9a6268d2-c909-4459-9230-b4453f549c04-kubelet-dir\") pod \"csi-node-driver-fpkxk\" (UID: \"9a6268d2-c909-4459-9230-b4453f549c04\") " pod="calico-system/csi-node-driver-fpkxk" Feb 13 02:40:43.005714 kubelet[1871]: I0213 02:40:43.005642 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/882a84b2-ab15-4980-a025-91fb1c1f8943-lib-modules\") pod \"kube-proxy-q848s\" (UID: \"882a84b2-ab15-4980-a025-91fb1c1f8943\") " pod="kube-system/kube-proxy-q848s" Feb 13 02:40:43.005714 kubelet[1871]: I0213 02:40:43.005707 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tc2th\" (UniqueName: \"kubernetes.io/projected/882a84b2-ab15-4980-a025-91fb1c1f8943-kube-api-access-tc2th\") pod \"kube-proxy-q848s\" (UID: \"882a84b2-ab15-4980-a025-91fb1c1f8943\") " pod="kube-system/kube-proxy-q848s" Feb 13 02:40:43.006014 kubelet[1871]: I0213 02:40:43.005792 1871 reconciler.go:41] "Reconciler: start to sync state" Feb 13 02:40:43.108922 kubelet[1871]: E0213 02:40:43.108809 1871 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 02:40:43.108922 kubelet[1871]: W0213 02:40:43.108875 1871 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 02:40:43.108922 kubelet[1871]: E0213 02:40:43.108937 1871 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 02:40:43.109578 kubelet[1871]: E0213 02:40:43.109497 1871 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 02:40:43.109578 kubelet[1871]: W0213 02:40:43.109532 1871 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 02:40:43.109578 kubelet[1871]: E0213 02:40:43.109589 1871 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 02:40:43.110263 kubelet[1871]: E0213 02:40:43.110179 1871 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 02:40:43.110263 kubelet[1871]: W0213 02:40:43.110212 1871 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 02:40:43.110701 kubelet[1871]: E0213 02:40:43.110331 1871 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 02:40:43.110928 kubelet[1871]: E0213 02:40:43.110821 1871 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 02:40:43.110928 kubelet[1871]: W0213 02:40:43.110854 1871 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 02:40:43.111210 kubelet[1871]: E0213 02:40:43.110947 1871 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 02:40:43.111430 kubelet[1871]: E0213 02:40:43.111394 1871 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 02:40:43.111594 kubelet[1871]: W0213 02:40:43.111429 1871 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 02:40:43.111594 kubelet[1871]: E0213 02:40:43.111536 1871 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 02:40:43.112038 kubelet[1871]: E0213 02:40:43.111964 1871 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 02:40:43.112038 kubelet[1871]: W0213 02:40:43.111997 1871 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 02:40:43.112038 kubelet[1871]: E0213 02:40:43.112041 1871 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 02:40:43.113444 kubelet[1871]: E0213 02:40:43.113437 1871 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 02:40:43.113444 kubelet[1871]: W0213 02:40:43.113442 1871 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 02:40:43.113539 kubelet[1871]: E0213 02:40:43.113450 1871 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 02:40:43.123737 kubelet[1871]: E0213 02:40:43.123698 1871 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 02:40:43.123737 kubelet[1871]: W0213 02:40:43.123704 1871 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 02:40:43.123737 kubelet[1871]: E0213 02:40:43.123721 1871 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 02:40:43.130522 kubelet[1871]: E0213 02:40:43.130470 1871 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 02:40:43.130522 kubelet[1871]: W0213 02:40:43.130478 1871 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 02:40:43.130522 kubelet[1871]: E0213 02:40:43.130489 1871 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 02:40:43.132069 kubelet[1871]: E0213 02:40:43.132021 1871 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 13 02:40:43.132069 kubelet[1871]: W0213 02:40:43.132029 1871 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 13 02:40:43.132069 kubelet[1871]: E0213 02:40:43.132039 1871 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 13 02:40:43.214841 env[1468]: time="2024-02-13T02:40:43.214596941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h8krk,Uid:1fba6f88-406e-4a80-933c-dfbc0d605dcb,Namespace:calico-system,Attempt:0,}" Feb 13 02:40:43.217190 env[1468]: time="2024-02-13T02:40:43.217024592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-q848s,Uid:882a84b2-ab15-4980-a025-91fb1c1f8943,Namespace:kube-system,Attempt:0,}" Feb 13 02:40:43.885021 kubelet[1871]: E0213 02:40:43.884950 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:44.092184 env[1468]: time="2024-02-13T02:40:44.092134811Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:44.093639 env[1468]: time="2024-02-13T02:40:44.093596655Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:44.094295 env[1468]: time="2024-02-13T02:40:44.094256259Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:44.094742 env[1468]: time="2024-02-13T02:40:44.094693606Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:44.095968 env[1468]: time="2024-02-13T02:40:44.095929302Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:44.097601 env[1468]: time="2024-02-13T02:40:44.097577565Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:44.098342 env[1468]: time="2024-02-13T02:40:44.098305086Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:44.099288 env[1468]: time="2024-02-13T02:40:44.099251531Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:44.104002 env[1468]: time="2024-02-13T02:40:44.103921231Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 02:40:44.104002 env[1468]: time="2024-02-13T02:40:44.103944997Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 02:40:44.104002 env[1468]: time="2024-02-13T02:40:44.103970198Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 02:40:44.104108 env[1468]: time="2024-02-13T02:40:44.104052491Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4635d349632bfba92a4b0de4142cd64b5b876d4d1e53dbfa86f12321c8d8188e pid=1956 runtime=io.containerd.runc.v2 Feb 13 02:40:44.104609 env[1468]: time="2024-02-13T02:40:44.104538793Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 02:40:44.104609 env[1468]: time="2024-02-13T02:40:44.104554469Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 02:40:44.104609 env[1468]: time="2024-02-13T02:40:44.104577484Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 02:40:44.104698 env[1468]: time="2024-02-13T02:40:44.104650570Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/197268ffcc8fe9b4a942fa4415cfb1710ead4741cdb0d11ad05e73d64bef2461 pid=1964 runtime=io.containerd.runc.v2 Feb 13 02:40:44.110403 systemd[1]: Started cri-containerd-197268ffcc8fe9b4a942fa4415cfb1710ead4741cdb0d11ad05e73d64bef2461.scope. Feb 13 02:40:44.111205 systemd[1]: Started cri-containerd-4635d349632bfba92a4b0de4142cd64b5b876d4d1e53dbfa86f12321c8d8188e.scope. Feb 13 02:40:44.115514 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1757752398.mount: Deactivated successfully. Feb 13 02:40:44.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit: BPF prog-id=61 op=LOAD Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000195c48 a2=10 a3=1c items=0 ppid=1956 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:44.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333564333439363332626662613932613462306465343134326364 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001956b0 a2=3c a3=c items=0 ppid=1956 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:44.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333564333439363332626662613932613462306465343134326364 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit: BPF prog-id=62 op=LOAD Feb 13 02:40:44.116000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001959d8 a2=78 a3=c000300690 items=0 ppid=1956 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:44.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333564333439363332626662613932613462306465343134326364 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.116000 audit: BPF prog-id=63 op=LOAD Feb 13 02:40:44.116000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000195770 a2=78 a3=c0003006d8 items=0 ppid=1956 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:44.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333564333439363332626662613932613462306465343134326364 Feb 13 02:40:44.116000 audit: BPF prog-id=63 op=UNLOAD Feb 13 02:40:44.117000 audit: BPF prog-id=62 op=UNLOAD Feb 13 02:40:44.117000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1978]: AVC avc: denied { perfmon } for pid=1978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1978]: AVC avc: denied { bpf } for pid=1978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit: BPF prog-id=64 op=LOAD Feb 13 02:40:44.117000 audit[1978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000195c30 a2=78 a3=c000300ae8 items=0 ppid=1956 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:44.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333564333439363332626662613932613462306465343134326364 Feb 13 02:40:44.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit: BPF prog-id=65 op=LOAD Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1964 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:44.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139373236386666636338666539623461393432666134343135636662 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1964 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:44.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139373236386666636338666539623461393432666134343135636662 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit: BPF prog-id=66 op=LOAD Feb 13 02:40:44.117000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000edd90 items=0 ppid=1964 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:44.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139373236386666636338666539623461393432666134343135636662 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit: BPF prog-id=67 op=LOAD Feb 13 02:40:44.117000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000eddd8 items=0 ppid=1964 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:44.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139373236386666636338666539623461393432666134343135636662 Feb 13 02:40:44.117000 audit: BPF prog-id=67 op=UNLOAD Feb 13 02:40:44.117000 audit: BPF prog-id=66 op=UNLOAD Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:44.117000 audit: BPF prog-id=68 op=LOAD Feb 13 02:40:44.117000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003481e8 items=0 ppid=1964 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:44.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139373236386666636338666539623461393432666134343135636662 Feb 13 02:40:44.121539 env[1468]: time="2024-02-13T02:40:44.121516349Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-h8krk,Uid:1fba6f88-406e-4a80-933c-dfbc0d605dcb,Namespace:calico-system,Attempt:0,} returns sandbox id \"4635d349632bfba92a4b0de4142cd64b5b876d4d1e53dbfa86f12321c8d8188e\"" Feb 13 02:40:44.122187 env[1468]: time="2024-02-13T02:40:44.122158282Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-q848s,Uid:882a84b2-ab15-4980-a025-91fb1c1f8943,Namespace:kube-system,Attempt:0,} returns sandbox id \"197268ffcc8fe9b4a942fa4415cfb1710ead4741cdb0d11ad05e73d64bef2461\"" Feb 13 02:40:44.122414 env[1468]: time="2024-02-13T02:40:44.122398858Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 13 02:40:44.576926 kubelet[1871]: E0213 02:40:44.576838 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:40:44.885916 kubelet[1871]: E0213 02:40:44.885701 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:45.886996 kubelet[1871]: E0213 02:40:45.886885 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:46.576151 kubelet[1871]: E0213 02:40:46.576070 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:40:46.887297 kubelet[1871]: E0213 02:40:46.887067 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:47.586639 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1450152931.mount: Deactivated successfully. Feb 13 02:40:47.600676 systemd[1]: Started sshd@7-136.144.54.113:22-109.123.237.173:59656.service. Feb 13 02:40:47.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-136.144.54.113:22-109.123.237.173:59656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:47.627421 kernel: kauditd_printk_skb: 157 callbacks suppressed Feb 13 02:40:47.627489 kernel: audit: type=1130 audit(1707792047.600:584): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-136.144.54.113:22-109.123.237.173:59656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:47.888611 kubelet[1871]: E0213 02:40:47.888376 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:48.528011 sshd[2024]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.123.237.173 user=root Feb 13 02:40:48.527000 audit[2024]: USER_AUTH pid=2024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:40:48.576782 kubelet[1871]: E0213 02:40:48.576737 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:40:48.619660 kernel: audit: type=1100 audit(1707792048.527:585): pid=2024 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:40:48.889212 kubelet[1871]: E0213 02:40:48.889044 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:49.889422 kubelet[1871]: E0213 02:40:49.889317 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:50.576353 kubelet[1871]: E0213 02:40:50.576244 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:40:50.666773 sshd[2024]: Failed password for root from 109.123.237.173 port 59656 ssh2 Feb 13 02:40:50.890220 kubelet[1871]: E0213 02:40:50.890122 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:51.891379 kubelet[1871]: E0213 02:40:51.891271 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:52.549265 sshd[2024]: Received disconnect from 109.123.237.173 port 59656:11: Bye Bye [preauth] Feb 13 02:40:52.549265 sshd[2024]: Disconnected from authenticating user root 109.123.237.173 port 59656 [preauth] Feb 13 02:40:52.551821 systemd[1]: sshd@7-136.144.54.113:22-109.123.237.173:59656.service: Deactivated successfully. Feb 13 02:40:52.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-136.144.54.113:22-109.123.237.173:59656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:52.576686 kubelet[1871]: E0213 02:40:52.576676 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:40:52.642548 kernel: audit: type=1131 audit(1707792052.551:586): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-136.144.54.113:22-109.123.237.173:59656 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:40:52.892735 kubelet[1871]: E0213 02:40:52.892514 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:53.893040 kubelet[1871]: E0213 02:40:53.892936 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:54.577222 kubelet[1871]: E0213 02:40:54.577115 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:40:54.893803 kubelet[1871]: E0213 02:40:54.893583 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:55.894806 kubelet[1871]: E0213 02:40:55.894703 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:56.576522 kubelet[1871]: E0213 02:40:56.576418 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:40:56.895301 kubelet[1871]: E0213 02:40:56.895076 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:56.901938 systemd-timesyncd[1412]: Contacted time server [2600:3c02:e001:1d00::123:0]:123 (2.flatcar.pool.ntp.org). Feb 13 02:40:56.902084 systemd-timesyncd[1412]: Initial clock synchronization to Tue 2024-02-13 02:40:56.733304 UTC. Feb 13 02:40:57.155515 env[1468]: time="2024-02-13T02:40:57.155394727Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:57.156126 env[1468]: time="2024-02-13T02:40:57.156085966Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:57.157525 env[1468]: time="2024-02-13T02:40:57.157479949Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:57.158478 env[1468]: time="2024-02-13T02:40:57.158420342Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:57.159490 env[1468]: time="2024-02-13T02:40:57.159452822Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 13 02:40:57.159988 env[1468]: time="2024-02-13T02:40:57.159922774Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 13 02:40:57.160560 env[1468]: time="2024-02-13T02:40:57.160519343Z" level=info msg="CreateContainer within sandbox \"4635d349632bfba92a4b0de4142cd64b5b876d4d1e53dbfa86f12321c8d8188e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 13 02:40:57.165658 env[1468]: time="2024-02-13T02:40:57.165615635Z" level=info msg="CreateContainer within sandbox \"4635d349632bfba92a4b0de4142cd64b5b876d4d1e53dbfa86f12321c8d8188e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"eee5b94296d2760fca430606849b13d23e4a13fdfb708a7ae9ac92874586b721\"" Feb 13 02:40:57.165912 env[1468]: time="2024-02-13T02:40:57.165855242Z" level=info msg="StartContainer for \"eee5b94296d2760fca430606849b13d23e4a13fdfb708a7ae9ac92874586b721\"" Feb 13 02:40:57.174878 systemd[1]: Started cri-containerd-eee5b94296d2760fca430606849b13d23e4a13fdfb708a7ae9ac92874586b721.scope. Feb 13 02:40:57.182000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.182000 audit[2035]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f567eb17ba8 items=0 ppid=1956 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:57.338139 kernel: audit: type=1400 audit(1707792057.182:587): avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.338177 kernel: audit: type=1300 audit(1707792057.182:587): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f567eb17ba8 items=0 ppid=1956 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:57.338196 kernel: audit: type=1327 audit(1707792057.182:587): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653562393432393664323736306663613433303630363834396231 Feb 13 02:40:57.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653562393432393664323736306663613433303630363834396231 Feb 13 02:40:57.427898 kernel: audit: type=1400 audit(1707792057.182:588): avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.182000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.488918 kernel: audit: type=1400 audit(1707792057.182:588): avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.182000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.549966 kernel: audit: type=1400 audit(1707792057.182:588): avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.182000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.611279 kernel: audit: type=1400 audit(1707792057.182:588): avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.182000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.673315 kernel: audit: type=1400 audit(1707792057.182:588): avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.182000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.680863 env[1468]: time="2024-02-13T02:40:57.680795724Z" level=info msg="StartContainer for \"eee5b94296d2760fca430606849b13d23e4a13fdfb708a7ae9ac92874586b721\" returns successfully" Feb 13 02:40:57.182000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.735864 systemd[1]: cri-containerd-eee5b94296d2760fca430606849b13d23e4a13fdfb708a7ae9ac92874586b721.scope: Deactivated successfully. Feb 13 02:40:57.736470 kernel: audit: type=1400 audit(1707792057.182:588): avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.745488 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-eee5b94296d2760fca430606849b13d23e4a13fdfb708a7ae9ac92874586b721-rootfs.mount: Deactivated successfully. Feb 13 02:40:57.182000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.860517 kernel: audit: type=1400 audit(1707792057.182:588): avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.182000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.182000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.182000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.182000 audit: BPF prog-id=69 op=LOAD Feb 13 02:40:57.182000 audit[2035]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00028f4e8 items=0 ppid=1956 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:57.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653562393432393664323736306663613433303630363834396231 Feb 13 02:40:57.337000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.337000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.337000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.337000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.337000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.337000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.337000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.337000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.337000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.337000 audit: BPF prog-id=70 op=LOAD Feb 13 02:40:57.337000 audit[2035]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00028f538 items=0 ppid=1956 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:57.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653562393432393664323736306663613433303630363834396231 Feb 13 02:40:57.487000 audit: BPF prog-id=70 op=UNLOAD Feb 13 02:40:57.487000 audit: BPF prog-id=69 op=UNLOAD Feb 13 02:40:57.487000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.487000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.487000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.487000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.487000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.487000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.487000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.487000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.487000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.487000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:57.487000 audit: BPF prog-id=71 op=LOAD Feb 13 02:40:57.487000 audit[2035]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00028f5c8 items=0 ppid=1956 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:57.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565653562393432393664323736306663613433303630363834396231 Feb 13 02:40:57.866000 audit: BPF prog-id=71 op=UNLOAD Feb 13 02:40:57.880526 env[1468]: time="2024-02-13T02:40:57.880433080Z" level=info msg="shim disconnected" id=eee5b94296d2760fca430606849b13d23e4a13fdfb708a7ae9ac92874586b721 Feb 13 02:40:57.880526 env[1468]: time="2024-02-13T02:40:57.880494870Z" level=warning msg="cleaning up after shim disconnected" id=eee5b94296d2760fca430606849b13d23e4a13fdfb708a7ae9ac92874586b721 namespace=k8s.io Feb 13 02:40:57.880526 env[1468]: time="2024-02-13T02:40:57.880510218Z" level=info msg="cleaning up dead shim" Feb 13 02:40:57.887120 env[1468]: time="2024-02-13T02:40:57.887063246Z" level=warning msg="cleanup warnings time=\"2024-02-13T02:40:57Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2074 runtime=io.containerd.runc.v2\n" Feb 13 02:40:57.895822 kubelet[1871]: E0213 02:40:57.895777 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:58.188361 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount603442955.mount: Deactivated successfully. Feb 13 02:40:58.516894 env[1468]: time="2024-02-13T02:40:58.516847921Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:58.517379 env[1468]: time="2024-02-13T02:40:58.517365369Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:58.518128 env[1468]: time="2024-02-13T02:40:58.518115405Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:58.518641 env[1468]: time="2024-02-13T02:40:58.518625748Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:40:58.518937 env[1468]: time="2024-02-13T02:40:58.518910026Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 13 02:40:58.520095 env[1468]: time="2024-02-13T02:40:58.520082534Z" level=info msg="CreateContainer within sandbox \"197268ffcc8fe9b4a942fa4415cfb1710ead4741cdb0d11ad05e73d64bef2461\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 13 02:40:58.525414 env[1468]: time="2024-02-13T02:40:58.525372999Z" level=info msg="CreateContainer within sandbox \"197268ffcc8fe9b4a942fa4415cfb1710ead4741cdb0d11ad05e73d64bef2461\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"12e7603c54295e2b5b4ab7cdf7dfc7237b631c204bf29d20e3a13c98cc377c02\"" Feb 13 02:40:58.525757 env[1468]: time="2024-02-13T02:40:58.525699846Z" level=info msg="StartContainer for \"12e7603c54295e2b5b4ab7cdf7dfc7237b631c204bf29d20e3a13c98cc377c02\"" Feb 13 02:40:58.534867 systemd[1]: Started cri-containerd-12e7603c54295e2b5b4ab7cdf7dfc7237b631c204bf29d20e3a13c98cc377c02.scope. Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc528f2fdd8 items=0 ppid=1964 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132653736303363353432393565326235623461623763646637646663 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit: BPF prog-id=72 op=LOAD Feb 13 02:40:58.540000 audit[2093]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003801b8 items=0 ppid=1964 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132653736303363353432393565326235623461623763646637646663 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit: BPF prog-id=73 op=LOAD Feb 13 02:40:58.540000 audit[2093]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000380208 items=0 ppid=1964 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132653736303363353432393565326235623461623763646637646663 Feb 13 02:40:58.540000 audit: BPF prog-id=73 op=UNLOAD Feb 13 02:40:58.540000 audit: BPF prog-id=72 op=UNLOAD Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { perfmon } for pid=2093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit[2093]: AVC avc: denied { bpf } for pid=2093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:40:58.540000 audit: BPF prog-id=74 op=LOAD Feb 13 02:40:58.540000 audit[2093]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000380298 items=0 ppid=1964 pid=2093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132653736303363353432393565326235623461623763646637646663 Feb 13 02:40:58.547809 env[1468]: time="2024-02-13T02:40:58.547764117Z" level=info msg="StartContainer for \"12e7603c54295e2b5b4ab7cdf7dfc7237b631c204bf29d20e3a13c98cc377c02\" returns successfully" Feb 13 02:40:58.576609 kubelet[1871]: E0213 02:40:58.576566 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:40:58.586000 audit[2155]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.586000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd33afd60 a2=0 a3=7fffd33afd4c items=0 ppid=2104 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.586000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 13 02:40:58.586000 audit[2156]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.586000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcef44bb50 a2=0 a3=7ffcef44bb3c items=0 ppid=2104 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 13 02:40:58.587000 audit[2157]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.587000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1154b1f0 a2=0 a3=7ffd1154b1dc items=0 ppid=2104 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 13 02:40:58.587000 audit[2158]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.587000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff9636e5e0 a2=0 a3=7fff9636e5cc items=0 ppid=2104 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 13 02:40:58.587000 audit[2159]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.587000 audit[2159]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7a545620 a2=0 a3=7ffc7a54560c items=0 ppid=2104 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.587000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 13 02:40:58.588000 audit[2160]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.588000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff3b2d6740 a2=0 a3=7fff3b2d672c items=0 ppid=2104 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 13 02:40:58.622794 env[1468]: time="2024-02-13T02:40:58.622702369Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 13 02:40:58.638541 kubelet[1871]: I0213 02:40:58.638490 1871 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-q848s" podStartSLOduration=3.241877138 podCreationTimestamp="2024-02-13 02:40:41 +0000 UTC" firstStartedPulling="2024-02-13 02:40:44.12253392 +0000 UTC m=+4.515855062" lastFinishedPulling="2024-02-13 02:40:58.519040493 +0000 UTC m=+18.912361635" observedRunningTime="2024-02-13 02:40:58.635661307 +0000 UTC m=+19.028982508" watchObservedRunningTime="2024-02-13 02:40:58.638383711 +0000 UTC m=+19.031704899" Feb 13 02:40:58.692000 audit[2166]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.692000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe313649e0 a2=0 a3=7ffe313649cc items=0 ppid=2104 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.692000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 13 02:40:58.700000 audit[2168]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.700000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc6ccdd1a0 a2=0 a3=7ffc6ccdd18c items=0 ppid=2104 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.700000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 13 02:40:58.708000 audit[2171]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.708000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc33c9a7a0 a2=0 a3=7ffc33c9a78c items=0 ppid=2104 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.708000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 13 02:40:58.711000 audit[2172]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.711000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff393431d0 a2=0 a3=7fff393431bc items=0 ppid=2104 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.711000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 13 02:40:58.718000 audit[2174]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.718000 audit[2174]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf1551320 a2=0 a3=7ffcf155130c items=0 ppid=2104 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.718000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 13 02:40:58.721000 audit[2175]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.721000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1af61b50 a2=0 a3=7ffd1af61b3c items=0 ppid=2104 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.721000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 13 02:40:58.727000 audit[2177]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.727000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe1eac4ea0 a2=0 a3=7ffe1eac4e8c items=0 ppid=2104 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 13 02:40:58.736000 audit[2180]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.736000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc29b15650 a2=0 a3=7ffc29b1563c items=0 ppid=2104 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.736000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 13 02:40:58.739000 audit[2181]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.739000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc06e99e70 a2=0 a3=7ffc06e99e5c items=0 ppid=2104 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 13 02:40:58.744000 audit[2183]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.744000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce2f6cb20 a2=0 a3=7ffce2f6cb0c items=0 ppid=2104 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.744000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 13 02:40:58.746000 audit[2184]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.746000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff35fb0210 a2=0 a3=7fff35fb01fc items=0 ppid=2104 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 13 02:40:58.753000 audit[2186]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.753000 audit[2186]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffa6119f90 a2=0 a3=7fffa6119f7c items=0 ppid=2104 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 02:40:58.762000 audit[2189]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.762000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb978bcf0 a2=0 a3=7ffdb978bcdc items=0 ppid=2104 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.762000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 02:40:58.772000 audit[2192]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.772000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc077f11d0 a2=0 a3=7ffc077f11bc items=0 ppid=2104 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.772000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 13 02:40:58.774000 audit[2193]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.774000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcac7e45b0 a2=0 a3=7ffcac7e459c items=0 ppid=2104 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.774000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 13 02:40:58.780000 audit[2195]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.780000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffce1d39090 a2=0 a3=7ffce1d3907c items=0 ppid=2104 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.780000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 02:40:58.844000 audit[2200]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.844000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe53359d90 a2=0 a3=7ffe53359d7c items=0 ppid=2104 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.844000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 02:40:58.849000 audit[2205]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.849000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2cafacb0 a2=0 a3=7ffc2cafac9c items=0 ppid=2104 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.849000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 13 02:40:58.851000 audit[2207]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 13 02:40:58.851000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffccaf6add0 a2=0 a3=7ffccaf6adbc items=0 ppid=2104 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.851000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 13 02:40:58.862000 audit[2209]: NETFILTER_CFG table=filter:39 family=2 entries=9 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:40:58.862000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffe6b4bc390 a2=0 a3=7ffe6b4bc37c items=0 ppid=2104 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.862000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:40:58.879000 audit[2209]: NETFILTER_CFG table=nat:40 family=2 entries=14 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:40:58.879000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffe6b4bc390 a2=0 a3=7ffe6b4bc37c items=0 ppid=2104 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.879000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:40:58.880000 audit[2215]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.880000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffed1a955f0 a2=0 a3=7ffed1a955dc items=0 ppid=2104 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.880000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 13 02:40:58.882000 audit[2217]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.882000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcd6db7d00 a2=0 a3=7ffcd6db7cec items=0 ppid=2104 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.882000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 13 02:40:58.887000 audit[2220]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.887000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc77c97b10 a2=0 a3=7ffc77c97afc items=0 ppid=2104 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.887000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 13 02:40:58.888000 audit[2221]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.888000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff328702a0 a2=0 a3=7fff3287028c items=0 ppid=2104 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.888000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 13 02:40:58.890000 audit[2223]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.890000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffebb1ea290 a2=0 a3=7ffebb1ea27c items=0 ppid=2104 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.890000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 13 02:40:58.891000 audit[2224]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.891000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda4146790 a2=0 a3=7ffda414677c items=0 ppid=2104 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.891000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 13 02:40:58.894000 audit[2226]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.894000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdae9ffcf0 a2=0 a3=7ffdae9ffcdc items=0 ppid=2104 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.894000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 13 02:40:58.896202 kubelet[1871]: E0213 02:40:58.896178 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:58.898000 audit[2229]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.898000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd228e6750 a2=0 a3=7ffd228e673c items=0 ppid=2104 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.898000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 13 02:40:58.899000 audit[2230]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.899000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe36cb2a10 a2=0 a3=7ffe36cb29fc items=0 ppid=2104 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.899000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 13 02:40:58.901000 audit[2232]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.901000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe28c35cd0 a2=0 a3=7ffe28c35cbc items=0 ppid=2104 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.901000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 13 02:40:58.902000 audit[2233]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.902000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0c49aa60 a2=0 a3=7fff0c49aa4c items=0 ppid=2104 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.902000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 13 02:40:58.904000 audit[2235]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.904000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1c8a7160 a2=0 a3=7fff1c8a714c items=0 ppid=2104 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 13 02:40:58.908000 audit[2238]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.908000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3e9146f0 a2=0 a3=7ffc3e9146dc items=0 ppid=2104 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.908000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 13 02:40:58.912000 audit[2241]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.912000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeae142ed0 a2=0 a3=7ffeae142ebc items=0 ppid=2104 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.912000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 13 02:40:58.913000 audit[2242]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.913000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff7cc94460 a2=0 a3=7fff7cc9444c items=0 ppid=2104 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.913000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 13 02:40:58.916000 audit[2244]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.916000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdc01d9700 a2=0 a3=7ffdc01d96ec items=0 ppid=2104 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.916000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 02:40:58.919000 audit[2247]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.919000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fffe5e35150 a2=0 a3=7fffe5e3513c items=0 ppid=2104 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.919000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 13 02:40:58.920000 audit[2248]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.920000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb20a2090 a2=0 a3=7ffeb20a207c items=0 ppid=2104 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.920000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 13 02:40:58.923000 audit[2250]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.923000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff050e8d20 a2=0 a3=7fff050e8d0c items=0 ppid=2104 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.923000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 02:40:58.926000 audit[2253]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.926000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe278a99d0 a2=0 a3=7ffe278a99bc items=0 ppid=2104 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.926000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 13 02:40:58.929000 audit[2254]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.929000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1312f9e0 a2=0 a3=7ffc1312f9cc items=0 ppid=2104 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 13 02:40:58.931000 audit[2256]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 13 02:40:58.931000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff853e0a60 a2=0 a3=7fff853e0a4c items=0 ppid=2104 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.931000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 13 02:40:58.934000 audit[2258]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 13 02:40:58.934000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdb9646060 a2=0 a3=7ffdb964604c items=0 ppid=2104 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.934000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:40:58.935000 audit[2258]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 13 02:40:58.935000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffdb9646060 a2=0 a3=7ffdb964604c items=0 ppid=2104 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:40:58.935000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:40:59.883096 kubelet[1871]: E0213 02:40:59.882984 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:40:59.896420 kubelet[1871]: E0213 02:40:59.896305 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:00.576291 kubelet[1871]: E0213 02:41:00.576185 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:41:00.896735 kubelet[1871]: E0213 02:41:00.896522 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:01.897847 kubelet[1871]: E0213 02:41:01.897738 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:01.988462 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3024710609.mount: Deactivated successfully. Feb 13 02:41:02.576415 kubelet[1871]: E0213 02:41:02.576336 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:41:02.898426 kubelet[1871]: E0213 02:41:02.898240 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:03.898582 kubelet[1871]: E0213 02:41:03.898449 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:04.576684 kubelet[1871]: E0213 02:41:04.576580 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:41:04.899823 kubelet[1871]: E0213 02:41:04.899640 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:05.900912 kubelet[1871]: E0213 02:41:05.900796 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:06.576763 kubelet[1871]: E0213 02:41:06.576654 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:41:06.901560 kubelet[1871]: E0213 02:41:06.901320 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:07.902449 kubelet[1871]: E0213 02:41:07.902341 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:08.577017 kubelet[1871]: E0213 02:41:08.576916 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:41:08.903267 kubelet[1871]: E0213 02:41:08.903062 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:09.903711 kubelet[1871]: E0213 02:41:09.903619 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:10.577244 kubelet[1871]: E0213 02:41:10.577123 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:41:10.826353 update_engine[1460]: I0213 02:41:10.826238 1460 update_attempter.cc:509] Updating boot flags... Feb 13 02:41:10.904109 kubelet[1871]: E0213 02:41:10.904032 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:11.904791 kubelet[1871]: E0213 02:41:11.904682 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:12.576540 kubelet[1871]: E0213 02:41:12.576447 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:41:12.905340 kubelet[1871]: E0213 02:41:12.905136 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:13.905691 kubelet[1871]: E0213 02:41:13.905645 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:14.576600 kubelet[1871]: E0213 02:41:14.576559 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:41:14.812072 env[1468]: time="2024-02-13T02:41:14.812047356Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:41:14.812653 env[1468]: time="2024-02-13T02:41:14.812642209Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:41:14.813949 env[1468]: time="2024-02-13T02:41:14.813906685Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:41:14.814710 env[1468]: time="2024-02-13T02:41:14.814670240Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:41:14.815119 env[1468]: time="2024-02-13T02:41:14.815076424Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 13 02:41:14.816290 env[1468]: time="2024-02-13T02:41:14.816276809Z" level=info msg="CreateContainer within sandbox \"4635d349632bfba92a4b0de4142cd64b5b876d4d1e53dbfa86f12321c8d8188e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 13 02:41:14.820808 env[1468]: time="2024-02-13T02:41:14.820791103Z" level=info msg="CreateContainer within sandbox \"4635d349632bfba92a4b0de4142cd64b5b876d4d1e53dbfa86f12321c8d8188e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7635631479ea85a51a5ee4de10c34cb20fbe399ff02b9b859ede2f0b1bbc4be3\"" Feb 13 02:41:14.821059 env[1468]: time="2024-02-13T02:41:14.821044093Z" level=info msg="StartContainer for \"7635631479ea85a51a5ee4de10c34cb20fbe399ff02b9b859ede2f0b1bbc4be3\"" Feb 13 02:41:14.831688 systemd[1]: Started cri-containerd-7635631479ea85a51a5ee4de10c34cb20fbe399ff02b9b859ede2f0b1bbc4be3.scope. Feb 13 02:41:14.837000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.866051 kernel: kauditd_printk_skb: 230 callbacks suppressed Feb 13 02:41:14.866088 kernel: audit: type=1400 audit(1707792074.837:651): avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.906278 kubelet[1871]: E0213 02:41:14.906239 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:14.837000 audit[2285]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f58c0117398 items=0 ppid=1956 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:14.930539 kernel: audit: type=1300 audit(1707792074.837:651): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f58c0117398 items=0 ppid=1956 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:14.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736333536333134373965613835613531613565653464653130633334 Feb 13 02:41:15.119859 kernel: audit: type=1327 audit(1707792074.837:651): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736333536333134373965613835613531613565653464653130633334 Feb 13 02:41:15.119896 kernel: audit: type=1400 audit(1707792074.837:652): avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.837000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.183471 kernel: audit: type=1400 audit(1707792074.837:652): avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.837000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.246993 kernel: audit: type=1400 audit(1707792074.837:652): avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.837000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.310611 kernel: audit: type=1400 audit(1707792074.837:652): avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.837000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.315782 env[1468]: time="2024-02-13T02:41:15.315761958Z" level=info msg="StartContainer for \"7635631479ea85a51a5ee4de10c34cb20fbe399ff02b9b859ede2f0b1bbc4be3\" returns successfully" Feb 13 02:41:15.374751 kernel: audit: type=1400 audit(1707792074.837:652): avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.837000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.438912 kernel: audit: type=1400 audit(1707792074.837:652): avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.837000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.503025 kernel: audit: type=1400 audit(1707792074.837:652): avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.837000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.837000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.837000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.837000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.837000 audit: BPF prog-id=75 op=LOAD Feb 13 02:41:14.837000 audit[2285]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00034dba8 items=0 ppid=1956 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:14.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736333536333134373965613835613531613565653464653130633334 Feb 13 02:41:14.928000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.928000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.928000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.928000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.928000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.928000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.928000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.928000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.928000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:14.928000 audit: BPF prog-id=76 op=LOAD Feb 13 02:41:14.928000 audit[2285]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00034dbf8 items=0 ppid=1956 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:14.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736333536333134373965613835613531613565653464653130633334 Feb 13 02:41:15.119000 audit: BPF prog-id=76 op=UNLOAD Feb 13 02:41:15.119000 audit: BPF prog-id=75 op=UNLOAD Feb 13 02:41:15.119000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.119000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.119000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.119000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.119000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.119000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.119000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.119000 audit[2285]: AVC avc: denied { perfmon } for pid=2285 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.119000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.119000 audit[2285]: AVC avc: denied { bpf } for pid=2285 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:15.119000 audit: BPF prog-id=77 op=LOAD Feb 13 02:41:15.119000 audit[2285]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00034dc88 items=0 ppid=1956 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:15.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736333536333134373965613835613531613565653464653130633334 Feb 13 02:41:15.906840 kubelet[1871]: E0213 02:41:15.906763 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:15.946138 env[1468]: time="2024-02-13T02:41:15.945966982Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 13 02:41:15.951277 systemd[1]: cri-containerd-7635631479ea85a51a5ee4de10c34cb20fbe399ff02b9b859ede2f0b1bbc4be3.scope: Deactivated successfully. Feb 13 02:41:15.960639 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7635631479ea85a51a5ee4de10c34cb20fbe399ff02b9b859ede2f0b1bbc4be3-rootfs.mount: Deactivated successfully. Feb 13 02:41:15.962919 kubelet[1871]: I0213 02:41:15.962906 1871 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 13 02:41:15.963000 audit: BPF prog-id=77 op=UNLOAD Feb 13 02:41:15.979605 kubelet[1871]: I0213 02:41:15.979566 1871 topology_manager.go:212] "Topology Admit Handler" Feb 13 02:41:15.981240 kubelet[1871]: I0213 02:41:15.981201 1871 topology_manager.go:212] "Topology Admit Handler" Feb 13 02:41:15.981376 kubelet[1871]: I0213 02:41:15.981364 1871 topology_manager.go:212] "Topology Admit Handler" Feb 13 02:41:15.984114 systemd[1]: Created slice kubepods-burstable-pod06d66a20_41d3_4311_9714_4e9d6f4f6a71.slice. Feb 13 02:41:16.013714 systemd[1]: Created slice kubepods-burstable-podcda955da_81e6_4f98_b891_1ef2ce42b6c0.slice. Feb 13 02:41:16.022759 systemd[1]: Created slice kubepods-besteffort-poda0281f43_d115_4a39_967f_62ecd5ce6e67.slice. Feb 13 02:41:16.038078 kubelet[1871]: I0213 02:41:16.037995 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cda955da-81e6-4f98-b891-1ef2ce42b6c0-config-volume\") pod \"coredns-5d78c9869d-rq4xx\" (UID: \"cda955da-81e6-4f98-b891-1ef2ce42b6c0\") " pod="kube-system/coredns-5d78c9869d-rq4xx" Feb 13 02:41:16.038292 kubelet[1871]: I0213 02:41:16.038171 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a0281f43-d115-4a39-967f-62ecd5ce6e67-tigera-ca-bundle\") pod \"calico-kube-controllers-79ddd57576-wxtrn\" (UID: \"a0281f43-d115-4a39-967f-62ecd5ce6e67\") " pod="calico-system/calico-kube-controllers-79ddd57576-wxtrn" Feb 13 02:41:16.038292 kubelet[1871]: I0213 02:41:16.038269 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/06d66a20-41d3-4311-9714-4e9d6f4f6a71-config-volume\") pod \"coredns-5d78c9869d-rcxq6\" (UID: \"06d66a20-41d3-4311-9714-4e9d6f4f6a71\") " pod="kube-system/coredns-5d78c9869d-rcxq6" Feb 13 02:41:16.038538 kubelet[1871]: I0213 02:41:16.038452 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9lfgp\" (UniqueName: \"kubernetes.io/projected/06d66a20-41d3-4311-9714-4e9d6f4f6a71-kube-api-access-9lfgp\") pod \"coredns-5d78c9869d-rcxq6\" (UID: \"06d66a20-41d3-4311-9714-4e9d6f4f6a71\") " pod="kube-system/coredns-5d78c9869d-rcxq6" Feb 13 02:41:16.038737 kubelet[1871]: I0213 02:41:16.038652 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-62rmj\" (UniqueName: \"kubernetes.io/projected/cda955da-81e6-4f98-b891-1ef2ce42b6c0-kube-api-access-62rmj\") pod \"coredns-5d78c9869d-rq4xx\" (UID: \"cda955da-81e6-4f98-b891-1ef2ce42b6c0\") " pod="kube-system/coredns-5d78c9869d-rq4xx" Feb 13 02:41:16.038854 kubelet[1871]: I0213 02:41:16.038745 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hvmkw\" (UniqueName: \"kubernetes.io/projected/a0281f43-d115-4a39-967f-62ecd5ce6e67-kube-api-access-hvmkw\") pod \"calico-kube-controllers-79ddd57576-wxtrn\" (UID: \"a0281f43-d115-4a39-967f-62ecd5ce6e67\") " pod="calico-system/calico-kube-controllers-79ddd57576-wxtrn" Feb 13 02:41:16.308416 env[1468]: time="2024-02-13T02:41:16.308318637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-rcxq6,Uid:06d66a20-41d3-4311-9714-4e9d6f4f6a71,Namespace:kube-system,Attempt:0,}" Feb 13 02:41:16.319528 env[1468]: time="2024-02-13T02:41:16.319431743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-rq4xx,Uid:cda955da-81e6-4f98-b891-1ef2ce42b6c0,Namespace:kube-system,Attempt:0,}" Feb 13 02:41:16.327906 env[1468]: time="2024-02-13T02:41:16.327831430Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79ddd57576-wxtrn,Uid:a0281f43-d115-4a39-967f-62ecd5ce6e67,Namespace:calico-system,Attempt:0,}" Feb 13 02:41:16.597272 systemd[1]: Created slice kubepods-besteffort-pod9a6268d2_c909_4459_9230_b4453f549c04.slice. Feb 13 02:41:16.601769 env[1468]: time="2024-02-13T02:41:16.601683666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fpkxk,Uid:9a6268d2-c909-4459-9230-b4453f549c04,Namespace:calico-system,Attempt:0,}" Feb 13 02:41:16.629226 env[1468]: time="2024-02-13T02:41:16.629098064Z" level=info msg="shim disconnected" id=7635631479ea85a51a5ee4de10c34cb20fbe399ff02b9b859ede2f0b1bbc4be3 Feb 13 02:41:16.629226 env[1468]: time="2024-02-13T02:41:16.629206680Z" level=warning msg="cleaning up after shim disconnected" id=7635631479ea85a51a5ee4de10c34cb20fbe399ff02b9b859ede2f0b1bbc4be3 namespace=k8s.io Feb 13 02:41:16.629663 env[1468]: time="2024-02-13T02:41:16.629246421Z" level=info msg="cleaning up dead shim" Feb 13 02:41:16.639086 env[1468]: time="2024-02-13T02:41:16.639061012Z" level=warning msg="cleanup warnings time=\"2024-02-13T02:41:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2347 runtime=io.containerd.runc.v2\n" Feb 13 02:41:16.663685 env[1468]: time="2024-02-13T02:41:16.663609571Z" level=error msg="Failed to destroy network for sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.663784 env[1468]: time="2024-02-13T02:41:16.663647605Z" level=error msg="Failed to destroy network for sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.663784 env[1468]: time="2024-02-13T02:41:16.663735155Z" level=error msg="Failed to destroy network for sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.663967 env[1468]: time="2024-02-13T02:41:16.663925950Z" level=error msg="encountered an error cleaning up failed sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.663967 env[1468]: time="2024-02-13T02:41:16.663943817Z" level=error msg="encountered an error cleaning up failed sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.663967 env[1468]: time="2024-02-13T02:41:16.663949226Z" level=error msg="encountered an error cleaning up failed sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.663967 env[1468]: time="2024-02-13T02:41:16.663954012Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-rcxq6,Uid:06d66a20-41d3-4311-9714-4e9d6f4f6a71,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.664070 env[1468]: time="2024-02-13T02:41:16.663979170Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fpkxk,Uid:9a6268d2-c909-4459-9230-b4453f549c04,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.664070 env[1468]: time="2024-02-13T02:41:16.663976696Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79ddd57576-wxtrn,Uid:a0281f43-d115-4a39-967f-62ecd5ce6e67,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.664165 kubelet[1871]: E0213 02:41:16.664107 1871 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.664165 kubelet[1871]: E0213 02:41:16.664119 1871 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.664165 kubelet[1871]: E0213 02:41:16.664146 1871 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-rcxq6" Feb 13 02:41:16.664165 kubelet[1871]: E0213 02:41:16.664146 1871 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fpkxk" Feb 13 02:41:16.664270 kubelet[1871]: E0213 02:41:16.664158 1871 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.664270 kubelet[1871]: E0213 02:41:16.664160 1871 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-rcxq6" Feb 13 02:41:16.664270 kubelet[1871]: E0213 02:41:16.664167 1871 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fpkxk" Feb 13 02:41:16.664270 kubelet[1871]: E0213 02:41:16.664180 1871 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-79ddd57576-wxtrn" Feb 13 02:41:16.664348 kubelet[1871]: E0213 02:41:16.664192 1871 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-79ddd57576-wxtrn" Feb 13 02:41:16.664348 kubelet[1871]: E0213 02:41:16.664196 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-rcxq6_kube-system(06d66a20-41d3-4311-9714-4e9d6f4f6a71)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-rcxq6_kube-system(06d66a20-41d3-4311-9714-4e9d6f4f6a71)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-rcxq6" podUID=06d66a20-41d3-4311-9714-4e9d6f4f6a71 Feb 13 02:41:16.664348 kubelet[1871]: E0213 02:41:16.664201 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-fpkxk_calico-system(9a6268d2-c909-4459-9230-b4453f549c04)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-fpkxk_calico-system(9a6268d2-c909-4459-9230-b4453f549c04)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:41:16.664440 env[1468]: time="2024-02-13T02:41:16.664329171Z" level=error msg="Failed to destroy network for sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.664469 kubelet[1871]: E0213 02:41:16.664215 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-79ddd57576-wxtrn_calico-system(a0281f43-d115-4a39-967f-62ecd5ce6e67)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-79ddd57576-wxtrn_calico-system(a0281f43-d115-4a39-967f-62ecd5ce6e67)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-79ddd57576-wxtrn" podUID=a0281f43-d115-4a39-967f-62ecd5ce6e67 Feb 13 02:41:16.664512 env[1468]: time="2024-02-13T02:41:16.664464785Z" level=error msg="encountered an error cleaning up failed sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.664512 env[1468]: time="2024-02-13T02:41:16.664486992Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-rq4xx,Uid:cda955da-81e6-4f98-b891-1ef2ce42b6c0,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.664614 kubelet[1871]: E0213 02:41:16.664565 1871 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.664614 kubelet[1871]: E0213 02:41:16.664584 1871 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-rq4xx" Feb 13 02:41:16.664614 kubelet[1871]: E0213 02:41:16.664595 1871 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-rq4xx" Feb 13 02:41:16.664696 kubelet[1871]: E0213 02:41:16.664614 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-rq4xx_kube-system(cda955da-81e6-4f98-b891-1ef2ce42b6c0)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-rq4xx_kube-system(cda955da-81e6-4f98-b891-1ef2ce42b6c0)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-rq4xx" podUID=cda955da-81e6-4f98-b891-1ef2ce42b6c0 Feb 13 02:41:16.677936 kubelet[1871]: I0213 02:41:16.677927 1871 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:41:16.678410 kubelet[1871]: I0213 02:41:16.678401 1871 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:41:16.679369 kubelet[1871]: I0213 02:41:16.679360 1871 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:41:16.679415 env[1468]: time="2024-02-13T02:41:16.679398943Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 13 02:41:16.679635 env[1468]: time="2024-02-13T02:41:16.679620894Z" level=info msg="StopPodSandbox for \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\"" Feb 13 02:41:16.679718 kubelet[1871]: I0213 02:41:16.679709 1871 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:41:16.679904 env[1468]: time="2024-02-13T02:41:16.679892119Z" level=info msg="StopPodSandbox for \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\"" Feb 13 02:41:16.691202 env[1468]: time="2024-02-13T02:41:16.691164465Z" level=error msg="StopPodSandbox for \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\" failed" error="failed to destroy network for sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.691289 env[1468]: time="2024-02-13T02:41:16.691176005Z" level=error msg="StopPodSandbox for \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\" failed" error="failed to destroy network for sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.691394 kubelet[1871]: E0213 02:41:16.691384 1871 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:41:16.691422 kubelet[1871]: E0213 02:41:16.691415 1871 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0} Feb 13 02:41:16.691444 kubelet[1871]: E0213 02:41:16.691422 1871 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:41:16.691444 kubelet[1871]: E0213 02:41:16.691436 1871 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a} Feb 13 02:41:16.691444 kubelet[1871]: E0213 02:41:16.691443 1871 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a0281f43-d115-4a39-967f-62ecd5ce6e67\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 02:41:16.691539 kubelet[1871]: E0213 02:41:16.691456 1871 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9a6268d2-c909-4459-9230-b4453f549c04\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 02:41:16.691539 kubelet[1871]: E0213 02:41:16.691464 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a0281f43-d115-4a39-967f-62ecd5ce6e67\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-79ddd57576-wxtrn" podUID=a0281f43-d115-4a39-967f-62ecd5ce6e67 Feb 13 02:41:16.691539 kubelet[1871]: E0213 02:41:16.691477 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9a6268d2-c909-4459-9230-b4453f549c04\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:41:16.695443 env[1468]: time="2024-02-13T02:41:16.695428386Z" level=info msg="StopPodSandbox for \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\"" Feb 13 02:41:16.696661 env[1468]: time="2024-02-13T02:41:16.696647164Z" level=info msg="StopPodSandbox for \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\"" Feb 13 02:41:16.707312 env[1468]: time="2024-02-13T02:41:16.707278340Z" level=error msg="StopPodSandbox for \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\" failed" error="failed to destroy network for sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.707516 env[1468]: time="2024-02-13T02:41:16.707471087Z" level=error msg="StopPodSandbox for \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\" failed" error="failed to destroy network for sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:16.707569 kubelet[1871]: E0213 02:41:16.707492 1871 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:41:16.707569 kubelet[1871]: E0213 02:41:16.707522 1871 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322} Feb 13 02:41:16.707569 kubelet[1871]: E0213 02:41:16.707545 1871 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cda955da-81e6-4f98-b891-1ef2ce42b6c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 02:41:16.707569 kubelet[1871]: E0213 02:41:16.707564 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cda955da-81e6-4f98-b891-1ef2ce42b6c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-rq4xx" podUID=cda955da-81e6-4f98-b891-1ef2ce42b6c0 Feb 13 02:41:16.707688 kubelet[1871]: E0213 02:41:16.707590 1871 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:41:16.707688 kubelet[1871]: E0213 02:41:16.707604 1871 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e} Feb 13 02:41:16.707688 kubelet[1871]: E0213 02:41:16.707626 1871 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"06d66a20-41d3-4311-9714-4e9d6f4f6a71\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 02:41:16.707688 kubelet[1871]: E0213 02:41:16.707641 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"06d66a20-41d3-4311-9714-4e9d6f4f6a71\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-rcxq6" podUID=06d66a20-41d3-4311-9714-4e9d6f4f6a71 Feb 13 02:41:16.907824 kubelet[1871]: E0213 02:41:16.907643 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:16.969030 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322-shm.mount: Deactivated successfully. Feb 13 02:41:16.969336 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e-shm.mount: Deactivated successfully. Feb 13 02:41:17.908368 kubelet[1871]: E0213 02:41:17.908246 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:18.909139 kubelet[1871]: E0213 02:41:18.909013 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:19.883003 kubelet[1871]: E0213 02:41:19.882882 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:19.909477 kubelet[1871]: E0213 02:41:19.909351 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:20.909635 kubelet[1871]: E0213 02:41:20.909532 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:21.910737 kubelet[1871]: E0213 02:41:21.910636 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:22.911889 kubelet[1871]: E0213 02:41:22.911788 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:23.912760 kubelet[1871]: E0213 02:41:23.912655 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:24.913514 kubelet[1871]: E0213 02:41:24.913407 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:25.913810 kubelet[1871]: E0213 02:41:25.913698 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:26.914438 kubelet[1871]: E0213 02:41:26.914325 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:27.915365 kubelet[1871]: E0213 02:41:27.915257 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:28.578012 env[1468]: time="2024-02-13T02:41:28.577859052Z" level=info msg="StopPodSandbox for \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\"" Feb 13 02:41:28.604881 env[1468]: time="2024-02-13T02:41:28.604800907Z" level=error msg="StopPodSandbox for \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\" failed" error="failed to destroy network for sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:28.605054 kubelet[1871]: E0213 02:41:28.605025 1871 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:41:28.605054 kubelet[1871]: E0213 02:41:28.605049 1871 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0} Feb 13 02:41:28.605128 kubelet[1871]: E0213 02:41:28.605084 1871 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a0281f43-d115-4a39-967f-62ecd5ce6e67\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 02:41:28.605128 kubelet[1871]: E0213 02:41:28.605101 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a0281f43-d115-4a39-967f-62ecd5ce6e67\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-79ddd57576-wxtrn" podUID=a0281f43-d115-4a39-967f-62ecd5ce6e67 Feb 13 02:41:28.916270 kubelet[1871]: E0213 02:41:28.916176 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:29.576870 env[1468]: time="2024-02-13T02:41:29.576843006Z" level=info msg="StopPodSandbox for \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\"" Feb 13 02:41:29.591449 env[1468]: time="2024-02-13T02:41:29.591365049Z" level=error msg="StopPodSandbox for \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\" failed" error="failed to destroy network for sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:29.591698 kubelet[1871]: E0213 02:41:29.591626 1871 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:41:29.591698 kubelet[1871]: E0213 02:41:29.591657 1871 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a} Feb 13 02:41:29.591698 kubelet[1871]: E0213 02:41:29.591687 1871 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9a6268d2-c909-4459-9230-b4453f549c04\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 02:41:29.591827 kubelet[1871]: E0213 02:41:29.591711 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9a6268d2-c909-4459-9230-b4453f549c04\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fpkxk" podUID=9a6268d2-c909-4459-9230-b4453f549c04 Feb 13 02:41:29.916960 kubelet[1871]: E0213 02:41:29.916738 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:30.578173 env[1468]: time="2024-02-13T02:41:30.578037026Z" level=info msg="StopPodSandbox for \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\"" Feb 13 02:41:30.622353 env[1468]: time="2024-02-13T02:41:30.622291112Z" level=error msg="StopPodSandbox for \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\" failed" error="failed to destroy network for sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:30.622608 kubelet[1871]: E0213 02:41:30.622479 1871 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:41:30.622608 kubelet[1871]: E0213 02:41:30.622524 1871 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322} Feb 13 02:41:30.622608 kubelet[1871]: E0213 02:41:30.622556 1871 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cda955da-81e6-4f98-b891-1ef2ce42b6c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 02:41:30.622608 kubelet[1871]: E0213 02:41:30.622575 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cda955da-81e6-4f98-b891-1ef2ce42b6c0\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-rq4xx" podUID=cda955da-81e6-4f98-b891-1ef2ce42b6c0 Feb 13 02:41:30.917817 kubelet[1871]: E0213 02:41:30.917587 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:31.576662 env[1468]: time="2024-02-13T02:41:31.576568036Z" level=info msg="StopPodSandbox for \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\"" Feb 13 02:41:31.589696 env[1468]: time="2024-02-13T02:41:31.589620939Z" level=error msg="StopPodSandbox for \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\" failed" error="failed to destroy network for sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 13 02:41:31.589898 kubelet[1871]: E0213 02:41:31.589885 1871 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:41:31.589939 kubelet[1871]: E0213 02:41:31.589914 1871 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e} Feb 13 02:41:31.589965 kubelet[1871]: E0213 02:41:31.589946 1871 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"06d66a20-41d3-4311-9714-4e9d6f4f6a71\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 13 02:41:31.590008 kubelet[1871]: E0213 02:41:31.589972 1871 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"06d66a20-41d3-4311-9714-4e9d6f4f6a71\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-rcxq6" podUID=06d66a20-41d3-4311-9714-4e9d6f4f6a71 Feb 13 02:41:31.917996 kubelet[1871]: E0213 02:41:31.917914 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:32.918451 kubelet[1871]: E0213 02:41:32.918411 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:33.591242 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1768790374.mount: Deactivated successfully. Feb 13 02:41:33.614396 env[1468]: time="2024-02-13T02:41:33.614377479Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:41:33.615023 env[1468]: time="2024-02-13T02:41:33.614981844Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:41:33.615577 env[1468]: time="2024-02-13T02:41:33.615523841Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:41:33.616462 env[1468]: time="2024-02-13T02:41:33.616420248Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:41:33.616812 env[1468]: time="2024-02-13T02:41:33.616770120Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 13 02:41:33.620883 env[1468]: time="2024-02-13T02:41:33.620834976Z" level=info msg="CreateContainer within sandbox \"4635d349632bfba92a4b0de4142cd64b5b876d4d1e53dbfa86f12321c8d8188e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 13 02:41:33.626560 env[1468]: time="2024-02-13T02:41:33.626495678Z" level=info msg="CreateContainer within sandbox \"4635d349632bfba92a4b0de4142cd64b5b876d4d1e53dbfa86f12321c8d8188e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b9081a083ad4fb917ee6a17f8abec3ab3405ee7e8990b9586bce98cbf1910590\"" Feb 13 02:41:33.626912 env[1468]: time="2024-02-13T02:41:33.626842307Z" level=info msg="StartContainer for \"b9081a083ad4fb917ee6a17f8abec3ab3405ee7e8990b9586bce98cbf1910590\"" Feb 13 02:41:33.636927 systemd[1]: Started cri-containerd-b9081a083ad4fb917ee6a17f8abec3ab3405ee7e8990b9586bce98cbf1910590.scope. Feb 13 02:41:33.644000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.672803 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 13 02:41:33.672877 kernel: audit: type=1400 audit(1707792093.644:658): avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.644000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff15fb61cc8 items=0 ppid=1956 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:33.738519 kernel: audit: type=1300 audit(1707792093.644:658): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff15fb61cc8 items=0 ppid=1956 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:33.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303831613038336164346662393137656536613137663861626563 Feb 13 02:41:33.918908 kubelet[1871]: E0213 02:41:33.918852 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:33.928843 kernel: audit: type=1327 audit(1707792093.644:658): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303831613038336164346662393137656536613137663861626563 Feb 13 02:41:33.928872 kernel: audit: type=1400 audit(1707792093.644:659): avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.644000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.992373 kernel: audit: type=1400 audit(1707792093.644:659): avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.644000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:34.055947 kernel: audit: type=1400 audit(1707792093.644:659): avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.644000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:34.119502 kernel: audit: type=1400 audit(1707792093.644:659): avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.644000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:34.183417 kernel: audit: type=1400 audit(1707792093.644:659): avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.644000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:34.188895 env[1468]: time="2024-02-13T02:41:34.188840484Z" level=info msg="StartContainer for \"b9081a083ad4fb917ee6a17f8abec3ab3405ee7e8990b9586bce98cbf1910590\" returns successfully" Feb 13 02:41:34.247374 kernel: audit: type=1400 audit(1707792093.644:659): avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.644000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:34.311308 kernel: audit: type=1400 audit(1707792093.644:659): avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.644000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.644000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.644000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.644000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.644000 audit: BPF prog-id=78 op=LOAD Feb 13 02:41:33.644000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00027bc58 items=0 ppid=1956 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:33.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303831613038336164346662393137656536613137663861626563 Feb 13 02:41:33.834000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.834000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.834000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.834000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.834000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.834000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.834000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.834000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.834000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.834000 audit: BPF prog-id=79 op=LOAD Feb 13 02:41:33.834000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00027bca8 items=0 ppid=1956 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:33.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303831613038336164346662393137656536613137663861626563 Feb 13 02:41:33.991000 audit: BPF prog-id=79 op=UNLOAD Feb 13 02:41:33.991000 audit: BPF prog-id=78 op=UNLOAD Feb 13 02:41:33.991000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.991000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.991000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.991000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.991000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.991000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.991000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.991000 audit[2790]: AVC avc: denied { perfmon } for pid=2790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.991000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.991000 audit[2790]: AVC avc: denied { bpf } for pid=2790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:33.991000 audit: BPF prog-id=80 op=LOAD Feb 13 02:41:33.991000 audit[2790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00027bd38 items=0 ppid=1956 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:33.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239303831613038336164346662393137656536613137663861626563 Feb 13 02:41:34.458908 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 13 02:41:34.458942 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 13 02:41:34.751623 kubelet[1871]: I0213 02:41:34.751577 1871 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-h8krk" podStartSLOduration=4.256803505 podCreationTimestamp="2024-02-13 02:40:41 +0000 UTC" firstStartedPulling="2024-02-13 02:40:44.122178318 +0000 UTC m=+4.515499460" lastFinishedPulling="2024-02-13 02:41:33.616923598 +0000 UTC m=+54.010244745" observedRunningTime="2024-02-13 02:41:34.751253494 +0000 UTC m=+55.144574636" watchObservedRunningTime="2024-02-13 02:41:34.75154879 +0000 UTC m=+55.144869941" Feb 13 02:41:34.920190 kubelet[1871]: E0213 02:41:34.920070 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:35.645000 audit[2945]: AVC avc: denied { write } for pid=2945 comm="tee" name="fd" dev="proc" ino=30995 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 02:41:35.645000 audit[2939]: AVC avc: denied { write } for pid=2939 comm="tee" name="fd" dev="proc" ino=31874 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 02:41:35.645000 audit[2940]: AVC avc: denied { write } for pid=2940 comm="tee" name="fd" dev="proc" ino=8890 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 02:41:35.645000 audit[2950]: AVC avc: denied { write } for pid=2950 comm="tee" name="fd" dev="proc" ino=23285 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 02:41:35.645000 audit[2945]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf041697a a2=241 a3=1b6 items=1 ppid=2903 pid=2945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:35.645000 audit[2940]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0e57c96b a2=241 a3=1b6 items=1 ppid=2905 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:35.645000 audit[2939]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8c46297c a2=241 a3=1b6 items=1 ppid=2906 pid=2939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:35.645000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 13 02:41:35.645000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 13 02:41:35.645000 audit[2950]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7232e97b a2=241 a3=1b6 items=1 ppid=2907 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:35.645000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 13 02:41:35.645000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 13 02:41:35.645000 audit[2937]: AVC avc: denied { write } for pid=2937 comm="tee" name="fd" dev="proc" ino=16314 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 02:41:35.645000 audit: PATH item=0 name="/dev/fd/63" inode=19936 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:41:35.645000 audit: PATH item=0 name="/dev/fd/63" inode=30992 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:41:35.645000 audit: PATH item=0 name="/dev/fd/63" inode=28383 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:41:35.645000 audit: PATH item=0 name="/dev/fd/63" inode=8887 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:41:35.645000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 02:41:35.645000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 02:41:35.645000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 02:41:35.645000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 02:41:35.645000 audit[2937]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1fda596a a2=241 a3=1b6 items=1 ppid=2902 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:35.645000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 13 02:41:35.645000 audit: PATH item=0 name="/dev/fd/63" inode=16311 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:41:35.645000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 02:41:35.645000 audit[2947]: AVC avc: denied { write } for pid=2947 comm="tee" name="fd" dev="proc" ino=15056 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 02:41:35.645000 audit[2947]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffef077497a a2=241 a3=1b6 items=1 ppid=2901 pid=2947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:35.645000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 13 02:41:35.645000 audit: PATH item=0 name="/dev/fd/63" inode=28384 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:41:35.645000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 02:41:35.645000 audit[2942]: AVC avc: denied { write } for pid=2942 comm="tee" name="fd" dev="proc" ino=30999 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 13 02:41:35.645000 audit[2942]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1516b97a a2=241 a3=1b6 items=1 ppid=2904 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:35.645000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 13 02:41:35.645000 audit: PATH item=0 name="/dev/fd/63" inode=32877 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 13 02:41:35.645000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 13 02:41:35.920907 kubelet[1871]: E0213 02:41:35.920696 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:36.921553 kubelet[1871]: E0213 02:41:36.921430 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:37.921780 kubelet[1871]: E0213 02:41:37.921669 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:38.922596 kubelet[1871]: E0213 02:41:38.922493 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:39.884046 kubelet[1871]: E0213 02:41:39.883944 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:39.922846 kubelet[1871]: E0213 02:41:39.922734 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:40.578391 env[1468]: time="2024-02-13T02:41:40.578257729Z" level=info msg="StopPodSandbox for \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\"" Feb 13 02:41:40.702322 env[1468]: 2024-02-13 02:41:40.639 [INFO][3240] k8s.go 578: Cleaning up netns ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:41:40.702322 env[1468]: 2024-02-13 02:41:40.640 [INFO][3240] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" iface="eth0" netns="/var/run/netns/cni-96002cb9-1cc8-a152-2977-2953977a438b" Feb 13 02:41:40.702322 env[1468]: 2024-02-13 02:41:40.640 [INFO][3240] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" iface="eth0" netns="/var/run/netns/cni-96002cb9-1cc8-a152-2977-2953977a438b" Feb 13 02:41:40.702322 env[1468]: 2024-02-13 02:41:40.640 [INFO][3240] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" iface="eth0" netns="/var/run/netns/cni-96002cb9-1cc8-a152-2977-2953977a438b" Feb 13 02:41:40.702322 env[1468]: 2024-02-13 02:41:40.641 [INFO][3240] k8s.go 585: Releasing IP address(es) ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:41:40.702322 env[1468]: 2024-02-13 02:41:40.641 [INFO][3240] utils.go 188: Calico CNI releasing IP address ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:41:40.702322 env[1468]: 2024-02-13 02:41:40.684 [INFO][3255] ipam_plugin.go 415: Releasing address using handleID ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" HandleID="k8s-pod-network.7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Workload="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:41:40.702322 env[1468]: 2024-02-13 02:41:40.684 [INFO][3255] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:41:40.702322 env[1468]: 2024-02-13 02:41:40.684 [INFO][3255] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:41:40.702322 env[1468]: 2024-02-13 02:41:40.694 [WARNING][3255] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" HandleID="k8s-pod-network.7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Workload="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:41:40.702322 env[1468]: 2024-02-13 02:41:40.694 [INFO][3255] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" HandleID="k8s-pod-network.7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Workload="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:41:40.702322 env[1468]: 2024-02-13 02:41:40.696 [INFO][3255] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:41:40.702322 env[1468]: 2024-02-13 02:41:40.699 [INFO][3240] k8s.go 591: Teardown processing complete. ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:41:40.703840 env[1468]: time="2024-02-13T02:41:40.702634514Z" level=info msg="TearDown network for sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\" successfully" Feb 13 02:41:40.703840 env[1468]: time="2024-02-13T02:41:40.702721250Z" level=info msg="StopPodSandbox for \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\" returns successfully" Feb 13 02:41:40.704174 env[1468]: time="2024-02-13T02:41:40.704057270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79ddd57576-wxtrn,Uid:a0281f43-d115-4a39-967f-62ecd5ce6e67,Namespace:calico-system,Attempt:1,}" Feb 13 02:41:40.710177 systemd[1]: run-netns-cni\x2d96002cb9\x2d1cc8\x2da152\x2d2977\x2d2953977a438b.mount: Deactivated successfully. Feb 13 02:41:40.923294 kubelet[1871]: E0213 02:41:40.923082 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:40.948471 kernel: Initializing XFRM netlink socket Feb 13 02:41:40.952941 systemd-networkd[1311]: cali81b42744c97: Link UP Feb 13 02:41:41.008410 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 02:41:41.008441 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali81b42744c97: link becomes ready Feb 13 02:41:41.008488 systemd-networkd[1311]: cali81b42744c97: Gained carrier Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.753 [INFO][3276] utils.go 100: File /var/lib/calico/mtu does not exist Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.775 [INFO][3276] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0 calico-kube-controllers-79ddd57576- calico-system a0281f43-d115-4a39-967f-62ecd5ce6e67 1546 0 2024-02-13 02:34:18 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:79ddd57576 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s 10.67.80.35 calico-kube-controllers-79ddd57576-wxtrn eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali81b42744c97 [] []}} ContainerID="304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" Namespace="calico-system" Pod="calico-kube-controllers-79ddd57576-wxtrn" WorkloadEndpoint="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-" Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.775 [INFO][3276] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" Namespace="calico-system" Pod="calico-kube-controllers-79ddd57576-wxtrn" WorkloadEndpoint="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.827 [INFO][3300] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" HandleID="k8s-pod-network.304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" Workload="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.845 [INFO][3300] ipam_plugin.go 268: Auto assigning IP ContainerID="304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" HandleID="k8s-pod-network.304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" Workload="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000785280), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.80.35", "pod":"calico-kube-controllers-79ddd57576-wxtrn", "timestamp":"2024-02-13 02:41:40.827130691 +0000 UTC"}, Hostname:"10.67.80.35", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.845 [INFO][3300] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.845 [INFO][3300] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.845 [INFO][3300] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.35' Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.848 [INFO][3300] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" host="10.67.80.35" Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.854 [INFO][3300] ipam.go 372: Looking up existing affinities for host host="10.67.80.35" Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.861 [INFO][3300] ipam.go 489: Trying affinity for 192.168.21.192/26 host="10.67.80.35" Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.865 [INFO][3300] ipam.go 155: Attempting to load block cidr=192.168.21.192/26 host="10.67.80.35" Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.870 [INFO][3300] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.192/26 host="10.67.80.35" Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.870 [INFO][3300] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.192/26 handle="k8s-pod-network.304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" host="10.67.80.35" Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.874 [INFO][3300] ipam.go 1682: Creating new handle: k8s-pod-network.304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4 Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.882 [INFO][3300] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.192/26 handle="k8s-pod-network.304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" host="10.67.80.35" Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.891 [INFO][3300] ipam.go 1216: Successfully claimed IPs: [192.168.21.193/26] block=192.168.21.192/26 handle="k8s-pod-network.304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" host="10.67.80.35" Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.891 [INFO][3300] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.193/26] handle="k8s-pod-network.304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" host="10.67.80.35" Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.891 [INFO][3300] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:41:41.024173 env[1468]: 2024-02-13 02:41:40.891 [INFO][3300] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.193/26] IPv6=[] ContainerID="304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" HandleID="k8s-pod-network.304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" Workload="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:41:41.024597 env[1468]: 2024-02-13 02:41:40.899 [INFO][3276] k8s.go 385: Populated endpoint ContainerID="304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" Namespace="calico-system" Pod="calico-kube-controllers-79ddd57576-wxtrn" WorkloadEndpoint="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0", GenerateName:"calico-kube-controllers-79ddd57576-", Namespace:"calico-system", SelfLink:"", UID:"a0281f43-d115-4a39-967f-62ecd5ce6e67", ResourceVersion:"1546", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 34, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79ddd57576", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"", Pod:"calico-kube-controllers-79ddd57576-wxtrn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali81b42744c97", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:41:41.024597 env[1468]: 2024-02-13 02:41:40.899 [INFO][3276] k8s.go 386: Calico CNI using IPs: [192.168.21.193/32] ContainerID="304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" Namespace="calico-system" Pod="calico-kube-controllers-79ddd57576-wxtrn" WorkloadEndpoint="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:41:41.024597 env[1468]: 2024-02-13 02:41:40.899 [INFO][3276] dataplane_linux.go 68: Setting the host side veth name to cali81b42744c97 ContainerID="304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" Namespace="calico-system" Pod="calico-kube-controllers-79ddd57576-wxtrn" WorkloadEndpoint="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:41:41.024597 env[1468]: 2024-02-13 02:41:41.008 [INFO][3276] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" Namespace="calico-system" Pod="calico-kube-controllers-79ddd57576-wxtrn" WorkloadEndpoint="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:41:41.024597 env[1468]: 2024-02-13 02:41:41.008 [INFO][3276] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" Namespace="calico-system" Pod="calico-kube-controllers-79ddd57576-wxtrn" WorkloadEndpoint="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0", GenerateName:"calico-kube-controllers-79ddd57576-", Namespace:"calico-system", SelfLink:"", UID:"a0281f43-d115-4a39-967f-62ecd5ce6e67", ResourceVersion:"1546", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 34, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79ddd57576", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4", Pod:"calico-kube-controllers-79ddd57576-wxtrn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali81b42744c97", MAC:"02:49:c8:d1:04:13", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:41:41.024597 env[1468]: 2024-02-13 02:41:41.023 [INFO][3276] k8s.go 491: Wrote updated endpoint to datastore ContainerID="304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4" Namespace="calico-system" Pod="calico-kube-controllers-79ddd57576-wxtrn" WorkloadEndpoint="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:41:41.030015 env[1468]: time="2024-02-13T02:41:41.029984145Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 02:41:41.030015 env[1468]: time="2024-02-13T02:41:41.030004831Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 02:41:41.030015 env[1468]: time="2024-02-13T02:41:41.030011543Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 02:41:41.030133 env[1468]: time="2024-02-13T02:41:41.030070702Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4 pid=3366 runtime=io.containerd.runc.v2 Feb 13 02:41:41.036515 systemd[1]: Started cri-containerd-304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4.scope. Feb 13 02:41:41.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.067117 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 13 02:41:41.067227 kernel: audit: type=1400 audit(1707792101.040:671): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190261 kernel: audit: type=1400 audit(1707792101.040:672): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190302 kernel: audit: type=1400 audit(1707792101.040:673): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.251921 kernel: audit: type=1400 audit(1707792101.040:674): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.313870 kernel: audit: type=1400 audit(1707792101.040:675): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.375867 kernel: audit: type=1400 audit(1707792101.040:676): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.437828 kernel: audit: type=1400 audit(1707792101.040:677): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.499767 kernel: audit: type=1400 audit(1707792101.040:678): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.561697 kernel: audit: type=1400 audit(1707792101.040:679): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.576298 env[1468]: time="2024-02-13T02:41:41.576261892Z" level=info msg="StopPodSandbox for \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\"" Feb 13 02:41:41.578289 env[1468]: time="2024-02-13T02:41:41.578271360Z" level=info msg="StopPodSandbox for \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\"" Feb 13 02:41:41.622145 env[1468]: 2024-02-13 02:41:41.604 [INFO][3438] k8s.go 578: Cleaning up netns ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:41:41.622145 env[1468]: 2024-02-13 02:41:41.604 [INFO][3438] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" iface="eth0" netns="/var/run/netns/cni-eadc269f-4039-c7bb-6005-1b50c73f87b2" Feb 13 02:41:41.622145 env[1468]: 2024-02-13 02:41:41.605 [INFO][3438] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" iface="eth0" netns="/var/run/netns/cni-eadc269f-4039-c7bb-6005-1b50c73f87b2" Feb 13 02:41:41.622145 env[1468]: 2024-02-13 02:41:41.605 [INFO][3438] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" iface="eth0" netns="/var/run/netns/cni-eadc269f-4039-c7bb-6005-1b50c73f87b2" Feb 13 02:41:41.622145 env[1468]: 2024-02-13 02:41:41.605 [INFO][3438] k8s.go 585: Releasing IP address(es) ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:41:41.622145 env[1468]: 2024-02-13 02:41:41.605 [INFO][3438] utils.go 188: Calico CNI releasing IP address ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:41:41.622145 env[1468]: 2024-02-13 02:41:41.614 [INFO][3468] ipam_plugin.go 415: Releasing address using handleID ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" HandleID="k8s-pod-network.857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:41:41.622145 env[1468]: 2024-02-13 02:41:41.614 [INFO][3468] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:41:41.622145 env[1468]: 2024-02-13 02:41:41.614 [INFO][3468] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:41:41.622145 env[1468]: 2024-02-13 02:41:41.619 [WARNING][3468] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" HandleID="k8s-pod-network.857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:41:41.622145 env[1468]: 2024-02-13 02:41:41.619 [INFO][3468] ipam_plugin.go 443: Releasing address using workloadID ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" HandleID="k8s-pod-network.857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:41:41.622145 env[1468]: 2024-02-13 02:41:41.620 [INFO][3468] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:41:41.622145 env[1468]: 2024-02-13 02:41:41.621 [INFO][3438] k8s.go 591: Teardown processing complete. ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:41:41.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.685232 kernel: audit: type=1400 audit(1707792101.189:680): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.189000 audit: BPF prog-id=81 op=LOAD Feb 13 02:41:41.190000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3366 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330346433313338656134613931353764376165366165363737396466 Feb 13 02:41:41.190000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3366 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330346433313338656134613931353764376165366165363737396466 Feb 13 02:41:41.190000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.190000 audit: BPF prog-id=82 op=LOAD Feb 13 02:41:41.190000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000304ad0 items=0 ppid=3366 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330346433313338656134613931353764376165366165363737396466 Feb 13 02:41:41.313000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.313000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.313000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.313000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.313000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.313000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.313000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.313000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.313000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.313000 audit: BPF prog-id=83 op=LOAD Feb 13 02:41:41.313000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000304b18 items=0 ppid=3366 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330346433313338656134613931353764376165366165363737396466 Feb 13 02:41:41.437000 audit: BPF prog-id=83 op=UNLOAD Feb 13 02:41:41.437000 audit: BPF prog-id=82 op=UNLOAD Feb 13 02:41:41.437000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.437000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.437000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.437000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.437000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.437000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.437000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.437000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.437000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.437000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.437000 audit: BPF prog-id=84 op=LOAD Feb 13 02:41:41.437000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000304f28 items=0 ppid=3366 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330346433313338656134613931353764376165366165363737396466 Feb 13 02:41:41.686575 env[1468]: time="2024-02-13T02:41:41.685316771Z" level=info msg="TearDown network for sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\" successfully" Feb 13 02:41:41.686575 env[1468]: time="2024-02-13T02:41:41.685351180Z" level=info msg="StopPodSandbox for \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\" returns successfully" Feb 13 02:41:41.686575 env[1468]: time="2024-02-13T02:41:41.685673321Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-rq4xx,Uid:cda955da-81e6-4f98-b891-1ef2ce42b6c0,Namespace:kube-system,Attempt:1,}" Feb 13 02:41:41.696221 env[1468]: 2024-02-13 02:41:41.606 [INFO][3423] k8s.go 578: Cleaning up netns ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:41:41.696221 env[1468]: 2024-02-13 02:41:41.606 [INFO][3423] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" iface="eth0" netns="/var/run/netns/cni-dd6d465f-37c4-63ab-9008-23664e17d126" Feb 13 02:41:41.696221 env[1468]: 2024-02-13 02:41:41.606 [INFO][3423] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" iface="eth0" netns="/var/run/netns/cni-dd6d465f-37c4-63ab-9008-23664e17d126" Feb 13 02:41:41.696221 env[1468]: 2024-02-13 02:41:41.606 [INFO][3423] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" iface="eth0" netns="/var/run/netns/cni-dd6d465f-37c4-63ab-9008-23664e17d126" Feb 13 02:41:41.696221 env[1468]: 2024-02-13 02:41:41.606 [INFO][3423] k8s.go 585: Releasing IP address(es) ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:41:41.696221 env[1468]: 2024-02-13 02:41:41.606 [INFO][3423] utils.go 188: Calico CNI releasing IP address ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:41:41.696221 env[1468]: 2024-02-13 02:41:41.624 [INFO][3473] ipam_plugin.go 415: Releasing address using handleID ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" HandleID="k8s-pod-network.e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Workload="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:41:41.696221 env[1468]: 2024-02-13 02:41:41.624 [INFO][3473] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:41:41.696221 env[1468]: 2024-02-13 02:41:41.624 [INFO][3473] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:41:41.696221 env[1468]: 2024-02-13 02:41:41.693 [WARNING][3473] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" HandleID="k8s-pod-network.e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Workload="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:41:41.696221 env[1468]: 2024-02-13 02:41:41.693 [INFO][3473] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" HandleID="k8s-pod-network.e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Workload="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:41:41.696221 env[1468]: 2024-02-13 02:41:41.695 [INFO][3473] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:41:41.696221 env[1468]: 2024-02-13 02:41:41.695 [INFO][3423] k8s.go 591: Teardown processing complete. ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:41:41.696565 env[1468]: time="2024-02-13T02:41:41.696276937Z" level=info msg="TearDown network for sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\" successfully" Feb 13 02:41:41.696565 env[1468]: time="2024-02-13T02:41:41.696311886Z" level=info msg="StopPodSandbox for \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\" returns successfully" Feb 13 02:41:41.696756 env[1468]: time="2024-02-13T02:41:41.696713428Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fpkxk,Uid:9a6268d2-c909-4459-9230-b4453f549c04,Namespace:calico-system,Attempt:1,}" Feb 13 02:41:41.701772 env[1468]: time="2024-02-13T02:41:41.701745138Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79ddd57576-wxtrn,Uid:a0281f43-d115-4a39-967f-62ecd5ce6e67,Namespace:calico-system,Attempt:1,} returns sandbox id \"304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4\"" Feb 13 02:41:41.702492 env[1468]: time="2024-02-13T02:41:41.702480495Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 13 02:41:41.706167 systemd[1]: run-netns-cni\x2ddd6d465f\x2d37c4\x2d63ab\x2d9008\x2d23664e17d126.mount: Deactivated successfully. Feb 13 02:41:41.706234 systemd[1]: run-netns-cni\x2deadc269f\x2d4039\x2dc7bb\x2d6005\x2d1b50c73f87b2.mount: Deactivated successfully. Feb 13 02:41:41.754063 systemd-networkd[1311]: cali96ce3cc3913: Link UP Feb 13 02:41:41.794475 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali96ce3cc3913: link becomes ready Feb 13 02:41:41.794587 systemd-networkd[1311]: cali96ce3cc3913: Gained carrier Feb 13 02:41:41.795404 systemd-networkd[1311]: cali77e1c267602: Link UP Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.699 [INFO][3499] utils.go 100: File /var/lib/calico/mtu does not exist Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.707 [INFO][3499] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0 coredns-5d78c9869d- kube-system cda955da-81e6-4f98-b891-1ef2ce42b6c0 1553 0 2024-02-13 02:34:13 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s 10.67.80.35 coredns-5d78c9869d-rq4xx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali96ce3cc3913 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" Namespace="kube-system" Pod="coredns-5d78c9869d-rq4xx" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-" Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.707 [INFO][3499] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" Namespace="kube-system" Pod="coredns-5d78c9869d-rq4xx" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.720 [INFO][3555] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" HandleID="k8s-pod-network.1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.729 [INFO][3555] ipam_plugin.go 268: Auto assigning IP ContainerID="1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" HandleID="k8s-pod-network.1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00051e0d0), Attrs:map[string]string{"namespace":"kube-system", "node":"10.67.80.35", "pod":"coredns-5d78c9869d-rq4xx", "timestamp":"2024-02-13 02:41:41.720364726 +0000 UTC"}, Hostname:"10.67.80.35", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.729 [INFO][3555] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.729 [INFO][3555] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.729 [INFO][3555] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.35' Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.730 [INFO][3555] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" host="10.67.80.35" Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.733 [INFO][3555] ipam.go 372: Looking up existing affinities for host host="10.67.80.35" Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.736 [INFO][3555] ipam.go 489: Trying affinity for 192.168.21.192/26 host="10.67.80.35" Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.738 [INFO][3555] ipam.go 155: Attempting to load block cidr=192.168.21.192/26 host="10.67.80.35" Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.740 [INFO][3555] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.192/26 host="10.67.80.35" Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.740 [INFO][3555] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.192/26 handle="k8s-pod-network.1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" host="10.67.80.35" Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.741 [INFO][3555] ipam.go 1682: Creating new handle: k8s-pod-network.1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424 Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.744 [INFO][3555] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.192/26 handle="k8s-pod-network.1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" host="10.67.80.35" Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.747 [INFO][3555] ipam.go 1216: Successfully claimed IPs: [192.168.21.194/26] block=192.168.21.192/26 handle="k8s-pod-network.1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" host="10.67.80.35" Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.747 [INFO][3555] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.194/26] handle="k8s-pod-network.1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" host="10.67.80.35" Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.747 [INFO][3555] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:41:41.804333 env[1468]: 2024-02-13 02:41:41.747 [INFO][3555] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.194/26] IPv6=[] ContainerID="1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" HandleID="k8s-pod-network.1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:41:41.805012 env[1468]: 2024-02-13 02:41:41.750 [INFO][3499] k8s.go 385: Populated endpoint ContainerID="1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" Namespace="kube-system" Pod="coredns-5d78c9869d-rq4xx" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cda955da-81e6-4f98-b891-1ef2ce42b6c0", ResourceVersion:"1553", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 34, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"", Pod:"coredns-5d78c9869d-rq4xx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali96ce3cc3913", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:41:41.805012 env[1468]: 2024-02-13 02:41:41.751 [INFO][3499] k8s.go 386: Calico CNI using IPs: [192.168.21.194/32] ContainerID="1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" Namespace="kube-system" Pod="coredns-5d78c9869d-rq4xx" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:41:41.805012 env[1468]: 2024-02-13 02:41:41.751 [INFO][3499] dataplane_linux.go 68: Setting the host side veth name to cali96ce3cc3913 ContainerID="1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" Namespace="kube-system" Pod="coredns-5d78c9869d-rq4xx" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:41:41.805012 env[1468]: 2024-02-13 02:41:41.794 [INFO][3499] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" Namespace="kube-system" Pod="coredns-5d78c9869d-rq4xx" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:41:41.805012 env[1468]: 2024-02-13 02:41:41.795 [INFO][3499] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" Namespace="kube-system" Pod="coredns-5d78c9869d-rq4xx" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cda955da-81e6-4f98-b891-1ef2ce42b6c0", ResourceVersion:"1553", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 34, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424", Pod:"coredns-5d78c9869d-rq4xx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali96ce3cc3913", MAC:"9e:3f:e1:62:76:6d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:41:41.805012 env[1468]: 2024-02-13 02:41:41.803 [INFO][3499] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424" Namespace="kube-system" Pod="coredns-5d78c9869d-rq4xx" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:41:41.812017 env[1468]: time="2024-02-13T02:41:41.811978239Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 02:41:41.812017 env[1468]: time="2024-02-13T02:41:41.812003156Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 02:41:41.812017 env[1468]: time="2024-02-13T02:41:41.812012954Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 02:41:41.812145 env[1468]: time="2024-02-13T02:41:41.812109148Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424 pid=3605 runtime=io.containerd.runc.v2 Feb 13 02:41:41.820491 systemd[1]: Started cri-containerd-1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424.scope. Feb 13 02:41:41.823384 systemd-networkd[1311]: cali77e1c267602: Gained carrier Feb 13 02:41:41.823470 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali77e1c267602: link becomes ready Feb 13 02:41:41.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit: BPF prog-id=85 op=LOAD Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3605 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164353265656364633934336431643339313339383161633137643263 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3605 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164353265656364633934336431643339313339383161633137643263 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit: BPF prog-id=86 op=LOAD Feb 13 02:41:41.830000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002cdce0 items=0 ppid=3605 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164353265656364633934336431643339313339383161633137643263 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit: BPF prog-id=87 op=LOAD Feb 13 02:41:41.830000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002cdd28 items=0 ppid=3605 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164353265656364633934336431643339313339383161633137643263 Feb 13 02:41:41.830000 audit: BPF prog-id=87 op=UNLOAD Feb 13 02:41:41.830000 audit: BPF prog-id=86 op=UNLOAD Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { perfmon } for pid=3616 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit[3616]: AVC avc: denied { bpf } for pid=3616 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.830000 audit: BPF prog-id=88 op=LOAD Feb 13 02:41:41.830000 audit[3616]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d0138 items=0 ppid=3605 pid=3616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164353265656364633934336431643339313339383161633137643263 Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.709 [INFO][3528] utils.go 100: File /var/lib/calico/mtu does not exist Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.718 [INFO][3528] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.35-k8s-csi--node--driver--fpkxk-eth0 csi-node-driver- calico-system 9a6268d2-c909-4459-9230-b4453f549c04 1554 0 2024-02-13 02:40:41 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.35 csi-node-driver-fpkxk eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali77e1c267602 [] []}} ContainerID="51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" Namespace="calico-system" Pod="csi-node-driver-fpkxk" WorkloadEndpoint="10.67.80.35-k8s-csi--node--driver--fpkxk-" Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.718 [INFO][3528] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" Namespace="calico-system" Pod="csi-node-driver-fpkxk" WorkloadEndpoint="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.732 [INFO][3568] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" HandleID="k8s-pod-network.51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" Workload="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.739 [INFO][3568] ipam_plugin.go 268: Auto assigning IP ContainerID="51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" HandleID="k8s-pod-network.51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" Workload="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00022d0d0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.67.80.35", "pod":"csi-node-driver-fpkxk", "timestamp":"2024-02-13 02:41:41.732506013 +0000 UTC"}, Hostname:"10.67.80.35", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.739 [INFO][3568] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.747 [INFO][3568] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.747 [INFO][3568] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.35' Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.750 [INFO][3568] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" host="10.67.80.35" Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.754 [INFO][3568] ipam.go 372: Looking up existing affinities for host host="10.67.80.35" Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.759 [INFO][3568] ipam.go 489: Trying affinity for 192.168.21.192/26 host="10.67.80.35" Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.762 [INFO][3568] ipam.go 155: Attempting to load block cidr=192.168.21.192/26 host="10.67.80.35" Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.765 [INFO][3568] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.192/26 host="10.67.80.35" Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.765 [INFO][3568] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.192/26 handle="k8s-pod-network.51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" host="10.67.80.35" Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.767 [INFO][3568] ipam.go 1682: Creating new handle: k8s-pod-network.51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6 Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.771 [INFO][3568] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.192/26 handle="k8s-pod-network.51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" host="10.67.80.35" Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.776 [INFO][3568] ipam.go 1216: Successfully claimed IPs: [192.168.21.195/26] block=192.168.21.192/26 handle="k8s-pod-network.51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" host="10.67.80.35" Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.776 [INFO][3568] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.195/26] handle="k8s-pod-network.51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" host="10.67.80.35" Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.776 [INFO][3568] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:41:41.839823 env[1468]: 2024-02-13 02:41:41.776 [INFO][3568] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.195/26] IPv6=[] ContainerID="51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" HandleID="k8s-pod-network.51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" Workload="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:41:41.840259 env[1468]: 2024-02-13 02:41:41.779 [INFO][3528] k8s.go 385: Populated endpoint ContainerID="51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" Namespace="calico-system" Pod="csi-node-driver-fpkxk" WorkloadEndpoint="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-csi--node--driver--fpkxk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9a6268d2-c909-4459-9230-b4453f549c04", ResourceVersion:"1554", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 40, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"", Pod:"csi-node-driver-fpkxk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali77e1c267602", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:41:41.840259 env[1468]: 2024-02-13 02:41:41.780 [INFO][3528] k8s.go 386: Calico CNI using IPs: [192.168.21.195/32] ContainerID="51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" Namespace="calico-system" Pod="csi-node-driver-fpkxk" WorkloadEndpoint="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:41:41.840259 env[1468]: 2024-02-13 02:41:41.780 [INFO][3528] dataplane_linux.go 68: Setting the host side veth name to cali77e1c267602 ContainerID="51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" Namespace="calico-system" Pod="csi-node-driver-fpkxk" WorkloadEndpoint="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:41:41.840259 env[1468]: 2024-02-13 02:41:41.823 [INFO][3528] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" Namespace="calico-system" Pod="csi-node-driver-fpkxk" WorkloadEndpoint="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:41:41.840259 env[1468]: 2024-02-13 02:41:41.823 [INFO][3528] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" Namespace="calico-system" Pod="csi-node-driver-fpkxk" WorkloadEndpoint="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-csi--node--driver--fpkxk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9a6268d2-c909-4459-9230-b4453f549c04", ResourceVersion:"1554", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 40, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6", Pod:"csi-node-driver-fpkxk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali77e1c267602", MAC:"9e:b7:46:63:ee:4b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:41:41.840259 env[1468]: 2024-02-13 02:41:41.839 [INFO][3528] k8s.go 491: Wrote updated endpoint to datastore ContainerID="51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6" Namespace="calico-system" Pod="csi-node-driver-fpkxk" WorkloadEndpoint="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:41:41.845115 env[1468]: time="2024-02-13T02:41:41.845074299Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 02:41:41.845115 env[1468]: time="2024-02-13T02:41:41.845106125Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 02:41:41.845245 env[1468]: time="2024-02-13T02:41:41.845121596Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 02:41:41.845245 env[1468]: time="2024-02-13T02:41:41.845192233Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6 pid=3649 runtime=io.containerd.runc.v2 Feb 13 02:41:41.847610 env[1468]: time="2024-02-13T02:41:41.847588701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-rq4xx,Uid:cda955da-81e6-4f98-b891-1ef2ce42b6c0,Namespace:kube-system,Attempt:1,} returns sandbox id \"1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424\"" Feb 13 02:41:41.850212 systemd[1]: Started cri-containerd-51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6.scope. Feb 13 02:41:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit: BPF prog-id=89 op=LOAD Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3649 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636539363430303036393833636432386536393231376266616438 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=3649 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636539363430303036393833636432386536393231376266616438 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit: BPF prog-id=90 op=LOAD Feb 13 02:41:41.855000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000304c10 items=0 ppid=3649 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636539363430303036393833636432386536393231376266616438 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit: BPF prog-id=91 op=LOAD Feb 13 02:41:41.855000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000304c58 items=0 ppid=3649 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636539363430303036393833636432386536393231376266616438 Feb 13 02:41:41.855000 audit: BPF prog-id=91 op=UNLOAD Feb 13 02:41:41.855000 audit: BPF prog-id=90 op=UNLOAD Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { perfmon } for pid=3664 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit[3664]: AVC avc: denied { bpf } for pid=3664 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:41.855000 audit: BPF prog-id=92 op=LOAD Feb 13 02:41:41.855000 audit[3664]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000305068 items=0 ppid=3649 pid=3664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:41.855000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531636539363430303036393833636432386536393231376266616438 Feb 13 02:41:41.861065 env[1468]: time="2024-02-13T02:41:41.861034876Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fpkxk,Uid:9a6268d2-c909-4459-9230-b4453f549c04,Namespace:calico-system,Attempt:1,} returns sandbox id \"51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6\"" Feb 13 02:41:41.923869 kubelet[1871]: E0213 02:41:41.923772 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:42.569962 systemd-networkd[1311]: cali81b42744c97: Gained IPv6LL Feb 13 02:41:42.924188 kubelet[1871]: E0213 02:41:42.924113 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:43.017754 systemd-networkd[1311]: cali96ce3cc3913: Gained IPv6LL Feb 13 02:41:43.658013 systemd-networkd[1311]: cali77e1c267602: Gained IPv6LL Feb 13 02:41:43.925573 kubelet[1871]: E0213 02:41:43.925373 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:44.926539 kubelet[1871]: E0213 02:41:44.926433 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:45.127334 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1312031169.mount: Deactivated successfully. Feb 13 02:41:45.926931 kubelet[1871]: E0213 02:41:45.926811 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:46.577755 env[1468]: time="2024-02-13T02:41:46.577609678Z" level=info msg="StopPodSandbox for \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\"" Feb 13 02:41:46.663150 env[1468]: 2024-02-13 02:41:46.631 [INFO][3898] k8s.go 578: Cleaning up netns ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:41:46.663150 env[1468]: 2024-02-13 02:41:46.631 [INFO][3898] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" iface="eth0" netns="/var/run/netns/cni-8c90ba09-0eb5-6648-2298-21fc3e8abc18" Feb 13 02:41:46.663150 env[1468]: 2024-02-13 02:41:46.631 [INFO][3898] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" iface="eth0" netns="/var/run/netns/cni-8c90ba09-0eb5-6648-2298-21fc3e8abc18" Feb 13 02:41:46.663150 env[1468]: 2024-02-13 02:41:46.631 [INFO][3898] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" iface="eth0" netns="/var/run/netns/cni-8c90ba09-0eb5-6648-2298-21fc3e8abc18" Feb 13 02:41:46.663150 env[1468]: 2024-02-13 02:41:46.631 [INFO][3898] k8s.go 585: Releasing IP address(es) ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:41:46.663150 env[1468]: 2024-02-13 02:41:46.631 [INFO][3898] utils.go 188: Calico CNI releasing IP address ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:41:46.663150 env[1468]: 2024-02-13 02:41:46.645 [INFO][3914] ipam_plugin.go 415: Releasing address using handleID ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" HandleID="k8s-pod-network.7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:41:46.663150 env[1468]: 2024-02-13 02:41:46.645 [INFO][3914] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:41:46.663150 env[1468]: 2024-02-13 02:41:46.645 [INFO][3914] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:41:46.663150 env[1468]: 2024-02-13 02:41:46.655 [WARNING][3914] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" HandleID="k8s-pod-network.7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:41:46.663150 env[1468]: 2024-02-13 02:41:46.655 [INFO][3914] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" HandleID="k8s-pod-network.7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:41:46.663150 env[1468]: 2024-02-13 02:41:46.657 [INFO][3914] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:41:46.663150 env[1468]: 2024-02-13 02:41:46.660 [INFO][3898] k8s.go 591: Teardown processing complete. ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:41:46.664703 env[1468]: time="2024-02-13T02:41:46.663379319Z" level=info msg="TearDown network for sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\" successfully" Feb 13 02:41:46.664703 env[1468]: time="2024-02-13T02:41:46.663476784Z" level=info msg="StopPodSandbox for \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\" returns successfully" Feb 13 02:41:46.664912 env[1468]: time="2024-02-13T02:41:46.664669751Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-rcxq6,Uid:06d66a20-41d3-4311-9714-4e9d6f4f6a71,Namespace:kube-system,Attempt:1,}" Feb 13 02:41:46.668525 systemd[1]: run-netns-cni\x2d8c90ba09\x2d0eb5\x2d6648\x2d2298\x2d21fc3e8abc18.mount: Deactivated successfully. Feb 13 02:41:46.815438 systemd-networkd[1311]: calicbda59b06ff: Link UP Feb 13 02:41:46.880084 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 02:41:46.880135 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicbda59b06ff: link becomes ready Feb 13 02:41:46.880134 systemd-networkd[1311]: calicbda59b06ff: Gained carrier Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.680 [INFO][3930] utils.go 100: File /var/lib/calico/mtu does not exist Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.695 [INFO][3930] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0 coredns-5d78c9869d- kube-system 06d66a20-41d3-4311-9714-4e9d6f4f6a71 1577 0 2024-02-13 02:34:13 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s 10.67.80.35 coredns-5d78c9869d-rcxq6 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calicbda59b06ff [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" Namespace="kube-system" Pod="coredns-5d78c9869d-rcxq6" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-" Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.695 [INFO][3930] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" Namespace="kube-system" Pod="coredns-5d78c9869d-rcxq6" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.753 [INFO][3952] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" HandleID="k8s-pod-network.90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.769 [INFO][3952] ipam_plugin.go 268: Auto assigning IP ContainerID="90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" HandleID="k8s-pod-network.90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050d30), Attrs:map[string]string{"namespace":"kube-system", "node":"10.67.80.35", "pod":"coredns-5d78c9869d-rcxq6", "timestamp":"2024-02-13 02:41:46.753534023 +0000 UTC"}, Hostname:"10.67.80.35", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.770 [INFO][3952] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.770 [INFO][3952] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.770 [INFO][3952] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.35' Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.772 [INFO][3952] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" host="10.67.80.35" Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.777 [INFO][3952] ipam.go 372: Looking up existing affinities for host host="10.67.80.35" Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.782 [INFO][3952] ipam.go 489: Trying affinity for 192.168.21.192/26 host="10.67.80.35" Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.785 [INFO][3952] ipam.go 155: Attempting to load block cidr=192.168.21.192/26 host="10.67.80.35" Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.788 [INFO][3952] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.192/26 host="10.67.80.35" Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.788 [INFO][3952] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.192/26 handle="k8s-pod-network.90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" host="10.67.80.35" Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.790 [INFO][3952] ipam.go 1682: Creating new handle: k8s-pod-network.90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8 Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.798 [INFO][3952] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.192/26 handle="k8s-pod-network.90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" host="10.67.80.35" Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.808 [INFO][3952] ipam.go 1216: Successfully claimed IPs: [192.168.21.196/26] block=192.168.21.192/26 handle="k8s-pod-network.90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" host="10.67.80.35" Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.808 [INFO][3952] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.196/26] handle="k8s-pod-network.90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" host="10.67.80.35" Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.808 [INFO][3952] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:41:46.895747 env[1468]: 2024-02-13 02:41:46.809 [INFO][3952] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.196/26] IPv6=[] ContainerID="90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" HandleID="k8s-pod-network.90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:41:46.896197 env[1468]: 2024-02-13 02:41:46.812 [INFO][3930] k8s.go 385: Populated endpoint ContainerID="90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" Namespace="kube-system" Pod="coredns-5d78c9869d-rcxq6" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"06d66a20-41d3-4311-9714-4e9d6f4f6a71", ResourceVersion:"1577", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 34, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"", Pod:"coredns-5d78c9869d-rcxq6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicbda59b06ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:41:46.896197 env[1468]: 2024-02-13 02:41:46.812 [INFO][3930] k8s.go 386: Calico CNI using IPs: [192.168.21.196/32] ContainerID="90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" Namespace="kube-system" Pod="coredns-5d78c9869d-rcxq6" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:41:46.896197 env[1468]: 2024-02-13 02:41:46.812 [INFO][3930] dataplane_linux.go 68: Setting the host side veth name to calicbda59b06ff ContainerID="90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" Namespace="kube-system" Pod="coredns-5d78c9869d-rcxq6" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:41:46.896197 env[1468]: 2024-02-13 02:41:46.880 [INFO][3930] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" Namespace="kube-system" Pod="coredns-5d78c9869d-rcxq6" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:41:46.896197 env[1468]: 2024-02-13 02:41:46.880 [INFO][3930] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" Namespace="kube-system" Pod="coredns-5d78c9869d-rcxq6" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"06d66a20-41d3-4311-9714-4e9d6f4f6a71", ResourceVersion:"1577", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 34, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8", Pod:"coredns-5d78c9869d-rcxq6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicbda59b06ff", MAC:"62:fe:59:9e:f4:13", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:41:46.896197 env[1468]: 2024-02-13 02:41:46.895 [INFO][3930] k8s.go 491: Wrote updated endpoint to datastore ContainerID="90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8" Namespace="kube-system" Pod="coredns-5d78c9869d-rcxq6" WorkloadEndpoint="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:41:46.901421 env[1468]: time="2024-02-13T02:41:46.901390771Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 02:41:46.901421 env[1468]: time="2024-02-13T02:41:46.901411868Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 02:41:46.901421 env[1468]: time="2024-02-13T02:41:46.901418902Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 02:41:46.901544 env[1468]: time="2024-02-13T02:41:46.901497125Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8 pid=3993 runtime=io.containerd.runc.v2 Feb 13 02:41:46.907467 systemd[1]: Started cri-containerd-90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8.scope. Feb 13 02:41:46.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.927538 kubelet[1871]: E0213 02:41:46.927512 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:46.937261 kernel: kauditd_printk_skb: 161 callbacks suppressed Feb 13 02:41:46.937295 kernel: audit: type=1400 audit(1707792106.911:725): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.055888 kernel: audit: type=1400 audit(1707792106.911:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.055952 kernel: audit: type=1400 audit(1707792106.911:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.115145 kernel: audit: type=1400 audit(1707792106.911:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.174842 kernel: audit: type=1400 audit(1707792106.911:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.234430 kernel: audit: type=1400 audit(1707792106.911:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.294061 kernel: audit: type=1400 audit(1707792106.911:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.353739 kernel: audit: type=1400 audit(1707792106.911:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.413333 kernel: audit: type=1400 audit(1707792106.911:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.472877 kernel: audit: type=1400 audit(1707792106.995:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit: BPF prog-id=93 op=LOAD Feb 13 02:41:46.995000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3993 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:46.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666264396531356266376261376639623766396639623261303437 Feb 13 02:41:46.995000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=3993 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:46.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666264396531356266376261376639623766396639623261303437 Feb 13 02:41:46.995000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:46.995000 audit: BPF prog-id=94 op=LOAD Feb 13 02:41:46.995000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000279d90 items=0 ppid=3993 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:46.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666264396531356266376261376639623766396639623261303437 Feb 13 02:41:47.113000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.113000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.113000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.113000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.113000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.113000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.113000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.113000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.113000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.113000 audit: BPF prog-id=95 op=LOAD Feb 13 02:41:47.113000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000279dd8 items=0 ppid=3993 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:47.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666264396531356266376261376639623766396639623261303437 Feb 13 02:41:47.232000 audit: BPF prog-id=95 op=UNLOAD Feb 13 02:41:47.232000 audit: BPF prog-id=94 op=UNLOAD Feb 13 02:41:47.232000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.232000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.232000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.232000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.232000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.232000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.232000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.232000 audit[4002]: AVC avc: denied { perfmon } for pid=4002 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.232000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.232000 audit[4002]: AVC avc: denied { bpf } for pid=4002 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:41:47.232000 audit: BPF prog-id=96 op=LOAD Feb 13 02:41:47.232000 audit[4002]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003ee1e8 items=0 ppid=3993 pid=4002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:41:47.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930666264396531356266376261376639623766396639623261303437 Feb 13 02:41:47.549103 env[1468]: time="2024-02-13T02:41:47.549081247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-rcxq6,Uid:06d66a20-41d3-4311-9714-4e9d6f4f6a71,Namespace:kube-system,Attempt:1,} returns sandbox id \"90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8\"" Feb 13 02:41:47.927812 kubelet[1871]: E0213 02:41:47.927707 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:48.841834 systemd-networkd[1311]: calicbda59b06ff: Gained IPv6LL Feb 13 02:41:48.928748 kubelet[1871]: E0213 02:41:48.928620 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:49.928904 kubelet[1871]: E0213 02:41:49.928796 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:50.929611 kubelet[1871]: E0213 02:41:50.929504 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:51.930263 kubelet[1871]: E0213 02:41:51.930219 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:52.931281 kubelet[1871]: E0213 02:41:52.931156 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:53.932430 kubelet[1871]: E0213 02:41:53.932319 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:54.932835 kubelet[1871]: E0213 02:41:54.932725 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:55.701837 systemd[1]: Started sshd@8-136.144.54.113:22-109.123.237.173:59742.service. Feb 13 02:41:55.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-136.144.54.113:22-109.123.237.173:59742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:41:55.727893 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 13 02:41:55.727946 kernel: audit: type=1130 audit(1707792115.700:743): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-136.144.54.113:22-109.123.237.173:59742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:41:55.933891 kubelet[1871]: E0213 02:41:55.933774 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:56.647020 sshd[4371]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.123.237.173 user=root Feb 13 02:41:56.645000 audit[4371]: USER_AUTH pid=4371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:41:56.741678 kernel: audit: type=1100 audit(1707792116.645:744): pid=4371 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:41:56.935229 kubelet[1871]: E0213 02:41:56.934996 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:57.935344 kubelet[1871]: E0213 02:41:57.935220 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:58.935846 kubelet[1871]: E0213 02:41:58.935735 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:59.122601 sshd[4371]: Failed password for root from 109.123.237.173 port 59742 ssh2 Feb 13 02:41:59.882883 kubelet[1871]: E0213 02:41:59.882813 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:41:59.936562 kubelet[1871]: E0213 02:41:59.936432 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:00.667988 sshd[4371]: Received disconnect from 109.123.237.173 port 59742:11: Bye Bye [preauth] Feb 13 02:42:00.667988 sshd[4371]: Disconnected from authenticating user root 109.123.237.173 port 59742 [preauth] Feb 13 02:42:00.670500 systemd[1]: sshd@8-136.144.54.113:22-109.123.237.173:59742.service: Deactivated successfully. Feb 13 02:42:00.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-136.144.54.113:22-109.123.237.173:59742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:00.759667 kernel: audit: type=1131 audit(1707792120.669:745): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-136.144.54.113:22-109.123.237.173:59742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:42:00.937301 kubelet[1871]: E0213 02:42:00.937085 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:01.937515 kubelet[1871]: E0213 02:42:01.937370 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:02.937901 kubelet[1871]: E0213 02:42:02.937839 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:03.938801 kubelet[1871]: E0213 02:42:03.938688 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:04.939755 kubelet[1871]: E0213 02:42:04.939634 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:05.940362 kubelet[1871]: E0213 02:42:05.940248 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:06.941403 kubelet[1871]: E0213 02:42:06.941290 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:07.942058 kubelet[1871]: E0213 02:42:07.941944 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:08.942942 kubelet[1871]: E0213 02:42:08.942822 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:09.943871 kubelet[1871]: E0213 02:42:09.943755 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:10.944054 kubelet[1871]: E0213 02:42:10.943941 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:11.944154 kubelet[1871]: E0213 02:42:11.944071 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:12.708196 env[1468]: time="2024-02-13T02:42:12.708142445Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:42:12.708761 env[1468]: time="2024-02-13T02:42:12.708720526Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:42:12.709988 env[1468]: time="2024-02-13T02:42:12.709947477Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:42:12.710777 env[1468]: time="2024-02-13T02:42:12.710755851Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:42:12.711628 env[1468]: time="2024-02-13T02:42:12.711612320Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 13 02:42:12.711960 env[1468]: time="2024-02-13T02:42:12.711930991Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 13 02:42:12.715207 env[1468]: time="2024-02-13T02:42:12.715160534Z" level=info msg="CreateContainer within sandbox \"304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 13 02:42:12.720272 env[1468]: time="2024-02-13T02:42:12.720225404Z" level=info msg="CreateContainer within sandbox \"304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7810d60bdf32f26e279d99a0f62256e66cb5b08a964196e39968ceb270fe5472\"" Feb 13 02:42:12.720559 env[1468]: time="2024-02-13T02:42:12.720519180Z" level=info msg="StartContainer for \"7810d60bdf32f26e279d99a0f62256e66cb5b08a964196e39968ceb270fe5472\"" Feb 13 02:42:12.728374 systemd[1]: Started cri-containerd-7810d60bdf32f26e279d99a0f62256e66cb5b08a964196e39968ceb270fe5472.scope. Feb 13 02:42:12.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.858654 kernel: audit: type=1400 audit(1707792132.734:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.858691 kernel: audit: type=1400 audit(1707792132.734:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.858712 kernel: audit: type=1400 audit(1707792132.734:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.920080 kernel: audit: type=1400 audit(1707792132.734:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.945281 kubelet[1871]: E0213 02:42:12.945263 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:12.981827 kernel: audit: type=1400 audit(1707792132.734:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.043529 kernel: audit: type=1400 audit(1707792132.734:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.167486 kernel: audit: type=1400 audit(1707792132.734:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.167515 kernel: audit: type=1400 audit(1707792132.734:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.231071 kernel: audit: type=1400 audit(1707792132.734:754): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.295015 kernel: audit: type=1400 audit(1707792132.919:755): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit: BPF prog-id=97 op=LOAD Feb 13 02:42:12.919000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit[5065]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3366 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:42:12.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738313064363062646633326632366532373964393961306636323235 Feb 13 02:42:12.919000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit[5065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3366 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:42:12.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738313064363062646633326632366532373964393961306636323235 Feb 13 02:42:12.919000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:12.919000 audit: BPF prog-id=98 op=LOAD Feb 13 02:42:12.919000 audit[5065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f3dc0 items=0 ppid=3366 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:42:12.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738313064363062646633326632366532373964393961306636323235 Feb 13 02:42:13.042000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.042000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.042000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.042000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.042000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.042000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.042000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.042000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.042000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.042000 audit: BPF prog-id=99 op=LOAD Feb 13 02:42:13.042000 audit[5065]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f3e08 items=0 ppid=3366 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:42:13.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738313064363062646633326632366532373964393961306636323235 Feb 13 02:42:13.165000 audit: BPF prog-id=99 op=UNLOAD Feb 13 02:42:13.165000 audit: BPF prog-id=98 op=UNLOAD Feb 13 02:42:13.165000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.165000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.165000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.165000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.165000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.165000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.165000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.165000 audit[5065]: AVC avc: denied { perfmon } for pid=5065 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.165000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.165000 audit[5065]: AVC avc: denied { bpf } for pid=5065 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.165000 audit: BPF prog-id=100 op=LOAD Feb 13 02:42:13.165000 audit[5065]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ee218 items=0 ppid=3366 pid=5065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:42:13.165000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738313064363062646633326632366532373964393961306636323235 Feb 13 02:42:13.397043 env[1468]: time="2024-02-13T02:42:13.397014893Z" level=info msg="StartContainer for \"7810d60bdf32f26e279d99a0f62256e66cb5b08a964196e39968ceb270fe5472\" returns successfully" Feb 13 02:42:13.726420 env[1468]: time="2024-02-13T02:42:13.726298081Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:42:13.727293 env[1468]: time="2024-02-13T02:42:13.727243798Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:42:13.728062 env[1468]: time="2024-02-13T02:42:13.728037536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:42:13.728780 env[1468]: time="2024-02-13T02:42:13.728734515Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:42:13.729373 env[1468]: time="2024-02-13T02:42:13.729357486Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 13 02:42:13.729905 env[1468]: time="2024-02-13T02:42:13.729847613Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 13 02:42:13.730608 env[1468]: time="2024-02-13T02:42:13.730560170Z" level=info msg="CreateContainer within sandbox \"1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 13 02:42:13.734849 env[1468]: time="2024-02-13T02:42:13.734834524Z" level=info msg="CreateContainer within sandbox \"1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a166e890a063594ff6013cc3d04e44ae551b4f5419915f58f6a9f5e90dbc6251\"" Feb 13 02:42:13.735125 env[1468]: time="2024-02-13T02:42:13.735110729Z" level=info msg="StartContainer for \"a166e890a063594ff6013cc3d04e44ae551b4f5419915f58f6a9f5e90dbc6251\"" Feb 13 02:42:13.744351 systemd[1]: Started cri-containerd-a166e890a063594ff6013cc3d04e44ae551b4f5419915f58f6a9f5e90dbc6251.scope. Feb 13 02:42:13.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.748000 audit: BPF prog-id=101 op=LOAD Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3605 pid=5144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:42:13.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131363665383930613036333539346666363031336363336430346534 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3605 pid=5144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:42:13.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131363665383930613036333539346666363031336363336430346534 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit: BPF prog-id=102 op=LOAD Feb 13 02:42:13.749000 audit[5144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000289cd0 items=0 ppid=3605 pid=5144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:42:13.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131363665383930613036333539346666363031336363336430346534 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit: BPF prog-id=103 op=LOAD Feb 13 02:42:13.749000 audit[5144]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000289d18 items=0 ppid=3605 pid=5144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:42:13.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131363665383930613036333539346666363031336363336430346534 Feb 13 02:42:13.749000 audit: BPF prog-id=103 op=UNLOAD Feb 13 02:42:13.749000 audit: BPF prog-id=102 op=UNLOAD Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { perfmon } for pid=5144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit[5144]: AVC avc: denied { bpf } for pid=5144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:42:13.749000 audit: BPF prog-id=104 op=LOAD Feb 13 02:42:13.749000 audit[5144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000414128 items=0 ppid=3605 pid=5144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:42:13.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131363665383930613036333539346666363031336363336430346534 Feb 13 02:42:13.756320 env[1468]: time="2024-02-13T02:42:13.756292999Z" level=info msg="StartContainer for \"a166e890a063594ff6013cc3d04e44ae551b4f5419915f58f6a9f5e90dbc6251\" returns successfully" Feb 13 02:42:13.859953 kubelet[1871]: I0213 02:42:13.859874 1871 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-79ddd57576-wxtrn" podStartSLOduration=444.850349954 podCreationTimestamp="2024-02-13 02:34:18 +0000 UTC" firstStartedPulling="2024-02-13 02:41:41.702353738 +0000 UTC m=+62.095674881" lastFinishedPulling="2024-02-13 02:42:12.711818227 +0000 UTC m=+93.105139369" observedRunningTime="2024-02-13 02:42:13.859507769 +0000 UTC m=+94.252828958" watchObservedRunningTime="2024-02-13 02:42:13.859814442 +0000 UTC m=+94.253135611" Feb 13 02:42:13.865314 kubelet[1871]: I0213 02:42:13.865270 1871 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-rq4xx" podStartSLOduration=448.983731808 podCreationTimestamp="2024-02-13 02:34:13 +0000 UTC" firstStartedPulling="2024-02-13 02:41:41.848149922 +0000 UTC m=+62.241471065" lastFinishedPulling="2024-02-13 02:42:13.72966858 +0000 UTC m=+94.122989722" observedRunningTime="2024-02-13 02:42:13.865135919 +0000 UTC m=+94.258457063" watchObservedRunningTime="2024-02-13 02:42:13.865250465 +0000 UTC m=+94.258571604" Feb 13 02:42:13.869000 audit[5197]: NETFILTER_CFG table=filter:65 family=2 entries=16 op=nft_register_rule pid=5197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:42:13.869000 audit[5197]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffff861e820 a2=0 a3=7ffff861e80c items=0 ppid=2104 pid=5197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:42:13.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:42:13.884000 audit[5197]: NETFILTER_CFG table=nat:66 family=2 entries=12 op=nft_register_rule pid=5197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:42:13.884000 audit[5197]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffff861e820 a2=0 a3=31030 items=0 ppid=2104 pid=5197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:42:13.884000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:42:13.946267 kubelet[1871]: E0213 02:42:13.946187 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:14.947413 kubelet[1871]: E0213 02:42:14.947308 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:15.947842 kubelet[1871]: E0213 02:42:15.947718 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:16.948001 kubelet[1871]: E0213 02:42:16.947897 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:17.949269 kubelet[1871]: E0213 02:42:17.949144 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:18.073026 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2068935932.mount: Deactivated successfully. Feb 13 02:42:18.950259 kubelet[1871]: E0213 02:42:18.950148 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:19.882869 kubelet[1871]: E0213 02:42:19.882770 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:19.951417 kubelet[1871]: E0213 02:42:19.951324 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:20.951618 kubelet[1871]: E0213 02:42:20.951544 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:21.952668 kubelet[1871]: E0213 02:42:21.952564 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:22.953035 kubelet[1871]: E0213 02:42:22.952974 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:23.953268 kubelet[1871]: E0213 02:42:23.953191 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:24.954209 kubelet[1871]: E0213 02:42:24.954090 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:25.954713 kubelet[1871]: E0213 02:42:25.954587 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:26.955901 kubelet[1871]: E0213 02:42:26.955787 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:27.956048 kubelet[1871]: E0213 02:42:27.955966 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:28.956290 kubelet[1871]: E0213 02:42:28.956171 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:29.956330 kubelet[1871]: E0213 02:42:29.956282 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:30.957212 kubelet[1871]: E0213 02:42:30.957109 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:31.958052 kubelet[1871]: E0213 02:42:31.957939 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:32.958178 kubelet[1871]: E0213 02:42:32.958075 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:33.958627 kubelet[1871]: E0213 02:42:33.958517 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:34.958922 kubelet[1871]: E0213 02:42:34.958811 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:35.959066 kubelet[1871]: E0213 02:42:35.958977 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:36.960307 kubelet[1871]: E0213 02:42:36.960203 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:37.961529 kubelet[1871]: E0213 02:42:37.961433 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:38.962335 kubelet[1871]: E0213 02:42:38.962254 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:39.883530 kubelet[1871]: E0213 02:42:39.883507 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:39.889669 env[1468]: time="2024-02-13T02:42:39.889623773Z" level=info msg="StopPodSandbox for \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\"" Feb 13 02:42:39.927643 env[1468]: 2024-02-13 02:42:39.908 [WARNING][6325] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cda955da-81e6-4f98-b891-1ef2ce42b6c0", ResourceVersion:"1645", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 34, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424", Pod:"coredns-5d78c9869d-rq4xx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali96ce3cc3913", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:42:39.927643 env[1468]: 2024-02-13 02:42:39.909 [INFO][6325] k8s.go 578: Cleaning up netns ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:42:39.927643 env[1468]: 2024-02-13 02:42:39.909 [INFO][6325] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" iface="eth0" netns="" Feb 13 02:42:39.927643 env[1468]: 2024-02-13 02:42:39.909 [INFO][6325] k8s.go 585: Releasing IP address(es) ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:42:39.927643 env[1468]: 2024-02-13 02:42:39.909 [INFO][6325] utils.go 188: Calico CNI releasing IP address ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:42:39.927643 env[1468]: 2024-02-13 02:42:39.918 [INFO][6342] ipam_plugin.go 415: Releasing address using handleID ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" HandleID="k8s-pod-network.857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:42:39.927643 env[1468]: 2024-02-13 02:42:39.918 [INFO][6342] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:42:39.927643 env[1468]: 2024-02-13 02:42:39.918 [INFO][6342] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:42:39.927643 env[1468]: 2024-02-13 02:42:39.924 [WARNING][6342] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" HandleID="k8s-pod-network.857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:42:39.927643 env[1468]: 2024-02-13 02:42:39.924 [INFO][6342] ipam_plugin.go 443: Releasing address using workloadID ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" HandleID="k8s-pod-network.857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:42:39.927643 env[1468]: 2024-02-13 02:42:39.926 [INFO][6342] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:42:39.927643 env[1468]: 2024-02-13 02:42:39.927 [INFO][6325] k8s.go 591: Teardown processing complete. ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:42:39.927643 env[1468]: time="2024-02-13T02:42:39.927628360Z" level=info msg="TearDown network for sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\" successfully" Feb 13 02:42:39.927643 env[1468]: time="2024-02-13T02:42:39.927645684Z" level=info msg="StopPodSandbox for \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\" returns successfully" Feb 13 02:42:39.928020 env[1468]: time="2024-02-13T02:42:39.927874719Z" level=info msg="RemovePodSandbox for \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\"" Feb 13 02:42:39.928020 env[1468]: time="2024-02-13T02:42:39.927891013Z" level=info msg="Forcibly stopping sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\"" Feb 13 02:42:39.963225 kubelet[1871]: E0213 02:42:39.963196 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:39.980493 env[1468]: 2024-02-13 02:42:39.949 [WARNING][6371] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"cda955da-81e6-4f98-b891-1ef2ce42b6c0", ResourceVersion:"1645", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 34, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"1d52eecdc943d1d3913981ac17d2c9d16a7224a6867341dcb352350b1dbe3424", Pod:"coredns-5d78c9869d-rq4xx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali96ce3cc3913", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:42:39.980493 env[1468]: 2024-02-13 02:42:39.950 [INFO][6371] k8s.go 578: Cleaning up netns ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:42:39.980493 env[1468]: 2024-02-13 02:42:39.950 [INFO][6371] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" iface="eth0" netns="" Feb 13 02:42:39.980493 env[1468]: 2024-02-13 02:42:39.950 [INFO][6371] k8s.go 585: Releasing IP address(es) ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:42:39.980493 env[1468]: 2024-02-13 02:42:39.950 [INFO][6371] utils.go 188: Calico CNI releasing IP address ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:42:39.980493 env[1468]: 2024-02-13 02:42:39.961 [INFO][6383] ipam_plugin.go 415: Releasing address using handleID ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" HandleID="k8s-pod-network.857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:42:39.980493 env[1468]: 2024-02-13 02:42:39.961 [INFO][6383] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:42:39.980493 env[1468]: 2024-02-13 02:42:39.961 [INFO][6383] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:42:39.980493 env[1468]: 2024-02-13 02:42:39.975 [WARNING][6383] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" HandleID="k8s-pod-network.857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:42:39.980493 env[1468]: 2024-02-13 02:42:39.975 [INFO][6383] ipam_plugin.go 443: Releasing address using workloadID ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" HandleID="k8s-pod-network.857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rq4xx-eth0" Feb 13 02:42:39.980493 env[1468]: 2024-02-13 02:42:39.978 [INFO][6383] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:42:39.980493 env[1468]: 2024-02-13 02:42:39.979 [INFO][6371] k8s.go 591: Teardown processing complete. ContainerID="857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322" Feb 13 02:42:39.980493 env[1468]: time="2024-02-13T02:42:39.980452088Z" level=info msg="TearDown network for sandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\" successfully" Feb 13 02:42:39.982196 env[1468]: time="2024-02-13T02:42:39.982135790Z" level=info msg="RemovePodSandbox \"857ee4b501733d5879d5452349e8314eddcd3563249290c9290578ba854c4322\" returns successfully" Feb 13 02:42:39.982746 env[1468]: time="2024-02-13T02:42:39.982712529Z" level=info msg="StopPodSandbox for \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\"" Feb 13 02:42:40.034676 env[1468]: 2024-02-13 02:42:40.013 [WARNING][6412] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"06d66a20-41d3-4311-9714-4e9d6f4f6a71", ResourceVersion:"1580", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 34, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8", Pod:"coredns-5d78c9869d-rcxq6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicbda59b06ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:42:40.034676 env[1468]: 2024-02-13 02:42:40.013 [INFO][6412] k8s.go 578: Cleaning up netns ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:42:40.034676 env[1468]: 2024-02-13 02:42:40.013 [INFO][6412] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" iface="eth0" netns="" Feb 13 02:42:40.034676 env[1468]: 2024-02-13 02:42:40.013 [INFO][6412] k8s.go 585: Releasing IP address(es) ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:42:40.034676 env[1468]: 2024-02-13 02:42:40.013 [INFO][6412] utils.go 188: Calico CNI releasing IP address ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:42:40.034676 env[1468]: 2024-02-13 02:42:40.025 [INFO][6425] ipam_plugin.go 415: Releasing address using handleID ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" HandleID="k8s-pod-network.7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:42:40.034676 env[1468]: 2024-02-13 02:42:40.025 [INFO][6425] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:42:40.034676 env[1468]: 2024-02-13 02:42:40.025 [INFO][6425] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:42:40.034676 env[1468]: 2024-02-13 02:42:40.031 [WARNING][6425] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" HandleID="k8s-pod-network.7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:42:40.034676 env[1468]: 2024-02-13 02:42:40.031 [INFO][6425] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" HandleID="k8s-pod-network.7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:42:40.034676 env[1468]: 2024-02-13 02:42:40.033 [INFO][6425] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:42:40.034676 env[1468]: 2024-02-13 02:42:40.033 [INFO][6412] k8s.go 591: Teardown processing complete. ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:42:40.035141 env[1468]: time="2024-02-13T02:42:40.034697670Z" level=info msg="TearDown network for sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\" successfully" Feb 13 02:42:40.035141 env[1468]: time="2024-02-13T02:42:40.034725177Z" level=info msg="StopPodSandbox for \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\" returns successfully" Feb 13 02:42:40.035141 env[1468]: time="2024-02-13T02:42:40.035016661Z" level=info msg="RemovePodSandbox for \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\"" Feb 13 02:42:40.035141 env[1468]: time="2024-02-13T02:42:40.035038381Z" level=info msg="Forcibly stopping sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\"" Feb 13 02:42:40.101484 env[1468]: 2024-02-13 02:42:40.064 [WARNING][6456] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"06d66a20-41d3-4311-9714-4e9d6f4f6a71", ResourceVersion:"1580", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 34, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8", Pod:"coredns-5d78c9869d-rcxq6", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.21.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicbda59b06ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:42:40.101484 env[1468]: 2024-02-13 02:42:40.064 [INFO][6456] k8s.go 578: Cleaning up netns ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:42:40.101484 env[1468]: 2024-02-13 02:42:40.064 [INFO][6456] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" iface="eth0" netns="" Feb 13 02:42:40.101484 env[1468]: 2024-02-13 02:42:40.064 [INFO][6456] k8s.go 585: Releasing IP address(es) ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:42:40.101484 env[1468]: 2024-02-13 02:42:40.064 [INFO][6456] utils.go 188: Calico CNI releasing IP address ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:42:40.101484 env[1468]: 2024-02-13 02:42:40.081 [INFO][6470] ipam_plugin.go 415: Releasing address using handleID ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" HandleID="k8s-pod-network.7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:42:40.101484 env[1468]: 2024-02-13 02:42:40.081 [INFO][6470] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:42:40.101484 env[1468]: 2024-02-13 02:42:40.081 [INFO][6470] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:42:40.101484 env[1468]: 2024-02-13 02:42:40.096 [WARNING][6470] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" HandleID="k8s-pod-network.7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:42:40.101484 env[1468]: 2024-02-13 02:42:40.096 [INFO][6470] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" HandleID="k8s-pod-network.7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Workload="10.67.80.35-k8s-coredns--5d78c9869d--rcxq6-eth0" Feb 13 02:42:40.101484 env[1468]: 2024-02-13 02:42:40.099 [INFO][6470] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:42:40.101484 env[1468]: 2024-02-13 02:42:40.100 [INFO][6456] k8s.go 591: Teardown processing complete. ContainerID="7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e" Feb 13 02:42:40.102154 env[1468]: time="2024-02-13T02:42:40.101482058Z" level=info msg="TearDown network for sandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\" successfully" Feb 13 02:42:40.103281 env[1468]: time="2024-02-13T02:42:40.103224276Z" level=info msg="RemovePodSandbox \"7911ad025ab0eba524601a8e9d6715c9db831827108296a46d45e5ca0ab7da6e\" returns successfully" Feb 13 02:42:40.103690 env[1468]: time="2024-02-13T02:42:40.103662067Z" level=info msg="StopPodSandbox for \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\"" Feb 13 02:42:40.213347 env[1468]: 2024-02-13 02:42:40.167 [WARNING][6500] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0", GenerateName:"calico-kube-controllers-79ddd57576-", Namespace:"calico-system", SelfLink:"", UID:"a0281f43-d115-4a39-967f-62ecd5ce6e67", ResourceVersion:"1644", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 34, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79ddd57576", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4", Pod:"calico-kube-controllers-79ddd57576-wxtrn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali81b42744c97", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:42:40.213347 env[1468]: 2024-02-13 02:42:40.167 [INFO][6500] k8s.go 578: Cleaning up netns ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:42:40.213347 env[1468]: 2024-02-13 02:42:40.168 [INFO][6500] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" iface="eth0" netns="" Feb 13 02:42:40.213347 env[1468]: 2024-02-13 02:42:40.168 [INFO][6500] k8s.go 585: Releasing IP address(es) ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:42:40.213347 env[1468]: 2024-02-13 02:42:40.168 [INFO][6500] utils.go 188: Calico CNI releasing IP address ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:42:40.213347 env[1468]: 2024-02-13 02:42:40.196 [INFO][6517] ipam_plugin.go 415: Releasing address using handleID ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" HandleID="k8s-pod-network.7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Workload="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:42:40.213347 env[1468]: 2024-02-13 02:42:40.196 [INFO][6517] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:42:40.213347 env[1468]: 2024-02-13 02:42:40.196 [INFO][6517] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:42:40.213347 env[1468]: 2024-02-13 02:42:40.207 [WARNING][6517] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" HandleID="k8s-pod-network.7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Workload="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:42:40.213347 env[1468]: 2024-02-13 02:42:40.207 [INFO][6517] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" HandleID="k8s-pod-network.7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Workload="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:42:40.213347 env[1468]: 2024-02-13 02:42:40.209 [INFO][6517] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:42:40.213347 env[1468]: 2024-02-13 02:42:40.211 [INFO][6500] k8s.go 591: Teardown processing complete. ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:42:40.213347 env[1468]: time="2024-02-13T02:42:40.213309324Z" level=info msg="TearDown network for sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\" successfully" Feb 13 02:42:40.214489 env[1468]: time="2024-02-13T02:42:40.213353549Z" level=info msg="StopPodSandbox for \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\" returns successfully" Feb 13 02:42:40.214489 env[1468]: time="2024-02-13T02:42:40.214050532Z" level=info msg="RemovePodSandbox for \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\"" Feb 13 02:42:40.214489 env[1468]: time="2024-02-13T02:42:40.214100832Z" level=info msg="Forcibly stopping sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\"" Feb 13 02:42:40.316335 env[1468]: 2024-02-13 02:42:40.271 [WARNING][6550] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0", GenerateName:"calico-kube-controllers-79ddd57576-", Namespace:"calico-system", SelfLink:"", UID:"a0281f43-d115-4a39-967f-62ecd5ce6e67", ResourceVersion:"1644", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 34, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79ddd57576", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4", Pod:"calico-kube-controllers-79ddd57576-wxtrn", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.21.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali81b42744c97", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:42:40.316335 env[1468]: 2024-02-13 02:42:40.271 [INFO][6550] k8s.go 578: Cleaning up netns ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:42:40.316335 env[1468]: 2024-02-13 02:42:40.271 [INFO][6550] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" iface="eth0" netns="" Feb 13 02:42:40.316335 env[1468]: 2024-02-13 02:42:40.272 [INFO][6550] k8s.go 585: Releasing IP address(es) ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:42:40.316335 env[1468]: 2024-02-13 02:42:40.272 [INFO][6550] utils.go 188: Calico CNI releasing IP address ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:42:40.316335 env[1468]: 2024-02-13 02:42:40.294 [INFO][6567] ipam_plugin.go 415: Releasing address using handleID ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" HandleID="k8s-pod-network.7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Workload="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:42:40.316335 env[1468]: 2024-02-13 02:42:40.294 [INFO][6567] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:42:40.316335 env[1468]: 2024-02-13 02:42:40.294 [INFO][6567] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:42:40.316335 env[1468]: 2024-02-13 02:42:40.309 [WARNING][6567] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" HandleID="k8s-pod-network.7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Workload="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:42:40.316335 env[1468]: 2024-02-13 02:42:40.309 [INFO][6567] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" HandleID="k8s-pod-network.7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Workload="10.67.80.35-k8s-calico--kube--controllers--79ddd57576--wxtrn-eth0" Feb 13 02:42:40.316335 env[1468]: 2024-02-13 02:42:40.312 [INFO][6567] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:42:40.316335 env[1468]: 2024-02-13 02:42:40.314 [INFO][6550] k8s.go 591: Teardown processing complete. ContainerID="7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0" Feb 13 02:42:40.317675 env[1468]: time="2024-02-13T02:42:40.316363168Z" level=info msg="TearDown network for sandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\" successfully" Feb 13 02:42:40.319755 env[1468]: time="2024-02-13T02:42:40.319683208Z" level=info msg="RemovePodSandbox \"7cb02db2aba96ad0b5e8ef4c4201e2a496cd0922f5f75026f0f1a28b506be9a0\" returns successfully" Feb 13 02:42:40.320600 env[1468]: time="2024-02-13T02:42:40.320534675Z" level=info msg="StopPodSandbox for \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\"" Feb 13 02:42:40.431399 env[1468]: 2024-02-13 02:42:40.398 [WARNING][6597] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-csi--node--driver--fpkxk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9a6268d2-c909-4459-9230-b4453f549c04", ResourceVersion:"1564", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 40, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6", Pod:"csi-node-driver-fpkxk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali77e1c267602", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:42:40.431399 env[1468]: 2024-02-13 02:42:40.398 [INFO][6597] k8s.go 578: Cleaning up netns ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:42:40.431399 env[1468]: 2024-02-13 02:42:40.398 [INFO][6597] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" iface="eth0" netns="" Feb 13 02:42:40.431399 env[1468]: 2024-02-13 02:42:40.398 [INFO][6597] k8s.go 585: Releasing IP address(es) ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:42:40.431399 env[1468]: 2024-02-13 02:42:40.398 [INFO][6597] utils.go 188: Calico CNI releasing IP address ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:42:40.431399 env[1468]: 2024-02-13 02:42:40.412 [INFO][6625] ipam_plugin.go 415: Releasing address using handleID ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" HandleID="k8s-pod-network.e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Workload="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:42:40.431399 env[1468]: 2024-02-13 02:42:40.412 [INFO][6625] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:42:40.431399 env[1468]: 2024-02-13 02:42:40.412 [INFO][6625] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:42:40.431399 env[1468]: 2024-02-13 02:42:40.426 [WARNING][6625] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" HandleID="k8s-pod-network.e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Workload="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:42:40.431399 env[1468]: 2024-02-13 02:42:40.426 [INFO][6625] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" HandleID="k8s-pod-network.e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Workload="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:42:40.431399 env[1468]: 2024-02-13 02:42:40.429 [INFO][6625] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:42:40.431399 env[1468]: 2024-02-13 02:42:40.430 [INFO][6597] k8s.go 591: Teardown processing complete. ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:42:40.432055 env[1468]: time="2024-02-13T02:42:40.431428004Z" level=info msg="TearDown network for sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\" successfully" Feb 13 02:42:40.432055 env[1468]: time="2024-02-13T02:42:40.431471094Z" level=info msg="StopPodSandbox for \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\" returns successfully" Feb 13 02:42:40.432055 env[1468]: time="2024-02-13T02:42:40.431855304Z" level=info msg="RemovePodSandbox for \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\"" Feb 13 02:42:40.432055 env[1468]: time="2024-02-13T02:42:40.431888852Z" level=info msg="Forcibly stopping sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\"" Feb 13 02:42:40.526371 env[1468]: 2024-02-13 02:42:40.472 [WARNING][6656] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-csi--node--driver--fpkxk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9a6268d2-c909-4459-9230-b4453f549c04", ResourceVersion:"1564", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 40, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6", Pod:"csi-node-driver-fpkxk", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali77e1c267602", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:42:40.526371 env[1468]: 2024-02-13 02:42:40.472 [INFO][6656] k8s.go 578: Cleaning up netns ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:42:40.526371 env[1468]: 2024-02-13 02:42:40.472 [INFO][6656] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" iface="eth0" netns="" Feb 13 02:42:40.526371 env[1468]: 2024-02-13 02:42:40.472 [INFO][6656] k8s.go 585: Releasing IP address(es) ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:42:40.526371 env[1468]: 2024-02-13 02:42:40.472 [INFO][6656] utils.go 188: Calico CNI releasing IP address ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:42:40.526371 env[1468]: 2024-02-13 02:42:40.506 [INFO][6676] ipam_plugin.go 415: Releasing address using handleID ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" HandleID="k8s-pod-network.e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Workload="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:42:40.526371 env[1468]: 2024-02-13 02:42:40.506 [INFO][6676] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:42:40.526371 env[1468]: 2024-02-13 02:42:40.506 [INFO][6676] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:42:40.526371 env[1468]: 2024-02-13 02:42:40.519 [WARNING][6676] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" HandleID="k8s-pod-network.e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Workload="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:42:40.526371 env[1468]: 2024-02-13 02:42:40.519 [INFO][6676] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" HandleID="k8s-pod-network.e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Workload="10.67.80.35-k8s-csi--node--driver--fpkxk-eth0" Feb 13 02:42:40.526371 env[1468]: 2024-02-13 02:42:40.522 [INFO][6676] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:42:40.526371 env[1468]: 2024-02-13 02:42:40.524 [INFO][6656] k8s.go 591: Teardown processing complete. ContainerID="e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a" Feb 13 02:42:40.526371 env[1468]: time="2024-02-13T02:42:40.526272118Z" level=info msg="TearDown network for sandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\" successfully" Feb 13 02:42:40.529243 env[1468]: time="2024-02-13T02:42:40.529154403Z" level=info msg="RemovePodSandbox \"e1cb9c1a2fed8681b9d380aa77537e6d4b9504227fbdbac7a591f8c7e2946b0a\" returns successfully" Feb 13 02:42:40.963608 kubelet[1871]: E0213 02:42:40.963350 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:41.963882 kubelet[1871]: E0213 02:42:41.963836 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:42.964929 kubelet[1871]: E0213 02:42:42.964881 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:43.965764 kubelet[1871]: E0213 02:42:43.965645 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:44.966505 kubelet[1871]: E0213 02:42:44.966393 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:45.966798 kubelet[1871]: E0213 02:42:45.966675 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:46.967689 kubelet[1871]: E0213 02:42:46.967575 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:47.968687 kubelet[1871]: E0213 02:42:47.968583 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:48.969671 kubelet[1871]: E0213 02:42:48.969556 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:49.970880 kubelet[1871]: E0213 02:42:49.970760 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:50.971051 kubelet[1871]: E0213 02:42:50.970940 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:51.971228 kubelet[1871]: E0213 02:42:51.971114 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:52.971316 kubelet[1871]: E0213 02:42:52.971254 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:53.971663 kubelet[1871]: E0213 02:42:53.971598 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:54.972749 kubelet[1871]: E0213 02:42:54.972640 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:55.972982 kubelet[1871]: E0213 02:42:55.972908 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:56.973778 kubelet[1871]: E0213 02:42:56.973713 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:57.974927 kubelet[1871]: E0213 02:42:57.974871 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:58.975802 kubelet[1871]: E0213 02:42:58.975702 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:59.883899 kubelet[1871]: E0213 02:42:59.883786 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:42:59.976533 kubelet[1871]: E0213 02:42:59.976427 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:00.976810 kubelet[1871]: E0213 02:43:00.976712 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:01.977639 kubelet[1871]: E0213 02:43:01.977517 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:02.978169 kubelet[1871]: E0213 02:43:02.978047 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:03.979102 kubelet[1871]: E0213 02:43:03.978985 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:04.979475 kubelet[1871]: E0213 02:43:04.979416 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:05.979726 kubelet[1871]: E0213 02:43:05.979675 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:06.857640 systemd[1]: Started sshd@9-136.144.54.113:22-109.123.237.173:59816.service. Feb 13 02:43:06.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-136.144.54.113:22-109.123.237.173:59816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:06.885420 kernel: kauditd_printk_skb: 110 callbacks suppressed Feb 13 02:43:06.885527 kernel: audit: type=1130 audit(1707792186.857:784): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-136.144.54.113:22-109.123.237.173:59816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:06.979982 kubelet[1871]: E0213 02:43:06.979941 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:07.795426 sshd[7726]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.123.237.173 user=root Feb 13 02:43:07.795000 audit[7726]: USER_AUTH pid=7726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:43:07.887646 kernel: audit: type=1100 audit(1707792187.795:785): pid=7726 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:43:07.980779 kubelet[1871]: E0213 02:43:07.980671 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:08.981428 kubelet[1871]: E0213 02:43:08.981314 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:09.982037 kubelet[1871]: E0213 02:43:09.981925 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:10.014506 sshd[7726]: Failed password for root from 109.123.237.173 port 59816 ssh2 Feb 13 02:43:10.983122 kubelet[1871]: E0213 02:43:10.983020 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:11.820137 sshd[7726]: Received disconnect from 109.123.237.173 port 59816:11: Bye Bye [preauth] Feb 13 02:43:11.820137 sshd[7726]: Disconnected from authenticating user root 109.123.237.173 port 59816 [preauth] Feb 13 02:43:11.822644 systemd[1]: sshd@9-136.144.54.113:22-109.123.237.173:59816.service: Deactivated successfully. Feb 13 02:43:11.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-136.144.54.113:22-109.123.237.173:59816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:11.915635 kernel: audit: type=1131 audit(1707792191.822:786): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-136.144.54.113:22-109.123.237.173:59816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:11.984063 kubelet[1871]: E0213 02:43:11.984003 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:12.984764 kubelet[1871]: E0213 02:43:12.984649 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:13.417161 systemd[1]: cri-containerd-7810d60bdf32f26e279d99a0f62256e66cb5b08a964196e39968ceb270fe5472.scope: Deactivated successfully. Feb 13 02:43:13.417000 audit: BPF prog-id=97 op=UNLOAD Feb 13 02:43:13.459632 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7810d60bdf32f26e279d99a0f62256e66cb5b08a964196e39968ceb270fe5472-rootfs.mount: Deactivated successfully. Feb 13 02:43:13.462482 kernel: audit: type=1334 audit(1707792193.417:787): prog-id=97 op=UNLOAD Feb 13 02:43:13.465456 env[1468]: time="2024-02-13T02:43:13.465389560Z" level=info msg="shim disconnected" id=7810d60bdf32f26e279d99a0f62256e66cb5b08a964196e39968ceb270fe5472 Feb 13 02:43:13.465456 env[1468]: time="2024-02-13T02:43:13.465432571Z" level=warning msg="cleaning up after shim disconnected" id=7810d60bdf32f26e279d99a0f62256e66cb5b08a964196e39968ceb270fe5472 namespace=k8s.io Feb 13 02:43:13.465456 env[1468]: time="2024-02-13T02:43:13.465442910Z" level=info msg="cleaning up dead shim" Feb 13 02:43:13.466000 audit: BPF prog-id=100 op=UNLOAD Feb 13 02:43:13.471093 env[1468]: time="2024-02-13T02:43:13.471040284Z" level=warning msg="cleanup warnings time=\"2024-02-13T02:43:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=8013 runtime=io.containerd.runc.v2\n" Feb 13 02:43:13.495678 kernel: audit: type=1334 audit(1707792193.466:788): prog-id=100 op=UNLOAD Feb 13 02:43:13.985937 kubelet[1871]: E0213 02:43:13.985826 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:14.011705 kubelet[1871]: I0213 02:43:14.011611 1871 scope.go:115] "RemoveContainer" containerID="7810d60bdf32f26e279d99a0f62256e66cb5b08a964196e39968ceb270fe5472" Feb 13 02:43:14.016759 env[1468]: time="2024-02-13T02:43:14.016621213Z" level=info msg="CreateContainer within sandbox \"304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:1,}" Feb 13 02:43:14.030506 env[1468]: time="2024-02-13T02:43:14.030381411Z" level=info msg="CreateContainer within sandbox \"304d3138ea4a9157d7ae6ae6779df8cbda5124e637b513af8b405e62171ae9c4\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:1,} returns container id \"90784b972d8afb3e6038c2b2f03e5c58c97ee3d06e19c4e4225b2b2acf71d1e4\"" Feb 13 02:43:14.031304 env[1468]: time="2024-02-13T02:43:14.031230442Z" level=info msg="StartContainer for \"90784b972d8afb3e6038c2b2f03e5c58c97ee3d06e19c4e4225b2b2acf71d1e4\"" Feb 13 02:43:14.040479 systemd[1]: Started cri-containerd-90784b972d8afb3e6038c2b2f03e5c58c97ee3d06e19c4e4225b2b2acf71d1e4.scope. Feb 13 02:43:14.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.173113 kernel: audit: type=1400 audit(1707792194.045:789): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.173155 kernel: audit: type=1400 audit(1707792194.045:790): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.173172 kernel: audit: type=1400 audit(1707792194.045:791): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.298805 kernel: audit: type=1400 audit(1707792194.045:792): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.298872 kernel: audit: type=1400 audit(1707792194.045:793): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.361835 kernel: audit: type=1400 audit(1707792194.045:794): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.424834 kernel: audit: type=1400 audit(1707792194.045:795): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.487805 kernel: audit: type=1400 audit(1707792194.045:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit: BPF prog-id=105 op=LOAD Feb 13 02:43:14.172000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit[8043]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3366 pid=8043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:14.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373834623937326438616662336536303338633262326630336535 Feb 13 02:43:14.172000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit[8043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3366 pid=8043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:14.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373834623937326438616662336536303338633262326630336535 Feb 13 02:43:14.172000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.172000 audit: BPF prog-id=106 op=LOAD Feb 13 02:43:14.172000 audit[8043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003a89e0 items=0 ppid=3366 pid=8043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:14.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373834623937326438616662336536303338633262326630336535 Feb 13 02:43:14.235000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.235000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.235000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.235000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.235000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.235000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.235000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.235000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.235000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.235000 audit: BPF prog-id=107 op=LOAD Feb 13 02:43:14.235000 audit[8043]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003a8a28 items=0 ppid=3366 pid=8043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:14.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373834623937326438616662336536303338633262326630336535 Feb 13 02:43:14.361000 audit: BPF prog-id=107 op=UNLOAD Feb 13 02:43:14.361000 audit: BPF prog-id=106 op=UNLOAD Feb 13 02:43:14.361000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.361000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.361000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.361000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.361000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.361000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.361000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.361000 audit[8043]: AVC avc: denied { perfmon } for pid=8043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.361000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.361000 audit[8043]: AVC avc: denied { bpf } for pid=8043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:14.361000 audit: BPF prog-id=108 op=LOAD Feb 13 02:43:14.361000 audit[8043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003a8e38 items=0 ppid=3366 pid=8043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:14.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930373834623937326438616662336536303338633262326630336535 Feb 13 02:43:14.567351 env[1468]: time="2024-02-13T02:43:14.567327519Z" level=info msg="StartContainer for \"90784b972d8afb3e6038c2b2f03e5c58c97ee3d06e19c4e4225b2b2acf71d1e4\" returns successfully" Feb 13 02:43:14.986777 kubelet[1871]: E0213 02:43:14.986563 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:15.986948 kubelet[1871]: E0213 02:43:15.986831 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:16.987871 kubelet[1871]: E0213 02:43:16.987760 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:17.988153 kubelet[1871]: E0213 02:43:17.988039 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:18.989309 kubelet[1871]: E0213 02:43:18.989193 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:19.883529 kubelet[1871]: E0213 02:43:19.883503 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:19.990098 kubelet[1871]: E0213 02:43:19.989992 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:20.990334 kubelet[1871]: E0213 02:43:20.990224 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:21.991111 kubelet[1871]: E0213 02:43:21.991039 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:22.991163 kubelet[1871]: E0213 02:43:22.991119 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:23.992143 kubelet[1871]: E0213 02:43:23.992029 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:24.993092 kubelet[1871]: E0213 02:43:24.992981 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:25.994383 kubelet[1871]: E0213 02:43:25.994266 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:26.995363 kubelet[1871]: E0213 02:43:26.995278 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:27.995954 kubelet[1871]: E0213 02:43:27.995879 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:28.996183 kubelet[1871]: E0213 02:43:28.996058 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:29.996388 kubelet[1871]: E0213 02:43:29.996277 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:30.997566 kubelet[1871]: E0213 02:43:30.997475 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:31.998501 kubelet[1871]: E0213 02:43:31.998387 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:32.999265 kubelet[1871]: E0213 02:43:32.999152 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:33.999576 kubelet[1871]: E0213 02:43:33.999498 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:34.999924 kubelet[1871]: E0213 02:43:34.999884 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:35.321000 audit[8953]: NETFILTER_CFG table=filter:67 family=2 entries=15 op=nft_register_rule pid=8953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:43:35.349511 kernel: kauditd_printk_skb: 49 callbacks suppressed Feb 13 02:43:35.349584 kernel: audit: type=1325 audit(1707792215.321:807): table=filter:67 family=2 entries=15 op=nft_register_rule pid=8953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:43:35.321000 audit[8953]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffee275b060 a2=0 a3=7ffee275b04c items=0 ppid=2104 pid=8953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:35.505529 kernel: audit: type=1300 audit(1707792215.321:807): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffee275b060 a2=0 a3=7ffee275b04c items=0 ppid=2104 pid=8953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:35.505604 kernel: audit: type=1327 audit(1707792215.321:807): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:43:35.321000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:43:35.321000 audit[8953]: NETFILTER_CFG table=nat:68 family=2 entries=19 op=nft_register_chain pid=8953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:43:35.321000 audit[8953]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffee275b060 a2=0 a3=7ffee275b04c items=0 ppid=2104 pid=8953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:35.721696 kernel: audit: type=1325 audit(1707792215.321:808): table=nat:68 family=2 entries=19 op=nft_register_chain pid=8953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:43:35.721737 kernel: audit: type=1300 audit(1707792215.321:808): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffee275b060 a2=0 a3=7ffee275b04c items=0 ppid=2104 pid=8953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:35.721753 kernel: audit: type=1327 audit(1707792215.321:808): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:43:35.321000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:43:36.000692 kubelet[1871]: E0213 02:43:36.000640 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:36.017000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.017000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.144135 kernel: audit: type=1400 audit(1707792216.017:809): avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.144206 kernel: audit: type=1400 audit(1707792216.017:809): avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.144222 kernel: audit: type=1400 audit(1707792216.017:809): avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.017000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.207382 kernel: audit: type=1400 audit(1707792216.017:809): avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.017000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.017000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.017000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.017000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.017000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.017000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.017000 audit: BPF prog-id=109 op=LOAD Feb 13 02:43:36.017000 audit[9068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc1f6f07a0 a2=70 a3=7fc1bc4b0000 items=0 ppid=8989 pid=9068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.017000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 02:43:36.143000 audit: BPF prog-id=109 op=UNLOAD Feb 13 02:43:36.143000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.143000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.143000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.143000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.143000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.143000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.143000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.143000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.143000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.143000 audit: BPF prog-id=110 op=LOAD Feb 13 02:43:36.143000 audit[9068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc1f6f07a0 a2=70 a3=6e items=0 ppid=8989 pid=9068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.143000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 02:43:36.270000 audit: BPF prog-id=110 op=UNLOAD Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc1f6f0750 a2=70 a3=7ffc1f6f07a0 items=0 ppid=8989 pid=9068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit: BPF prog-id=111 op=LOAD Feb 13 02:43:36.270000 audit[9068]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc1f6f0730 a2=70 a3=7ffc1f6f07a0 items=0 ppid=8989 pid=9068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 02:43:36.270000 audit: BPF prog-id=111 op=UNLOAD Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc1f6f0810 a2=70 a3=0 items=0 ppid=8989 pid=9068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc1f6f0800 a2=70 a3=0 items=0 ppid=8989 pid=9068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffc1f6f0840 a2=70 a3=0 items=0 ppid=8989 pid=9068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { perfmon } for pid=9068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit[9068]: AVC avc: denied { bpf } for pid=9068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.270000 audit: BPF prog-id=112 op=LOAD Feb 13 02:43:36.270000 audit[9068]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc1f6f0760 a2=70 a3=ffffffff items=0 ppid=8989 pid=9068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 13 02:43:36.271000 audit[9134]: AVC avc: denied { bpf } for pid=9134 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.271000 audit[9134]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdccfd0c30 a2=70 a3=fff80800 items=0 ppid=8989 pid=9134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 13 02:43:36.271000 audit[9134]: AVC avc: denied { bpf } for pid=9134 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:36.271000 audit[9134]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffdccfd0b00 a2=70 a3=3 items=0 ppid=8989 pid=9134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 13 02:43:36.287000 audit: BPF prog-id=112 op=UNLOAD Feb 13 02:43:36.320000 audit[9162]: NETFILTER_CFG table=mangle:69 family=2 entries=19 op=nft_register_chain pid=9162 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 02:43:36.320000 audit[9162]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe27090440 a2=0 a3=7ffe2709042c items=0 ppid=8989 pid=9162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.320000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 02:43:36.322000 audit[9161]: NETFILTER_CFG table=raw:70 family=2 entries=19 op=nft_register_chain pid=9161 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 02:43:36.322000 audit[9161]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffea3ab7160 a2=0 a3=563667629000 items=0 ppid=8989 pid=9161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.322000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 02:43:36.324000 audit[9166]: NETFILTER_CFG table=nat:71 family=2 entries=16 op=nft_register_chain pid=9166 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 02:43:36.324000 audit[9166]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffcdf991450 a2=0 a3=5584718d4000 items=0 ppid=8989 pid=9166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.324000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 02:43:36.327000 audit[9165]: NETFILTER_CFG table=filter:72 family=2 entries=151 op=nft_register_chain pid=9165 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 02:43:36.327000 audit[9165]: SYSCALL arch=c000003e syscall=46 success=yes exit=83968 a0=3 a1=7ffcf3a9e490 a2=0 a3=5608c9f29000 items=0 ppid=8989 pid=9165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:36.327000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 02:43:36.993738 systemd-networkd[1311]: vxlan.calico: Link UP Feb 13 02:43:36.993741 systemd-networkd[1311]: vxlan.calico: Gained carrier Feb 13 02:43:37.001609 kubelet[1871]: E0213 02:43:37.001584 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:38.002225 kubelet[1871]: E0213 02:43:38.002116 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:38.665771 systemd-networkd[1311]: vxlan.calico: Gained IPv6LL Feb 13 02:43:39.003026 kubelet[1871]: E0213 02:43:39.002810 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:39.882941 kubelet[1871]: E0213 02:43:39.882832 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:40.003413 kubelet[1871]: E0213 02:43:40.003301 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:41.004160 kubelet[1871]: E0213 02:43:41.004041 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:42.005231 kubelet[1871]: E0213 02:43:42.005120 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:43.005697 kubelet[1871]: E0213 02:43:43.005590 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:44.006806 kubelet[1871]: E0213 02:43:44.006689 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:44.462787 systemd[1]: Started sshd@10-136.144.54.113:22-81.209.179.157:53312.service. Feb 13 02:43:44.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-136.144.54.113:22-81.209.179.157:53312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:44.489790 kernel: kauditd_printk_skb: 79 callbacks suppressed Feb 13 02:43:44.489867 kernel: audit: type=1130 audit(1707792224.461:827): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-136.144.54.113:22-81.209.179.157:53312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:45.007561 kubelet[1871]: E0213 02:43:45.007438 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:46.007760 kubelet[1871]: E0213 02:43:46.007649 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:46.336000 audit[9203]: NETFILTER_CFG table=filter:73 family=2 entries=11 op=nft_register_rule pid=9203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:43:46.336000 audit[9203]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcc17ee4c0 a2=0 a3=7ffcc17ee4ac items=0 ppid=2104 pid=9203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:46.494998 kernel: audit: type=1325 audit(1707792226.336:828): table=filter:73 family=2 entries=11 op=nft_register_rule pid=9203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:43:46.495064 kernel: audit: type=1300 audit(1707792226.336:828): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffcc17ee4c0 a2=0 a3=7ffcc17ee4ac items=0 ppid=2104 pid=9203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:46.495081 kernel: audit: type=1327 audit(1707792226.336:828): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:43:46.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:43:46.555000 audit[9203]: NETFILTER_CFG table=nat:74 family=2 entries=35 op=nft_register_chain pid=9203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:43:46.555000 audit[9203]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffcc17ee4c0 a2=0 a3=7ffcc17ee4ac items=0 ppid=2104 pid=9203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:46.714452 kernel: audit: type=1325 audit(1707792226.555:829): table=nat:74 family=2 entries=35 op=nft_register_chain pid=9203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:43:46.714490 kernel: audit: type=1300 audit(1707792226.555:829): arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffcc17ee4c0 a2=0 a3=7ffcc17ee4ac items=0 ppid=2104 pid=9203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:46.714506 kernel: audit: type=1327 audit(1707792226.555:829): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:43:46.555000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:43:46.982833 kubelet[1871]: I0213 02:43:46.982619 1871 topology_manager.go:212] "Topology Admit Handler" Feb 13 02:43:46.996610 systemd[1]: Created slice kubepods-besteffort-poda691a961_1618_4920_ac8e_90278a6e0dd6.slice. Feb 13 02:43:47.008738 kubelet[1871]: E0213 02:43:47.008652 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:47.067708 kubelet[1871]: I0213 02:43:47.067598 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m9vnj\" (UniqueName: \"kubernetes.io/projected/a691a961-1618-4920-ac8e-90278a6e0dd6-kube-api-access-m9vnj\") pod \"nginx-deployment-845c78c8b9-n4xc2\" (UID: \"a691a961-1618-4920-ac8e-90278a6e0dd6\") " pod="default/nginx-deployment-845c78c8b9-n4xc2" Feb 13 02:43:47.302644 env[1468]: time="2024-02-13T02:43:47.302499510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-n4xc2,Uid:a691a961-1618-4920-ac8e-90278a6e0dd6,Namespace:default,Attempt:0,}" Feb 13 02:43:47.441123 systemd-networkd[1311]: cali68c203193cd: Link UP Feb 13 02:43:47.498763 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 02:43:47.498826 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali68c203193cd: link becomes ready Feb 13 02:43:47.499032 systemd-networkd[1311]: cali68c203193cd: Gained carrier Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.342 [INFO][9228] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-eth0 nginx-deployment-845c78c8b9- default a691a961-1618-4920-ac8e-90278a6e0dd6 1884 0 2024-02-13 02:43:46 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.67.80.35 nginx-deployment-845c78c8b9-n4xc2 eth0 default [] [] [kns.default ksa.default.default] cali68c203193cd [] []}} ContainerID="332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" Namespace="default" Pod="nginx-deployment-845c78c8b9-n4xc2" WorkloadEndpoint="10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-" Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.342 [INFO][9228] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" Namespace="default" Pod="nginx-deployment-845c78c8b9-n4xc2" WorkloadEndpoint="10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-eth0" Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.361 [INFO][9251] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" HandleID="k8s-pod-network.332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" Workload="10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-eth0" Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.379 [INFO][9251] ipam_plugin.go 268: Auto assigning IP ContainerID="332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" HandleID="k8s-pod-network.332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" Workload="10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5150), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.35", "pod":"nginx-deployment-845c78c8b9-n4xc2", "timestamp":"2024-02-13 02:43:47.361076976 +0000 UTC"}, Hostname:"10.67.80.35", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.379 [INFO][9251] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.379 [INFO][9251] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.379 [INFO][9251] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.35' Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.383 [INFO][9251] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" host="10.67.80.35" Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.392 [INFO][9251] ipam.go 372: Looking up existing affinities for host host="10.67.80.35" Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.402 [INFO][9251] ipam.go 489: Trying affinity for 192.168.21.192/26 host="10.67.80.35" Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.406 [INFO][9251] ipam.go 155: Attempting to load block cidr=192.168.21.192/26 host="10.67.80.35" Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.412 [INFO][9251] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.192/26 host="10.67.80.35" Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.412 [INFO][9251] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.192/26 handle="k8s-pod-network.332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" host="10.67.80.35" Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.416 [INFO][9251] ipam.go 1682: Creating new handle: k8s-pod-network.332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.423 [INFO][9251] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.192/26 handle="k8s-pod-network.332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" host="10.67.80.35" Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.433 [INFO][9251] ipam.go 1216: Successfully claimed IPs: [192.168.21.197/26] block=192.168.21.192/26 handle="k8s-pod-network.332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" host="10.67.80.35" Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.434 [INFO][9251] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.197/26] handle="k8s-pod-network.332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" host="10.67.80.35" Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.434 [INFO][9251] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:43:47.509291 env[1468]: 2024-02-13 02:43:47.434 [INFO][9251] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.197/26] IPv6=[] ContainerID="332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" HandleID="k8s-pod-network.332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" Workload="10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-eth0" Feb 13 02:43:47.510074 env[1468]: 2024-02-13 02:43:47.437 [INFO][9228] k8s.go 385: Populated endpoint ContainerID="332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" Namespace="default" Pod="nginx-deployment-845c78c8b9-n4xc2" WorkloadEndpoint="10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"a691a961-1618-4920-ac8e-90278a6e0dd6", ResourceVersion:"1884", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 43, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-n4xc2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali68c203193cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:43:47.510074 env[1468]: 2024-02-13 02:43:47.438 [INFO][9228] k8s.go 386: Calico CNI using IPs: [192.168.21.197/32] ContainerID="332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" Namespace="default" Pod="nginx-deployment-845c78c8b9-n4xc2" WorkloadEndpoint="10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-eth0" Feb 13 02:43:47.510074 env[1468]: 2024-02-13 02:43:47.438 [INFO][9228] dataplane_linux.go 68: Setting the host side veth name to cali68c203193cd ContainerID="332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" Namespace="default" Pod="nginx-deployment-845c78c8b9-n4xc2" WorkloadEndpoint="10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-eth0" Feb 13 02:43:47.510074 env[1468]: 2024-02-13 02:43:47.498 [INFO][9228] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" Namespace="default" Pod="nginx-deployment-845c78c8b9-n4xc2" WorkloadEndpoint="10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-eth0" Feb 13 02:43:47.510074 env[1468]: 2024-02-13 02:43:47.499 [INFO][9228] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" Namespace="default" Pod="nginx-deployment-845c78c8b9-n4xc2" WorkloadEndpoint="10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"a691a961-1618-4920-ac8e-90278a6e0dd6", ResourceVersion:"1884", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 43, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d", Pod:"nginx-deployment-845c78c8b9-n4xc2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.21.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali68c203193cd", MAC:"72:8d:d6:51:0f:46", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:43:47.510074 env[1468]: 2024-02-13 02:43:47.508 [INFO][9228] k8s.go 491: Wrote updated endpoint to datastore ContainerID="332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d" Namespace="default" Pod="nginx-deployment-845c78c8b9-n4xc2" WorkloadEndpoint="10.67.80.35-k8s-nginx--deployment--845c78c8b9--n4xc2-eth0" Feb 13 02:43:47.515126 env[1468]: time="2024-02-13T02:43:47.515094187Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 02:43:47.515126 env[1468]: time="2024-02-13T02:43:47.515114608Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 02:43:47.515126 env[1468]: time="2024-02-13T02:43:47.515121715Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 02:43:47.515255 env[1468]: time="2024-02-13T02:43:47.515180047Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d pid=9288 runtime=io.containerd.runc.v2 Feb 13 02:43:47.515000 audit[9299]: NETFILTER_CFG table=filter:75 family=2 entries=52 op=nft_register_chain pid=9299 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 02:43:47.524027 systemd[1]: Started cri-containerd-332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d.scope. Feb 13 02:43:47.515000 audit[9299]: SYSCALL arch=c000003e syscall=46 success=yes exit=24628 a0=3 a1=7ffef539cb40 a2=0 a3=7ffef539cb2c items=0 ppid=8989 pid=9299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:47.673050 kernel: audit: type=1325 audit(1707792227.515:830): table=filter:75 family=2 entries=52 op=nft_register_chain pid=9299 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 02:43:47.673116 kernel: audit: type=1300 audit(1707792227.515:830): arch=c000003e syscall=46 success=yes exit=24628 a0=3 a1=7ffef539cb40 a2=0 a3=7ffef539cb2c items=0 ppid=8989 pid=9299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:47.673139 kernel: audit: type=1327 audit(1707792227.515:830): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 02:43:47.515000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 02:43:47.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit: BPF prog-id=113 op=LOAD Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=9288 pid=9300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:47.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326261313363376565613665383862616262373834663465376534 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=9288 pid=9300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:47.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326261313363376565613665383862616262373834663465376534 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit: BPF prog-id=114 op=LOAD Feb 13 02:43:47.734000 audit[9300]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00037cb30 items=0 ppid=9288 pid=9300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:47.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326261313363376565613665383862616262373834663465376534 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit: BPF prog-id=115 op=LOAD Feb 13 02:43:47.734000 audit[9300]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00037cb78 items=0 ppid=9288 pid=9300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:47.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326261313363376565613665383862616262373834663465376534 Feb 13 02:43:47.734000 audit: BPF prog-id=115 op=UNLOAD Feb 13 02:43:47.734000 audit: BPF prog-id=114 op=UNLOAD Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { perfmon } for pid=9300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit[9300]: AVC avc: denied { bpf } for pid=9300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:43:47.734000 audit: BPF prog-id=116 op=LOAD Feb 13 02:43:47.734000 audit[9300]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00037cf88 items=0 ppid=9288 pid=9300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:43:47.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326261313363376565613665383862616262373834663465376534 Feb 13 02:43:47.751111 env[1468]: time="2024-02-13T02:43:47.751062945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-n4xc2,Uid:a691a961-1618-4920-ac8e-90278a6e0dd6,Namespace:default,Attempt:0,} returns sandbox id \"332ba13c7eea6e88babb784f4e7e4c1c4275ebdf1eddd37b02c3de06bf70579d\"" Feb 13 02:43:48.009615 kubelet[1871]: E0213 02:43:48.009551 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:48.650000 systemd-networkd[1311]: cali68c203193cd: Gained IPv6LL Feb 13 02:43:49.009879 kubelet[1871]: E0213 02:43:49.009771 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:50.010740 kubelet[1871]: E0213 02:43:50.010630 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:51.011497 kubelet[1871]: E0213 02:43:51.011382 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:52.012356 kubelet[1871]: E0213 02:43:52.012246 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:53.013574 kubelet[1871]: E0213 02:43:53.013457 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:54.013729 kubelet[1871]: E0213 02:43:54.013620 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:54.775309 systemd[1]: Started sshd@11-136.144.54.113:22-81.209.179.157:53382.service. Feb 13 02:43:54.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-136.144.54.113:22-81.209.179.157:53382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:54.802494 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 13 02:43:54.802565 kernel: audit: type=1130 audit(1707792234.773:849): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-136.144.54.113:22-81.209.179.157:53382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:55.014426 kubelet[1871]: E0213 02:43:55.014323 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:55.289572 sshd[9192]: kex_exchange_identification: Connection closed by remote host Feb 13 02:43:55.289572 sshd[9192]: Connection closed by 81.209.179.157 port 53312 Feb 13 02:43:55.290088 systemd[1]: sshd@10-136.144.54.113:22-81.209.179.157:53312.service: Deactivated successfully. Feb 13 02:43:55.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-136.144.54.113:22-81.209.179.157:53312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:55.380539 kernel: audit: type=1131 audit(1707792235.288:850): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-136.144.54.113:22-81.209.179.157:53312 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:55.390219 sshd[9331]: Connection closed by 81.209.179.157 port 53382 [preauth] Feb 13 02:43:55.390552 systemd[1]: sshd@11-136.144.54.113:22-81.209.179.157:53382.service: Deactivated successfully. Feb 13 02:43:55.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-136.144.54.113:22-81.209.179.157:53382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:55.479658 kernel: audit: type=1131 audit(1707792235.389:851): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-136.144.54.113:22-81.209.179.157:53382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:43:56.015175 kubelet[1871]: E0213 02:43:56.015067 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:57.016289 kubelet[1871]: E0213 02:43:57.016219 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:58.017379 kubelet[1871]: E0213 02:43:58.017313 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:59.017698 kubelet[1871]: E0213 02:43:59.017609 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:43:59.883605 kubelet[1871]: E0213 02:43:59.883533 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:00.017960 kubelet[1871]: E0213 02:44:00.017894 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:01.018585 kubelet[1871]: E0213 02:44:01.018477 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:02.019885 kubelet[1871]: E0213 02:44:02.019782 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:03.020900 kubelet[1871]: E0213 02:44:03.020784 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:04.021152 kubelet[1871]: E0213 02:44:04.021032 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:05.022026 kubelet[1871]: E0213 02:44:05.021915 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:06.022853 kubelet[1871]: E0213 02:44:06.022774 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:07.023145 kubelet[1871]: E0213 02:44:07.023036 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:08.024332 kubelet[1871]: E0213 02:44:08.024217 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:09.024897 kubelet[1871]: E0213 02:44:09.024789 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:10.025530 kubelet[1871]: E0213 02:44:10.025418 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:11.026693 kubelet[1871]: E0213 02:44:11.026578 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:12.027889 kubelet[1871]: E0213 02:44:12.027778 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:13.028878 kubelet[1871]: E0213 02:44:13.028770 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:14.029180 kubelet[1871]: E0213 02:44:14.029066 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:15.030018 kubelet[1871]: E0213 02:44:15.029907 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:16.030729 kubelet[1871]: E0213 02:44:16.030612 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:17.031119 kubelet[1871]: E0213 02:44:17.031046 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:18.031339 kubelet[1871]: E0213 02:44:18.031228 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:18.253058 systemd[1]: Started sshd@12-136.144.54.113:22-109.123.237.173:59894.service. Feb 13 02:44:18.251000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-136.144.54.113:22-109.123.237.173:59894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:18.343481 kernel: audit: type=1130 audit(1707792258.251:852): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-136.144.54.113:22-109.123.237.173:59894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:19.032101 kubelet[1871]: E0213 02:44:19.031991 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:19.192494 sshd[9403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.123.237.173 user=root Feb 13 02:44:19.191000 audit[9403]: USER_AUTH pid=9403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:44:19.282648 kernel: audit: type=1100 audit(1707792259.191:853): pid=9403 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:44:19.882902 kubelet[1871]: E0213 02:44:19.882788 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:20.033255 kubelet[1871]: E0213 02:44:20.033150 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:20.628622 sshd[9403]: Failed password for root from 109.123.237.173 port 59894 ssh2 Feb 13 02:44:21.033420 kubelet[1871]: E0213 02:44:21.033311 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:21.281755 sshd[9403]: Received disconnect from 109.123.237.173 port 59894:11: Bye Bye [preauth] Feb 13 02:44:21.281755 sshd[9403]: Disconnected from authenticating user root 109.123.237.173 port 59894 [preauth] Feb 13 02:44:21.284260 systemd[1]: sshd@12-136.144.54.113:22-109.123.237.173:59894.service: Deactivated successfully. Feb 13 02:44:21.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-136.144.54.113:22-109.123.237.173:59894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:21.375539 kernel: audit: type=1131 audit(1707792261.283:854): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-136.144.54.113:22-109.123.237.173:59894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:44:22.033790 kubelet[1871]: E0213 02:44:22.033683 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:23.033908 kubelet[1871]: E0213 02:44:23.033832 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:24.035213 kubelet[1871]: E0213 02:44:24.035101 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:25.036076 kubelet[1871]: E0213 02:44:25.035967 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:26.037350 kubelet[1871]: E0213 02:44:26.037241 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:27.038400 kubelet[1871]: E0213 02:44:27.038305 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:28.039450 kubelet[1871]: E0213 02:44:28.039329 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:29.040477 kubelet[1871]: E0213 02:44:29.040354 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:30.041149 kubelet[1871]: E0213 02:44:30.041077 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:31.041722 kubelet[1871]: E0213 02:44:31.041609 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:32.042907 kubelet[1871]: E0213 02:44:32.042789 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:33.043054 kubelet[1871]: E0213 02:44:33.042947 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:34.043944 kubelet[1871]: E0213 02:44:34.043835 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:35.044922 kubelet[1871]: E0213 02:44:35.044804 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:36.045584 kubelet[1871]: E0213 02:44:36.045508 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:37.046644 kubelet[1871]: E0213 02:44:37.046534 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:38.047376 kubelet[1871]: E0213 02:44:38.047263 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:39.048194 kubelet[1871]: E0213 02:44:39.048087 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:39.883522 kubelet[1871]: E0213 02:44:39.883410 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:40.048919 kubelet[1871]: E0213 02:44:40.048807 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:41.049735 kubelet[1871]: E0213 02:44:41.049651 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:42.050500 kubelet[1871]: E0213 02:44:42.050360 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:43.051221 kubelet[1871]: E0213 02:44:43.051103 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:44.052263 kubelet[1871]: E0213 02:44:44.052193 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:45.052498 kubelet[1871]: E0213 02:44:45.052413 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:46.052760 kubelet[1871]: E0213 02:44:46.052648 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:47.053104 kubelet[1871]: E0213 02:44:47.053036 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:48.053275 kubelet[1871]: E0213 02:44:48.053197 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:49.053492 kubelet[1871]: E0213 02:44:49.053417 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:50.053969 kubelet[1871]: E0213 02:44:50.053888 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:51.055146 kubelet[1871]: E0213 02:44:51.055074 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:52.055636 kubelet[1871]: E0213 02:44:52.055527 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:53.056491 kubelet[1871]: E0213 02:44:53.056360 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:54.056660 kubelet[1871]: E0213 02:44:54.056550 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:55.056820 kubelet[1871]: E0213 02:44:55.056739 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:56.058023 kubelet[1871]: E0213 02:44:56.057913 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:57.059019 kubelet[1871]: E0213 02:44:57.058904 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:58.059844 kubelet[1871]: E0213 02:44:58.059731 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:59.060889 kubelet[1871]: E0213 02:44:59.060782 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:59.382387 env[1468]: time="2024-02-13T02:44:59.382329736Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:44:59.382920 env[1468]: time="2024-02-13T02:44:59.382907902Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:44:59.383726 env[1468]: time="2024-02-13T02:44:59.383714351Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:44:59.384424 env[1468]: time="2024-02-13T02:44:59.384410317Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:44:59.384810 env[1468]: time="2024-02-13T02:44:59.384765064Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 13 02:44:59.385235 env[1468]: time="2024-02-13T02:44:59.385176429Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 13 02:44:59.386000 env[1468]: time="2024-02-13T02:44:59.385960016Z" level=info msg="CreateContainer within sandbox \"51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 13 02:44:59.391166 env[1468]: time="2024-02-13T02:44:59.391120427Z" level=info msg="CreateContainer within sandbox \"51ce9640006983cd28e69217bfad80c74f40b06cfa273876235489e3a31d4fc6\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"c5d54802b8660c81c32c23fdb2ffff653cf842f438a4790f9eb3651cdd53d30c\"" Feb 13 02:44:59.391433 env[1468]: time="2024-02-13T02:44:59.391422444Z" level=info msg="StartContainer for \"c5d54802b8660c81c32c23fdb2ffff653cf842f438a4790f9eb3651cdd53d30c\"" Feb 13 02:44:59.401026 systemd[1]: Started cri-containerd-c5d54802b8660c81c32c23fdb2ffff653cf842f438a4790f9eb3651cdd53d30c.scope. Feb 13 02:44:59.406000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.406000 audit[9493]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fed7c24cd58 items=0 ppid=3649 pid=9493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:44:59.568408 kernel: audit: type=1400 audit(1707792299.406:855): avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.568450 kernel: audit: type=1300 audit(1707792299.406:855): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fed7c24cd58 items=0 ppid=3649 pid=9493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:44:59.568476 kernel: audit: type=1327 audit(1707792299.406:855): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643534383032623836363063383163333263323366646232666666 Feb 13 02:44:59.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643534383032623836363063383163333263323366646232666666 Feb 13 02:44:59.571178 env[1468]: time="2024-02-13T02:44:59.571162332Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:44:59.571849 env[1468]: time="2024-02-13T02:44:59.571832896Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:44:59.572476 env[1468]: time="2024-02-13T02:44:59.572462703Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:44:59.573207 env[1468]: time="2024-02-13T02:44:59.573194772Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 13 02:44:59.573513 env[1468]: time="2024-02-13T02:44:59.573500178Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 13 02:44:59.573877 env[1468]: time="2024-02-13T02:44:59.573865794Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 13 02:44:59.574403 env[1468]: time="2024-02-13T02:44:59.574390725Z" level=info msg="CreateContainer within sandbox \"90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 13 02:44:59.406000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.723601 kernel: audit: type=1400 audit(1707792299.406:856): avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.723638 kernel: audit: type=1400 audit(1707792299.406:856): avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.406000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.406000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.849181 kernel: audit: type=1400 audit(1707792299.406:856): avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.849212 kernel: audit: type=1400 audit(1707792299.406:856): avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.406000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.850557 env[1468]: time="2024-02-13T02:44:59.850541233Z" level=info msg="CreateContainer within sandbox \"90fbd9e15bf7ba7f9b7f9f9b2a047fb4d3f1b112bec584aeeae5dc1b4850edd8\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"5442b289c17f80096b790f4e06a00545a533e5e4b36bddba627b6ec4d44819da\"" Feb 13 02:44:59.850785 env[1468]: time="2024-02-13T02:44:59.850774597Z" level=info msg="StartContainer for \"5442b289c17f80096b790f4e06a00545a533e5e4b36bddba627b6ec4d44819da\"" Feb 13 02:44:59.858124 systemd[1]: Started cri-containerd-5442b289c17f80096b790f4e06a00545a533e5e4b36bddba627b6ec4d44819da.scope. Feb 13 02:44:59.882947 kubelet[1871]: E0213 02:44:59.882936 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:59.406000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.975540 kernel: audit: type=1400 audit(1707792299.406:856): avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.975598 kernel: audit: type=1400 audit(1707792299.406:856): avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.406000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.038965 kernel: audit: type=1400 audit(1707792299.406:856): avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.406000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.045078 env[1468]: time="2024-02-13T02:45:00.045051914Z" level=info msg="StartContainer for \"c5d54802b8660c81c32c23fdb2ffff653cf842f438a4790f9eb3651cdd53d30c\" returns successfully" Feb 13 02:45:00.061122 kubelet[1871]: E0213 02:45:00.061111 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:44:59.406000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.406000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.406000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.406000 audit: BPF prog-id=117 op=LOAD Feb 13 02:44:59.406000 audit[9493]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00038fc58 items=0 ppid=3649 pid=9493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:44:59.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643534383032623836363063383163333263323366646232666666 Feb 13 02:44:59.659000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.659000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.659000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.659000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.659000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.659000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.659000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.659000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.659000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.659000 audit: BPF prog-id=118 op=LOAD Feb 13 02:44:59.659000 audit[9493]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00038fca8 items=0 ppid=3649 pid=9493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:44:59.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643534383032623836363063383163333263323366646232666666 Feb 13 02:44:59.785000 audit: BPF prog-id=118 op=UNLOAD Feb 13 02:44:59.785000 audit: BPF prog-id=117 op=UNLOAD Feb 13 02:44:59.785000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.785000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.785000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.785000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.785000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.785000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.785000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.785000 audit[9493]: AVC avc: denied { perfmon } for pid=9493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.785000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.785000 audit[9493]: AVC avc: denied { bpf } for pid=9493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.785000 audit: BPF prog-id=119 op=LOAD Feb 13 02:44:59.785000 audit[9493]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00038fd38 items=0 ppid=3649 pid=9493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:44:59.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335643534383032623836363063383163333263323366646232666666 Feb 13 02:44:59.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:44:59.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit: BPF prog-id=120 op=LOAD Feb 13 02:45:00.037000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit[9517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3993 pid=9517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:45:00.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534343262323839633137663830303936623739306634653036613030 Feb 13 02:45:00.037000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit[9517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=3993 pid=9517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:45:00.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534343262323839633137663830303936623739306634653036613030 Feb 13 02:45:00.037000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.037000 audit: BPF prog-id=121 op=LOAD Feb 13 02:45:00.037000 audit[9517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003a8400 items=0 ppid=3993 pid=9517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:45:00.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534343262323839633137663830303936623739306634653036613030 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit: BPF prog-id=122 op=LOAD Feb 13 02:45:00.101000 audit[9517]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003a8448 items=0 ppid=3993 pid=9517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:45:00.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534343262323839633137663830303936623739306634653036613030 Feb 13 02:45:00.101000 audit: BPF prog-id=122 op=UNLOAD Feb 13 02:45:00.101000 audit: BPF prog-id=121 op=UNLOAD Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { perfmon } for pid=9517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit[9517]: AVC avc: denied { bpf } for pid=9517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:45:00.101000 audit: BPF prog-id=123 op=LOAD Feb 13 02:45:00.101000 audit[9517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003a8858 items=0 ppid=3993 pid=9517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:45:00.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534343262323839633137663830303936623739306634653036613030 Feb 13 02:45:00.108398 env[1468]: time="2024-02-13T02:45:00.108378361Z" level=info msg="StartContainer for \"5442b289c17f80096b790f4e06a00545a533e5e4b36bddba627b6ec4d44819da\" returns successfully" Feb 13 02:45:00.341562 kubelet[1871]: I0213 02:45:00.341477 1871 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-rcxq6" podStartSLOduration=455.317266363 podCreationTimestamp="2024-02-13 02:34:13 +0000 UTC" firstStartedPulling="2024-02-13 02:41:47.549629012 +0000 UTC m=+67.942950151" lastFinishedPulling="2024-02-13 02:44:59.57372481 +0000 UTC m=+259.967045953" observedRunningTime="2024-02-13 02:45:00.340845462 +0000 UTC m=+260.734166676" watchObservedRunningTime="2024-02-13 02:45:00.341362165 +0000 UTC m=+260.734683363" Feb 13 02:45:00.359000 audit[9570]: NETFILTER_CFG table=filter:76 family=2 entries=8 op=nft_register_rule pid=9570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:45:00.359000 audit[9570]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff48bc1b30 a2=0 a3=7fff48bc1b1c items=0 ppid=2104 pid=9570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:45:00.359000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:45:00.363000 audit[9570]: NETFILTER_CFG table=nat:77 family=2 entries=44 op=nft_register_rule pid=9570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:45:00.363000 audit[9570]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fff48bc1b30 a2=0 a3=7fff48bc1b1c items=0 ppid=2104 pid=9570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:45:00.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:45:00.388000 audit[9572]: NETFILTER_CFG table=filter:78 family=2 entries=8 op=nft_register_rule pid=9572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:45:00.388000 audit[9572]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff8a2d3ac0 a2=0 a3=7fff8a2d3aac items=0 ppid=2104 pid=9572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:45:00.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:45:00.400000 audit[9572]: NETFILTER_CFG table=nat:79 family=2 entries=56 op=nft_register_chain pid=9572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:45:00.400000 audit[9572]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7fff8a2d3ac0 a2=0 a3=7fff8a2d3aac items=0 ppid=2104 pid=9572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:45:00.400000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:45:01.061295 kubelet[1871]: E0213 02:45:01.061220 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:02.062410 kubelet[1871]: E0213 02:45:02.062289 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:03.063152 kubelet[1871]: E0213 02:45:03.063055 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:04.063672 kubelet[1871]: E0213 02:45:04.063562 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:05.064917 kubelet[1871]: E0213 02:45:05.064807 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:06.065984 kubelet[1871]: E0213 02:45:06.065874 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:07.066886 kubelet[1871]: E0213 02:45:07.066844 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:07.624451 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount601842447.mount: Deactivated successfully. Feb 13 02:45:08.067580 kubelet[1871]: E0213 02:45:08.067449 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:09.067778 kubelet[1871]: E0213 02:45:09.067700 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:10.068865 kubelet[1871]: E0213 02:45:10.068787 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:11.069814 kubelet[1871]: E0213 02:45:11.069738 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:12.070854 kubelet[1871]: E0213 02:45:12.070773 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:13.071212 kubelet[1871]: E0213 02:45:13.071137 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:14.072500 kubelet[1871]: E0213 02:45:14.072364 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:15.073615 kubelet[1871]: E0213 02:45:15.073541 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:15.353952 systemd[1]: Started sshd@13-136.144.54.113:22-116.162.149.176:57860.service. Feb 13 02:45:15.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-136.144.54.113:22-116.162.149.176:57860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:15.382005 kernel: kauditd_printk_skb: 102 callbacks suppressed Feb 13 02:45:15.382075 kernel: audit: type=1130 audit(1707792315.352:883): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-136.144.54.113:22-116.162.149.176:57860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:16.074878 kubelet[1871]: E0213 02:45:16.074794 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:16.373285 sshd[9618]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.162.149.176 user=root Feb 13 02:45:16.371000 audit[9618]: USER_AUTH pid=9618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=116.162.149.176 addr=116.162.149.176 terminal=ssh res=failed' Feb 13 02:45:16.465646 kernel: audit: type=1100 audit(1707792316.371:884): pid=9618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=116.162.149.176 addr=116.162.149.176 terminal=ssh res=failed' Feb 13 02:45:17.075534 kubelet[1871]: E0213 02:45:17.075449 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:18.076018 kubelet[1871]: E0213 02:45:18.075936 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:18.637726 sshd[9618]: Failed password for root from 116.162.149.176 port 57860 ssh2 Feb 13 02:45:19.076175 kubelet[1871]: E0213 02:45:19.076102 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:19.883627 kubelet[1871]: E0213 02:45:19.883512 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:20.076648 kubelet[1871]: E0213 02:45:20.076546 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:20.419318 sshd[9618]: Received disconnect from 116.162.149.176 port 57860:11: Bye Bye [preauth] Feb 13 02:45:20.419318 sshd[9618]: Disconnected from authenticating user root 116.162.149.176 port 57860 [preauth] Feb 13 02:45:20.421962 systemd[1]: sshd@13-136.144.54.113:22-116.162.149.176:57860.service: Deactivated successfully. Feb 13 02:45:20.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-136.144.54.113:22-116.162.149.176:57860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:20.515524 kernel: audit: type=1131 audit(1707792320.421:885): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-136.144.54.113:22-116.162.149.176:57860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:21.077571 kubelet[1871]: E0213 02:45:21.077487 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:22.077932 kubelet[1871]: E0213 02:45:22.077822 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:23.078930 kubelet[1871]: E0213 02:45:23.078817 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:24.079988 kubelet[1871]: E0213 02:45:24.079917 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:25.080451 kubelet[1871]: E0213 02:45:25.080381 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:26.080829 kubelet[1871]: E0213 02:45:26.080747 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:27.081509 kubelet[1871]: E0213 02:45:27.081382 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:27.194032 systemd[1]: Started sshd@14-136.144.54.113:22-109.123.237.173:59968.service. Feb 13 02:45:27.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-136.144.54.113:22-109.123.237.173:59968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:27.287664 kernel: audit: type=1130 audit(1707792327.192:886): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-136.144.54.113:22-109.123.237.173:59968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:28.082498 kubelet[1871]: E0213 02:45:28.082368 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:28.143003 sshd[9645]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.123.237.173 user=root Feb 13 02:45:28.141000 audit[9645]: USER_AUTH pid=9645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:45:28.235541 kernel: audit: type=1100 audit(1707792328.141:887): pid=9645 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:45:29.083245 kubelet[1871]: E0213 02:45:29.083139 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:30.084273 kubelet[1871]: E0213 02:45:30.084166 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:30.387859 sshd[9645]: Failed password for root from 109.123.237.173 port 59968 ssh2 Feb 13 02:45:31.084526 kubelet[1871]: E0213 02:45:31.084400 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:32.085195 kubelet[1871]: E0213 02:45:32.085118 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:32.165941 sshd[9645]: Received disconnect from 109.123.237.173 port 59968:11: Bye Bye [preauth] Feb 13 02:45:32.165941 sshd[9645]: Disconnected from authenticating user root 109.123.237.173 port 59968 [preauth] Feb 13 02:45:32.168576 systemd[1]: sshd@14-136.144.54.113:22-109.123.237.173:59968.service: Deactivated successfully. Feb 13 02:45:32.167000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-136.144.54.113:22-109.123.237.173:59968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:32.261655 kernel: audit: type=1131 audit(1707792332.167:888): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-136.144.54.113:22-109.123.237.173:59968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:33.085355 kubelet[1871]: E0213 02:45:33.085252 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:34.086439 kubelet[1871]: E0213 02:45:34.086326 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:35.087012 kubelet[1871]: E0213 02:45:35.086906 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:36.087407 kubelet[1871]: E0213 02:45:36.087388 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:37.088411 kubelet[1871]: E0213 02:45:37.088305 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:38.089694 kubelet[1871]: E0213 02:45:38.089582 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:39.089905 kubelet[1871]: E0213 02:45:39.089798 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:39.883215 kubelet[1871]: E0213 02:45:39.883115 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:40.090160 kubelet[1871]: E0213 02:45:40.090043 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:41.090943 kubelet[1871]: E0213 02:45:41.090835 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:42.092058 kubelet[1871]: E0213 02:45:42.091941 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:43.093076 kubelet[1871]: E0213 02:45:43.093011 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:44.094042 kubelet[1871]: E0213 02:45:44.093930 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:45.094866 kubelet[1871]: E0213 02:45:45.094755 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:46.055431 systemd[1]: Started sshd@15-136.144.54.113:22-43.156.2.26:34796.service. Feb 13 02:45:46.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-136.144.54.113:22-43.156.2.26:34796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:46.094907 kubelet[1871]: E0213 02:45:46.094885 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:46.148664 kernel: audit: type=1130 audit(1707792346.054:889): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-136.144.54.113:22-43.156.2.26:34796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:47.096209 kubelet[1871]: E0213 02:45:47.096098 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:47.158558 sshd[9708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.156.2.26 user=root Feb 13 02:45:47.157000 audit[9708]: USER_AUTH pid=9708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.2.26 addr=43.156.2.26 terminal=ssh res=failed' Feb 13 02:45:47.250631 kernel: audit: type=1100 audit(1707792347.157:890): pid=9708 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=43.156.2.26 addr=43.156.2.26 terminal=ssh res=failed' Feb 13 02:45:48.097241 kubelet[1871]: E0213 02:45:48.097139 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:49.012104 sshd[9708]: Failed password for root from 43.156.2.26 port 34796 ssh2 Feb 13 02:45:49.098189 kubelet[1871]: E0213 02:45:49.098076 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:49.279267 sshd[9708]: Received disconnect from 43.156.2.26 port 34796:11: Bye Bye [preauth] Feb 13 02:45:49.279267 sshd[9708]: Disconnected from authenticating user root 43.156.2.26 port 34796 [preauth] Feb 13 02:45:49.281788 systemd[1]: sshd@15-136.144.54.113:22-43.156.2.26:34796.service: Deactivated successfully. Feb 13 02:45:49.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-136.144.54.113:22-43.156.2.26:34796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:49.374678 kernel: audit: type=1131 audit(1707792349.280:891): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-136.144.54.113:22-43.156.2.26:34796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:45:50.098921 kubelet[1871]: E0213 02:45:50.098817 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:51.099019 kubelet[1871]: E0213 02:45:51.098932 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:52.100265 kubelet[1871]: E0213 02:45:52.100156 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:53.100733 kubelet[1871]: E0213 02:45:53.100614 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:54.101093 kubelet[1871]: E0213 02:45:54.100982 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:55.101527 kubelet[1871]: E0213 02:45:55.101418 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:56.102607 kubelet[1871]: E0213 02:45:56.102501 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:57.103879 kubelet[1871]: E0213 02:45:57.103765 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:58.105095 kubelet[1871]: E0213 02:45:58.104987 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:59.105865 kubelet[1871]: E0213 02:45:59.105756 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:45:59.883685 kubelet[1871]: E0213 02:45:59.883575 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:00.106011 kubelet[1871]: E0213 02:46:00.105905 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:01.106729 kubelet[1871]: E0213 02:46:01.106619 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:02.107596 kubelet[1871]: E0213 02:46:02.107487 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:03.107911 kubelet[1871]: E0213 02:46:03.107804 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:04.108667 kubelet[1871]: E0213 02:46:04.108555 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:05.109738 kubelet[1871]: E0213 02:46:05.109634 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:06.110114 kubelet[1871]: E0213 02:46:06.110071 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:07.110853 kubelet[1871]: E0213 02:46:07.110787 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:08.111735 kubelet[1871]: E0213 02:46:08.111630 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:09.112395 kubelet[1871]: E0213 02:46:09.112287 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:10.112722 kubelet[1871]: E0213 02:46:10.112581 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:11.112955 kubelet[1871]: E0213 02:46:11.112802 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:12.113166 kubelet[1871]: E0213 02:46:12.113057 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:13.114401 kubelet[1871]: E0213 02:46:13.114298 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:14.115596 kubelet[1871]: E0213 02:46:14.115493 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:15.116512 kubelet[1871]: E0213 02:46:15.116432 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:16.117371 kubelet[1871]: E0213 02:46:16.117313 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:17.117619 kubelet[1871]: E0213 02:46:17.117452 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:18.117844 kubelet[1871]: E0213 02:46:18.117736 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:19.118754 kubelet[1871]: E0213 02:46:19.118649 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:19.882980 kubelet[1871]: E0213 02:46:19.882874 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:20.119752 kubelet[1871]: E0213 02:46:20.119676 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:21.120812 kubelet[1871]: E0213 02:46:21.120702 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:22.121066 kubelet[1871]: E0213 02:46:22.120928 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:23.121915 kubelet[1871]: E0213 02:46:23.121812 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:24.122332 kubelet[1871]: E0213 02:46:24.122229 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:25.123392 kubelet[1871]: E0213 02:46:25.123300 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:26.124254 kubelet[1871]: E0213 02:46:26.124151 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:27.124583 kubelet[1871]: E0213 02:46:27.124518 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:28.125036 kubelet[1871]: E0213 02:46:28.124930 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:29.125793 kubelet[1871]: E0213 02:46:29.125688 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:30.126525 kubelet[1871]: E0213 02:46:30.126416 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:31.127579 kubelet[1871]: E0213 02:46:31.127508 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:32.128757 kubelet[1871]: E0213 02:46:32.128654 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:33.129710 kubelet[1871]: E0213 02:46:33.129593 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:34.130758 kubelet[1871]: E0213 02:46:34.130653 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:35.131438 kubelet[1871]: E0213 02:46:35.131314 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:36.131787 kubelet[1871]: E0213 02:46:36.131741 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:37.132765 kubelet[1871]: E0213 02:46:37.132654 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:38.133315 kubelet[1871]: E0213 02:46:38.133206 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:38.410075 systemd[1]: Started sshd@16-136.144.54.113:22-109.123.237.173:60048.service. Feb 13 02:46:38.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-136.144.54.113:22-109.123.237.173:60048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:38.503534 kernel: audit: type=1130 audit(1707792398.409:892): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-136.144.54.113:22-109.123.237.173:60048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:39.134334 kubelet[1871]: E0213 02:46:39.134233 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:39.370445 sshd[9839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.123.237.173 user=root Feb 13 02:46:39.370000 audit[9839]: USER_AUTH pid=9839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:46:39.463656 kernel: audit: type=1100 audit(1707792399.370:893): pid=9839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:46:39.883694 kubelet[1871]: E0213 02:46:39.883582 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:40.135516 kubelet[1871]: E0213 02:46:40.135316 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:41.136003 kubelet[1871]: E0213 02:46:41.135896 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:41.358799 sshd[9839]: Failed password for root from 109.123.237.173 port 60048 ssh2 Feb 13 02:46:42.137021 kubelet[1871]: E0213 02:46:42.136907 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:43.137588 kubelet[1871]: E0213 02:46:43.137529 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:43.395616 sshd[9839]: Received disconnect from 109.123.237.173 port 60048:11: Bye Bye [preauth] Feb 13 02:46:43.395616 sshd[9839]: Disconnected from authenticating user root 109.123.237.173 port 60048 [preauth] Feb 13 02:46:43.398144 systemd[1]: sshd@16-136.144.54.113:22-109.123.237.173:60048.service: Deactivated successfully. Feb 13 02:46:43.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-136.144.54.113:22-109.123.237.173:60048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:43.492675 kernel: audit: type=1131 audit(1707792403.398:894): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-136.144.54.113:22-109.123.237.173:60048 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:46:44.138100 kubelet[1871]: E0213 02:46:44.137996 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:45.139147 kubelet[1871]: E0213 02:46:45.139028 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:46.140265 kubelet[1871]: E0213 02:46:46.140193 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:47.141550 kubelet[1871]: E0213 02:46:47.141428 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:48.142201 kubelet[1871]: E0213 02:46:48.142082 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:49.143445 kubelet[1871]: E0213 02:46:49.143336 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:50.143869 kubelet[1871]: E0213 02:46:50.143755 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:51.144613 kubelet[1871]: E0213 02:46:51.144509 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:52.145683 kubelet[1871]: E0213 02:46:52.145564 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:53.051000 audit[9879]: NETFILTER_CFG table=filter:80 family=2 entries=20 op=nft_register_rule pid=9879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:46:53.062800 kubelet[1871]: I0213 02:46:53.062786 1871 topology_manager.go:212] "Topology Admit Handler" Feb 13 02:46:53.066128 systemd[1]: Created slice kubepods-besteffort-podcdd734ab_7e3c_4fa3_af13_9d5568577fb7.slice. Feb 13 02:46:53.051000 audit[9879]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd84979420 a2=0 a3=7ffd8497940c items=0 ppid=2104 pid=9879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:46:53.135372 kubelet[1871]: I0213 02:46:53.135362 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d2wf8\" (UniqueName: \"kubernetes.io/projected/cdd734ab-7e3c-4fa3-af13-9d5568577fb7-kube-api-access-d2wf8\") pod \"nfs-server-provisioner-0\" (UID: \"cdd734ab-7e3c-4fa3-af13-9d5568577fb7\") " pod="default/nfs-server-provisioner-0" Feb 13 02:46:53.135432 kubelet[1871]: I0213 02:46:53.135382 1871 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/cdd734ab-7e3c-4fa3-af13-9d5568577fb7-data\") pod \"nfs-server-provisioner-0\" (UID: \"cdd734ab-7e3c-4fa3-af13-9d5568577fb7\") " pod="default/nfs-server-provisioner-0" Feb 13 02:46:53.146596 kubelet[1871]: E0213 02:46:53.146564 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:53.212746 kernel: audit: type=1325 audit(1707792413.051:895): table=filter:80 family=2 entries=20 op=nft_register_rule pid=9879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:46:53.212785 kernel: audit: type=1300 audit(1707792413.051:895): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd84979420 a2=0 a3=7ffd8497940c items=0 ppid=2104 pid=9879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:46:53.212804 kernel: audit: type=1327 audit(1707792413.051:895): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:46:53.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:46:53.281000 audit[9879]: NETFILTER_CFG table=nat:81 family=2 entries=20 op=nft_register_rule pid=9879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:46:53.281000 audit[9879]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd84979420 a2=0 a3=31030 items=0 ppid=2104 pid=9879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:46:53.368109 env[1468]: time="2024-02-13T02:46:53.368058677Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:cdd734ab-7e3c-4fa3-af13-9d5568577fb7,Namespace:default,Attempt:0,}" Feb 13 02:46:53.433075 systemd-networkd[1311]: cali60e51b789ff: Link UP Feb 13 02:46:53.440336 kernel: audit: type=1325 audit(1707792413.281:896): table=nat:81 family=2 entries=20 op=nft_register_rule pid=9879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:46:53.440371 kernel: audit: type=1300 audit(1707792413.281:896): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd84979420 a2=0 a3=31030 items=0 ppid=2104 pid=9879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:46:53.440389 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 13 02:46:53.440402 kernel: audit: type=1327 audit(1707792413.281:896): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:46:53.281000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:46:53.468518 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 13 02:46:53.556817 systemd-networkd[1311]: cali60e51b789ff: Gained carrier Feb 13 02:46:53.566000 audit[9921]: NETFILTER_CFG table=filter:82 family=2 entries=32 op=nft_register_rule pid=9921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.389 [INFO][9882] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.67.80.35-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default cdd734ab-7e3c-4fa3-af13-9d5568577fb7 2304 0 2024-02-13 02:46:53 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.67.80.35 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.35-k8s-nfs--server--provisioner--0-" Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.389 [INFO][9882] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.35-k8s-nfs--server--provisioner--0-eth0" Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.402 [INFO][9904] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" HandleID="k8s-pod-network.fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" Workload="10.67.80.35-k8s-nfs--server--provisioner--0-eth0" Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.410 [INFO][9904] ipam_plugin.go 268: Auto assigning IP ContainerID="fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" HandleID="k8s-pod-network.fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" Workload="10.67.80.35-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000125cc0), Attrs:map[string]string{"namespace":"default", "node":"10.67.80.35", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-13 02:46:53.402562187 +0000 UTC"}, Hostname:"10.67.80.35", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.410 [INFO][9904] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.410 [INFO][9904] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.410 [INFO][9904] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.67.80.35' Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.411 [INFO][9904] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" host="10.67.80.35" Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.414 [INFO][9904] ipam.go 372: Looking up existing affinities for host host="10.67.80.35" Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.418 [INFO][9904] ipam.go 489: Trying affinity for 192.168.21.192/26 host="10.67.80.35" Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.420 [INFO][9904] ipam.go 155: Attempting to load block cidr=192.168.21.192/26 host="10.67.80.35" Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.422 [INFO][9904] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.21.192/26 host="10.67.80.35" Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.422 [INFO][9904] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.21.192/26 handle="k8s-pod-network.fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" host="10.67.80.35" Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.423 [INFO][9904] ipam.go 1682: Creating new handle: k8s-pod-network.fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.426 [INFO][9904] ipam.go 1203: Writing block in order to claim IPs block=192.168.21.192/26 handle="k8s-pod-network.fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" host="10.67.80.35" Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.431 [INFO][9904] ipam.go 1216: Successfully claimed IPs: [192.168.21.198/26] block=192.168.21.192/26 handle="k8s-pod-network.fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" host="10.67.80.35" Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.431 [INFO][9904] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.21.198/26] handle="k8s-pod-network.fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" host="10.67.80.35" Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.431 [INFO][9904] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 13 02:46:53.576572 env[1468]: 2024-02-13 02:46:53.431 [INFO][9904] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.21.198/26] IPv6=[] ContainerID="fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" HandleID="k8s-pod-network.fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" Workload="10.67.80.35-k8s-nfs--server--provisioner--0-eth0" Feb 13 02:46:53.577000 env[1468]: 2024-02-13 02:46:53.432 [INFO][9882] k8s.go 385: Populated endpoint ContainerID="fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.35-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"cdd734ab-7e3c-4fa3-af13-9d5568577fb7", ResourceVersion:"2304", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 46, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.21.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:46:53.577000 env[1468]: 2024-02-13 02:46:53.432 [INFO][9882] k8s.go 386: Calico CNI using IPs: [192.168.21.198/32] ContainerID="fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.35-k8s-nfs--server--provisioner--0-eth0" Feb 13 02:46:53.577000 env[1468]: 2024-02-13 02:46:53.432 [INFO][9882] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.35-k8s-nfs--server--provisioner--0-eth0" Feb 13 02:46:53.577000 env[1468]: 2024-02-13 02:46:53.556 [INFO][9882] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.35-k8s-nfs--server--provisioner--0-eth0" Feb 13 02:46:53.577116 env[1468]: 2024-02-13 02:46:53.562 [INFO][9882] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.35-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.67.80.35-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"cdd734ab-7e3c-4fa3-af13-9d5568577fb7", ResourceVersion:"2304", Generation:0, CreationTimestamp:time.Date(2024, time.February, 13, 2, 46, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.67.80.35", ContainerID:"fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.21.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"b2:9b:14:fb:9b:9b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 13 02:46:53.577116 env[1468]: 2024-02-13 02:46:53.575 [INFO][9882] k8s.go 491: Wrote updated endpoint to datastore ContainerID="fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.67.80.35-k8s-nfs--server--provisioner--0-eth0" Feb 13 02:46:53.581873 env[1468]: time="2024-02-13T02:46:53.581805612Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 13 02:46:53.581873 env[1468]: time="2024-02-13T02:46:53.581831047Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 13 02:46:53.581873 env[1468]: time="2024-02-13T02:46:53.581839977Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 13 02:46:53.581994 env[1468]: time="2024-02-13T02:46:53.581895862Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f pid=9944 runtime=io.containerd.runc.v2 Feb 13 02:46:53.588135 systemd[1]: Started cri-containerd-fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f.scope. Feb 13 02:46:53.566000 audit[9921]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc8fdfbff0 a2=0 a3=7ffc8fdfbfdc items=0 ppid=2104 pid=9921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:46:53.724840 kernel: audit: type=1325 audit(1707792413.566:897): table=filter:82 family=2 entries=32 op=nft_register_rule pid=9921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:46:53.724899 kernel: audit: type=1300 audit(1707792413.566:897): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc8fdfbff0 a2=0 a3=7ffc8fdfbfdc items=0 ppid=2104 pid=9921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:46:53.724921 kernel: audit: type=1327 audit(1707792413.566:897): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:46:53.566000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:46:53.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847536 kernel: audit: type=1400 audit(1707792413.633:898): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit: BPF prog-id=124 op=LOAD Feb 13 02:46:53.783000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit[9955]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=9944 pid=9955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:46:53.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661306364666161643538326264386334346236366461303438333164 Feb 13 02:46:53.783000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit[9955]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=9944 pid=9955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:46:53.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661306364666161643538326264386334346236366461303438333164 Feb 13 02:46:53.783000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.783000 audit: BPF prog-id=125 op=LOAD Feb 13 02:46:53.783000 audit[9955]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323a50 items=0 ppid=9944 pid=9955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:46:53.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661306364666161643538326264386334346236366461303438333164 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit: BPF prog-id=126 op=LOAD Feb 13 02:46:53.847000 audit[9955]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000323a98 items=0 ppid=9944 pid=9955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:46:53.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661306364666161643538326264386334346236366461303438333164 Feb 13 02:46:53.847000 audit: BPF prog-id=126 op=UNLOAD Feb 13 02:46:53.847000 audit: BPF prog-id=125 op=UNLOAD Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { perfmon } for pid=9955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit[9955]: AVC avc: denied { bpf } for pid=9955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 13 02:46:53.847000 audit: BPF prog-id=127 op=LOAD Feb 13 02:46:53.847000 audit[9955]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000323ea8 items=0 ppid=9944 pid=9955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:46:53.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661306364666161643538326264386334346236366461303438333164 Feb 13 02:46:53.850000 audit[9921]: NETFILTER_CFG table=nat:83 family=2 entries=20 op=nft_register_rule pid=9921 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 13 02:46:53.850000 audit[9921]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc8fdfbff0 a2=0 a3=31030 items=0 ppid=2104 pid=9921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:46:53.850000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 13 02:46:53.863219 env[1468]: time="2024-02-13T02:46:53.863187202Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:cdd734ab-7e3c-4fa3-af13-9d5568577fb7,Namespace:default,Attempt:0,} returns sandbox id \"fa0cdfaad582bd8c44b66da04831dce81650e52fb68a097705668742c71b3b2f\"" Feb 13 02:46:53.865000 audit[9978]: NETFILTER_CFG table=filter:84 family=2 entries=56 op=nft_register_chain pid=9978 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 13 02:46:53.865000 audit[9978]: SYSCALL arch=c000003e syscall=46 success=yes exit=25916 a0=3 a1=7ffeb50a0b00 a2=0 a3=7ffeb50a0aec items=0 ppid=8989 pid=9978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 13 02:46:53.865000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 13 02:46:54.147835 kubelet[1871]: E0213 02:46:54.147734 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:54.825959 systemd-networkd[1311]: cali60e51b789ff: Gained IPv6LL Feb 13 02:46:55.148730 kubelet[1871]: E0213 02:46:55.148506 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:56.148822 kubelet[1871]: E0213 02:46:56.148708 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:57.149887 kubelet[1871]: E0213 02:46:57.149773 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:58.150866 kubelet[1871]: E0213 02:46:58.150753 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:59.151564 kubelet[1871]: E0213 02:46:59.151419 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:46:59.882989 kubelet[1871]: E0213 02:46:59.882879 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:00.151865 kubelet[1871]: E0213 02:47:00.151645 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:01.152749 kubelet[1871]: E0213 02:47:01.152636 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:02.153376 kubelet[1871]: E0213 02:47:02.153270 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:03.154351 kubelet[1871]: E0213 02:47:03.154236 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:04.154795 kubelet[1871]: E0213 02:47:04.154682 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:05.155051 kubelet[1871]: E0213 02:47:05.154931 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:06.156131 kubelet[1871]: E0213 02:47:06.156024 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:07.156950 kubelet[1871]: E0213 02:47:07.156878 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:08.157203 kubelet[1871]: E0213 02:47:08.157098 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:09.157348 kubelet[1871]: E0213 02:47:09.157241 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:10.157949 kubelet[1871]: E0213 02:47:10.157836 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:11.158791 kubelet[1871]: E0213 02:47:11.158675 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:12.160017 kubelet[1871]: E0213 02:47:12.159909 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:13.161130 kubelet[1871]: E0213 02:47:13.161009 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:14.161868 kubelet[1871]: E0213 02:47:14.161752 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:15.162318 kubelet[1871]: E0213 02:47:15.162210 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:16.162646 kubelet[1871]: E0213 02:47:16.162534 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:17.163336 kubelet[1871]: E0213 02:47:17.163276 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:18.164343 kubelet[1871]: E0213 02:47:18.164230 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:19.165111 kubelet[1871]: E0213 02:47:19.165037 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:19.883411 kubelet[1871]: E0213 02:47:19.883300 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:20.166234 kubelet[1871]: E0213 02:47:20.165989 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:21.167150 kubelet[1871]: E0213 02:47:21.167033 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:22.168337 kubelet[1871]: E0213 02:47:22.168216 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:23.169214 kubelet[1871]: E0213 02:47:23.169105 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:24.169490 kubelet[1871]: E0213 02:47:24.169351 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:25.169712 kubelet[1871]: E0213 02:47:25.169600 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:26.170326 kubelet[1871]: E0213 02:47:26.170258 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:27.171505 kubelet[1871]: E0213 02:47:27.171365 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:28.172103 kubelet[1871]: E0213 02:47:28.171989 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:29.173306 kubelet[1871]: E0213 02:47:29.173193 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:30.174126 kubelet[1871]: E0213 02:47:30.174013 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:31.175132 kubelet[1871]: E0213 02:47:31.175048 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:32.176185 kubelet[1871]: E0213 02:47:32.176116 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:33.176531 kubelet[1871]: E0213 02:47:33.176408 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:34.177246 kubelet[1871]: E0213 02:47:34.177140 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:35.178321 kubelet[1871]: E0213 02:47:35.178215 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:36.179419 kubelet[1871]: E0213 02:47:36.179376 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:37.180295 kubelet[1871]: E0213 02:47:37.180224 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:38.180975 kubelet[1871]: E0213 02:47:38.180906 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:39.182036 kubelet[1871]: E0213 02:47:39.181920 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:39.883157 kubelet[1871]: E0213 02:47:39.883046 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:40.183338 kubelet[1871]: E0213 02:47:40.183116 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:41.184238 kubelet[1871]: E0213 02:47:41.184126 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:42.185457 kubelet[1871]: E0213 02:47:42.185385 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:43.185706 kubelet[1871]: E0213 02:47:43.185632 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:44.186109 kubelet[1871]: E0213 02:47:44.185990 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:45.186417 kubelet[1871]: E0213 02:47:45.186305 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:46.187559 kubelet[1871]: E0213 02:47:46.187434 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:47.188171 kubelet[1871]: E0213 02:47:47.188098 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:47.665793 systemd[1]: Started sshd@17-136.144.54.113:22-109.123.237.173:60120.service. Feb 13 02:47:47.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-136.144.54.113:22-109.123.237.173:60120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:47.693637 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 13 02:47:47.693728 kernel: audit: type=1130 audit(1707792467.665:918): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-136.144.54.113:22-109.123.237.173:60120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:48.189152 kubelet[1871]: E0213 02:47:48.189048 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:48.621366 sshd[10108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.123.237.173 user=root Feb 13 02:47:48.621000 audit[10108]: USER_AUTH pid=10108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:47:48.712668 kernel: audit: type=1100 audit(1707792468.621:919): pid=10108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:47:49.189321 kubelet[1871]: E0213 02:47:49.189219 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:50.190038 kubelet[1871]: E0213 02:47:50.189929 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:50.419666 sshd[10108]: Failed password for root from 109.123.237.173 port 60120 ssh2 Feb 13 02:47:50.715695 sshd[10108]: Received disconnect from 109.123.237.173 port 60120:11: Bye Bye [preauth] Feb 13 02:47:50.715695 sshd[10108]: Disconnected from authenticating user root 109.123.237.173 port 60120 [preauth] Feb 13 02:47:50.718255 systemd[1]: sshd@17-136.144.54.113:22-109.123.237.173:60120.service: Deactivated successfully. Feb 13 02:47:50.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-136.144.54.113:22-109.123.237.173:60120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:50.811465 kernel: audit: type=1131 audit(1707792470.718:920): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-136.144.54.113:22-109.123.237.173:60120 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:47:51.191255 kubelet[1871]: E0213 02:47:51.191152 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:52.191569 kubelet[1871]: E0213 02:47:52.191317 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:53.192047 kubelet[1871]: E0213 02:47:53.191934 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:54.193180 kubelet[1871]: E0213 02:47:54.193068 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:55.193600 kubelet[1871]: E0213 02:47:55.193487 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:56.194435 kubelet[1871]: E0213 02:47:56.194325 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:57.195435 kubelet[1871]: E0213 02:47:57.195316 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:58.196578 kubelet[1871]: E0213 02:47:58.196495 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:59.197892 kubelet[1871]: E0213 02:47:59.197780 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:47:59.883316 kubelet[1871]: E0213 02:47:59.883204 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:00.199018 kubelet[1871]: E0213 02:48:00.198788 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:01.199280 kubelet[1871]: E0213 02:48:01.199176 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:02.199596 kubelet[1871]: E0213 02:48:02.199484 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:03.199755 kubelet[1871]: E0213 02:48:03.199639 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:04.200066 kubelet[1871]: E0213 02:48:04.199956 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:05.200651 kubelet[1871]: E0213 02:48:05.200543 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:06.201588 kubelet[1871]: E0213 02:48:06.201483 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:07.202249 kubelet[1871]: E0213 02:48:07.202144 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:08.203247 kubelet[1871]: E0213 02:48:08.203142 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:09.203616 kubelet[1871]: E0213 02:48:09.203505 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:10.203751 kubelet[1871]: E0213 02:48:10.203643 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:11.204759 kubelet[1871]: E0213 02:48:11.204647 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:12.205862 kubelet[1871]: E0213 02:48:12.205747 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:13.206901 kubelet[1871]: E0213 02:48:13.206792 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:14.208087 kubelet[1871]: E0213 02:48:14.207976 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:15.209073 kubelet[1871]: E0213 02:48:15.208958 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:16.209883 kubelet[1871]: E0213 02:48:16.209807 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:17.210571 kubelet[1871]: E0213 02:48:17.210497 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:18.211852 kubelet[1871]: E0213 02:48:18.211740 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:19.212733 kubelet[1871]: E0213 02:48:19.212635 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:19.883019 kubelet[1871]: E0213 02:48:19.882912 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:20.213619 kubelet[1871]: E0213 02:48:20.213374 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:21.214773 kubelet[1871]: E0213 02:48:21.214673 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:22.215670 kubelet[1871]: E0213 02:48:22.215558 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:23.216098 kubelet[1871]: E0213 02:48:23.215976 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:24.216438 kubelet[1871]: E0213 02:48:24.216325 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:25.217336 kubelet[1871]: E0213 02:48:25.217267 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:26.218289 kubelet[1871]: E0213 02:48:26.218169 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:27.219349 kubelet[1871]: E0213 02:48:27.219236 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:28.219724 kubelet[1871]: E0213 02:48:28.219645 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:29.220492 kubelet[1871]: E0213 02:48:29.220373 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:30.221253 kubelet[1871]: E0213 02:48:30.221175 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:31.222450 kubelet[1871]: E0213 02:48:31.222335 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:32.222647 kubelet[1871]: E0213 02:48:32.222531 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:33.223391 kubelet[1871]: E0213 02:48:33.223270 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:34.224581 kubelet[1871]: E0213 02:48:34.224449 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:35.224733 kubelet[1871]: E0213 02:48:35.224623 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:36.224975 kubelet[1871]: E0213 02:48:36.224863 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:37.225963 kubelet[1871]: E0213 02:48:37.225852 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:38.227011 kubelet[1871]: E0213 02:48:38.226960 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:39.227717 kubelet[1871]: E0213 02:48:39.227610 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:39.883846 kubelet[1871]: E0213 02:48:39.883760 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:40.228887 kubelet[1871]: E0213 02:48:40.228671 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:41.229501 kubelet[1871]: E0213 02:48:41.229373 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:42.230520 kubelet[1871]: E0213 02:48:42.230407 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:43.231347 kubelet[1871]: E0213 02:48:43.231243 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:44.232401 kubelet[1871]: E0213 02:48:44.232285 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:45.233604 kubelet[1871]: E0213 02:48:45.233526 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:46.234095 kubelet[1871]: E0213 02:48:46.233989 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:47.234690 kubelet[1871]: E0213 02:48:47.234616 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:48.235750 kubelet[1871]: E0213 02:48:48.235638 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:49.236443 kubelet[1871]: E0213 02:48:49.236326 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:50.236716 kubelet[1871]: E0213 02:48:50.236587 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:51.237828 kubelet[1871]: E0213 02:48:51.237721 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:52.238613 kubelet[1871]: E0213 02:48:52.238500 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:52.914106 update_engine[1460]: I0213 02:48:52.913995 1460 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 13 02:48:52.914106 update_engine[1460]: I0213 02:48:52.914073 1460 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 13 02:48:52.915814 update_engine[1460]: I0213 02:48:52.915733 1460 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 13 02:48:52.916720 update_engine[1460]: I0213 02:48:52.916635 1460 omaha_request_params.cc:62] Current group set to lts Feb 13 02:48:52.917021 update_engine[1460]: I0213 02:48:52.916913 1460 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 13 02:48:52.917021 update_engine[1460]: I0213 02:48:52.916931 1460 update_attempter.cc:643] Scheduling an action processor start. Feb 13 02:48:52.917021 update_engine[1460]: I0213 02:48:52.916962 1460 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 02:48:52.917331 update_engine[1460]: I0213 02:48:52.917025 1460 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 13 02:48:52.917331 update_engine[1460]: I0213 02:48:52.917162 1460 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 02:48:52.917331 update_engine[1460]: I0213 02:48:52.917179 1460 omaha_request_action.cc:271] Request: Feb 13 02:48:52.917331 update_engine[1460]: Feb 13 02:48:52.917331 update_engine[1460]: Feb 13 02:48:52.917331 update_engine[1460]: Feb 13 02:48:52.917331 update_engine[1460]: Feb 13 02:48:52.917331 update_engine[1460]: Feb 13 02:48:52.917331 update_engine[1460]: Feb 13 02:48:52.917331 update_engine[1460]: Feb 13 02:48:52.917331 update_engine[1460]: Feb 13 02:48:52.917331 update_engine[1460]: I0213 02:48:52.917191 1460 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 02:48:52.918509 locksmithd[1507]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 13 02:48:52.920314 update_engine[1460]: I0213 02:48:52.920233 1460 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 02:48:52.920553 update_engine[1460]: E0213 02:48:52.920482 1460 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 02:48:52.920696 update_engine[1460]: I0213 02:48:52.920671 1460 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 13 02:48:53.239116 kubelet[1871]: E0213 02:48:53.238901 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:54.240017 kubelet[1871]: E0213 02:48:54.239908 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:55.240833 kubelet[1871]: E0213 02:48:55.240730 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:56.241712 kubelet[1871]: E0213 02:48:56.241645 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:57.242062 kubelet[1871]: E0213 02:48:57.241944 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:58.242172 kubelet[1871]: E0213 02:48:58.242096 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:59.243151 kubelet[1871]: E0213 02:48:59.243033 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:59.882932 kubelet[1871]: E0213 02:48:59.882828 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:48:59.987295 systemd[1]: Started sshd@18-136.144.54.113:22-210.91.154.187:33306.service. Feb 13 02:48:59.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-136.144.54.113:22-210.91.154.187:33306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:00.079659 kernel: audit: type=1130 audit(1707792539.986:921): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-136.144.54.113:22-210.91.154.187:33306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:00.243429 kubelet[1871]: E0213 02:49:00.243184 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:00.302770 systemd[1]: Started sshd@19-136.144.54.113:22-109.123.237.173:60198.service. Feb 13 02:49:00.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-136.144.54.113:22-109.123.237.173:60198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:00.395467 kernel: audit: type=1130 audit(1707792540.302:922): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-136.144.54.113:22-109.123.237.173:60198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:00.735964 sshd[10261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.91.154.187 user=root Feb 13 02:49:00.735000 audit[10261]: USER_AUTH pid=10261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=210.91.154.187 addr=210.91.154.187 terminal=ssh res=failed' Feb 13 02:49:00.826660 kernel: audit: type=1100 audit(1707792540.735:923): pid=10261 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=210.91.154.187 addr=210.91.154.187 terminal=ssh res=failed' Feb 13 02:49:01.243487 kubelet[1871]: E0213 02:49:01.243409 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:01.248556 sshd[10264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.123.237.173 user=root Feb 13 02:49:01.248000 audit[10264]: USER_AUTH pid=10264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:49:01.339644 kernel: audit: type=1100 audit(1707792541.248:924): pid=10264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=109.123.237.173 addr=109.123.237.173 terminal=ssh res=failed' Feb 13 02:49:02.244022 kubelet[1871]: E0213 02:49:02.243899 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:02.750070 sshd[10261]: Failed password for root from 210.91.154.187 port 33306 ssh2 Feb 13 02:49:02.823732 update_engine[1460]: I0213 02:49:02.823613 1460 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 02:49:02.824452 update_engine[1460]: I0213 02:49:02.824075 1460 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 02:49:02.824452 update_engine[1460]: E0213 02:49:02.824275 1460 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 02:49:02.824452 update_engine[1460]: I0213 02:49:02.824445 1460 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 13 02:49:03.066633 sshd[10264]: Failed password for root from 109.123.237.173 port 60198 ssh2 Feb 13 02:49:03.244307 kubelet[1871]: E0213 02:49:03.244197 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:03.337700 sshd[10264]: Received disconnect from 109.123.237.173 port 60198:11: Bye Bye [preauth] Feb 13 02:49:03.337700 sshd[10264]: Disconnected from authenticating user root 109.123.237.173 port 60198 [preauth] Feb 13 02:49:03.340094 systemd[1]: sshd@19-136.144.54.113:22-109.123.237.173:60198.service: Deactivated successfully. Feb 13 02:49:03.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-136.144.54.113:22-109.123.237.173:60198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:03.432575 kernel: audit: type=1131 audit(1707792543.340:925): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-136.144.54.113:22-109.123.237.173:60198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:04.245334 kubelet[1871]: E0213 02:49:04.245273 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:04.718937 sshd[10261]: Received disconnect from 210.91.154.187 port 33306:11: Bye Bye [preauth] Feb 13 02:49:04.718937 sshd[10261]: Disconnected from authenticating user root 210.91.154.187 port 33306 [preauth] Feb 13 02:49:04.721537 systemd[1]: sshd@18-136.144.54.113:22-210.91.154.187:33306.service: Deactivated successfully. Feb 13 02:49:04.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-136.144.54.113:22-210.91.154.187:33306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:04.814673 kernel: audit: type=1131 audit(1707792544.721:926): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-136.144.54.113:22-210.91.154.187:33306 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:05.246385 kubelet[1871]: E0213 02:49:05.246261 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:06.246929 kubelet[1871]: E0213 02:49:06.246815 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:07.247886 kubelet[1871]: E0213 02:49:07.247767 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:08.248761 kubelet[1871]: E0213 02:49:08.248638 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:09.249270 kubelet[1871]: E0213 02:49:09.249166 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:10.250359 kubelet[1871]: E0213 02:49:10.250243 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:11.251134 kubelet[1871]: E0213 02:49:11.251016 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:12.251909 kubelet[1871]: E0213 02:49:12.251791 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:12.823721 update_engine[1460]: I0213 02:49:12.823603 1460 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 02:49:12.824551 update_engine[1460]: I0213 02:49:12.824064 1460 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 02:49:12.824551 update_engine[1460]: E0213 02:49:12.824265 1460 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 02:49:12.824551 update_engine[1460]: I0213 02:49:12.824434 1460 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 13 02:49:13.253001 kubelet[1871]: E0213 02:49:13.252774 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:14.253729 kubelet[1871]: E0213 02:49:14.253603 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:15.254455 kubelet[1871]: E0213 02:49:15.254408 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:16.254666 kubelet[1871]: E0213 02:49:16.254555 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:17.255022 kubelet[1871]: E0213 02:49:17.254912 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:18.255870 kubelet[1871]: E0213 02:49:18.255756 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:19.256927 kubelet[1871]: E0213 02:49:19.256840 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:19.883014 kubelet[1871]: E0213 02:49:19.882907 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:20.257643 kubelet[1871]: E0213 02:49:20.257540 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:21.258730 kubelet[1871]: E0213 02:49:21.258596 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:22.259523 kubelet[1871]: E0213 02:49:22.259304 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:22.823924 update_engine[1460]: I0213 02:49:22.823835 1460 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 02:49:22.825065 update_engine[1460]: I0213 02:49:22.824394 1460 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 02:49:22.825065 update_engine[1460]: E0213 02:49:22.824709 1460 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 02:49:22.825065 update_engine[1460]: I0213 02:49:22.824919 1460 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 02:49:22.825065 update_engine[1460]: I0213 02:49:22.824946 1460 omaha_request_action.cc:621] Omaha request response: Feb 13 02:49:22.825801 update_engine[1460]: E0213 02:49:22.825131 1460 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 13 02:49:22.825801 update_engine[1460]: I0213 02:49:22.825176 1460 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 13 02:49:22.825801 update_engine[1460]: I0213 02:49:22.825194 1460 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 02:49:22.825801 update_engine[1460]: I0213 02:49:22.825209 1460 update_attempter.cc:306] Processing Done. Feb 13 02:49:22.825801 update_engine[1460]: E0213 02:49:22.825242 1460 update_attempter.cc:619] Update failed. Feb 13 02:49:22.825801 update_engine[1460]: I0213 02:49:22.825258 1460 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 13 02:49:22.825801 update_engine[1460]: I0213 02:49:22.825274 1460 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 13 02:49:22.825801 update_engine[1460]: I0213 02:49:22.825289 1460 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 13 02:49:22.825801 update_engine[1460]: I0213 02:49:22.825533 1460 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 13 02:49:22.825801 update_engine[1460]: I0213 02:49:22.825608 1460 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 13 02:49:22.825801 update_engine[1460]: I0213 02:49:22.825626 1460 omaha_request_action.cc:271] Request: Feb 13 02:49:22.825801 update_engine[1460]: Feb 13 02:49:22.825801 update_engine[1460]: Feb 13 02:49:22.825801 update_engine[1460]: Feb 13 02:49:22.825801 update_engine[1460]: Feb 13 02:49:22.825801 update_engine[1460]: Feb 13 02:49:22.825801 update_engine[1460]: Feb 13 02:49:22.825801 update_engine[1460]: I0213 02:49:22.825641 1460 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 13 02:49:22.827991 update_engine[1460]: I0213 02:49:22.826061 1460 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 13 02:49:22.827991 update_engine[1460]: E0213 02:49:22.826296 1460 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 13 02:49:22.827991 update_engine[1460]: I0213 02:49:22.826512 1460 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 13 02:49:22.827991 update_engine[1460]: I0213 02:49:22.826539 1460 omaha_request_action.cc:621] Omaha request response: Feb 13 02:49:22.827991 update_engine[1460]: I0213 02:49:22.826556 1460 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 02:49:22.827991 update_engine[1460]: I0213 02:49:22.826571 1460 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 13 02:49:22.827991 update_engine[1460]: I0213 02:49:22.826586 1460 update_attempter.cc:306] Processing Done. Feb 13 02:49:22.827991 update_engine[1460]: I0213 02:49:22.826597 1460 update_attempter.cc:310] Error event sent. Feb 13 02:49:22.827991 update_engine[1460]: I0213 02:49:22.826627 1460 update_check_scheduler.cc:74] Next update check in 43m3s Feb 13 02:49:22.829000 locksmithd[1507]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 13 02:49:22.829000 locksmithd[1507]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 13 02:49:23.260015 kubelet[1871]: E0213 02:49:23.259918 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:24.260273 kubelet[1871]: E0213 02:49:24.260157 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:25.260809 kubelet[1871]: E0213 02:49:25.260760 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:26.261901 kubelet[1871]: E0213 02:49:26.261788 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:27.262664 kubelet[1871]: E0213 02:49:27.262559 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:28.263900 kubelet[1871]: E0213 02:49:28.263782 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:29.265151 kubelet[1871]: E0213 02:49:29.265007 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:30.265890 kubelet[1871]: E0213 02:49:30.265798 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:31.266104 kubelet[1871]: E0213 02:49:31.265942 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:32.267228 kubelet[1871]: E0213 02:49:32.267110 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:33.267588 kubelet[1871]: E0213 02:49:33.267448 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:34.268318 kubelet[1871]: E0213 02:49:34.268206 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:35.268995 kubelet[1871]: E0213 02:49:35.268940 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:36.269242 kubelet[1871]: E0213 02:49:36.269088 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:37.270037 kubelet[1871]: E0213 02:49:37.269921 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:38.270659 kubelet[1871]: E0213 02:49:38.270545 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:39.271227 kubelet[1871]: E0213 02:49:39.271117 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:39.883411 kubelet[1871]: E0213 02:49:39.883303 1871 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:40.272395 kubelet[1871]: E0213 02:49:40.272287 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:41.273274 kubelet[1871]: E0213 02:49:41.273163 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:42.274533 kubelet[1871]: E0213 02:49:42.274412 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:43.274989 kubelet[1871]: E0213 02:49:43.274869 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:44.275605 kubelet[1871]: E0213 02:49:44.275494 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:45.276760 kubelet[1871]: E0213 02:49:45.276644 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:46.278000 kubelet[1871]: E0213 02:49:46.277891 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:47.278286 kubelet[1871]: E0213 02:49:47.278177 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:48.279282 kubelet[1871]: E0213 02:49:48.279172 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:49.280413 kubelet[1871]: E0213 02:49:49.280304 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:50.281299 kubelet[1871]: E0213 02:49:50.281191 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:51.281842 kubelet[1871]: E0213 02:49:51.281738 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:52.283076 kubelet[1871]: E0213 02:49:52.282967 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:53.283406 kubelet[1871]: E0213 02:49:53.283288 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:53.811859 systemd[1]: Started sshd@20-136.144.54.113:22-210.91.154.187:46432.service. Feb 13 02:49:53.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-136.144.54.113:22-210.91.154.187:46432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:53.904674 kernel: audit: type=1130 audit(1707792593.810:927): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-136.144.54.113:22-210.91.154.187:46432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:54.283870 kubelet[1871]: E0213 02:49:54.283764 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:54.572278 sshd[10409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.91.154.187 user=root Feb 13 02:49:54.571000 audit[10409]: USER_AUTH pid=10409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=210.91.154.187 addr=210.91.154.187 terminal=ssh res=failed' Feb 13 02:49:54.664656 kernel: audit: type=1100 audit(1707792594.571:928): pid=10409 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=210.91.154.187 addr=210.91.154.187 terminal=ssh res=failed' Feb 13 02:49:55.284618 kubelet[1871]: E0213 02:49:55.284551 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:56.285583 kubelet[1871]: E0213 02:49:56.285478 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:56.666763 sshd[10409]: Failed password for root from 210.91.154.187 port 46432 ssh2 Feb 13 02:49:57.286618 kubelet[1871]: E0213 02:49:57.286504 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:58.287490 kubelet[1871]: E0213 02:49:58.287352 1871 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 13 02:49:58.556207 sshd[10409]: Received disconnect from 210.91.154.187 port 46432:11: Bye Bye [preauth] Feb 13 02:49:58.556207 sshd[10409]: Disconnected from authenticating user root 210.91.154.187 port 46432 [preauth] Feb 13 02:49:58.558736 systemd[1]: sshd@20-136.144.54.113:22-210.91.154.187:46432.service: Deactivated successfully. Feb 13 02:49:58.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-136.144.54.113:22-210.91.154.187:46432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 13 02:49:58.651664 kernel: audit: type=1131 audit(1707792598.557:929): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-136.144.54.113:22-210.91.154.187:46432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'