Feb 9 19:53:54.210039 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:53:54.210108 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:53:54.210128 kernel: BIOS-provided physical RAM map: Feb 9 19:53:54.210147 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved Feb 9 19:53:54.210160 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable Feb 9 19:53:54.210173 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved Feb 9 19:53:54.210193 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable Feb 9 19:53:54.210206 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved Feb 9 19:53:54.210219 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bf8ecfff] usable Feb 9 19:53:54.210230 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved Feb 9 19:53:54.210243 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data Feb 9 19:53:54.210256 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS Feb 9 19:53:54.210279 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable Feb 9 19:53:54.210293 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved Feb 9 19:53:54.210314 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable Feb 9 19:53:54.210330 kernel: NX (Execute Disable) protection: active Feb 9 19:53:54.210345 kernel: efi: EFI v2.70 by EDK II Feb 9 19:53:54.210361 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9ca000 MEMATTR=0xbe379198 RNG=0xbfb73018 TPMEventLog=0xbe2bd018 Feb 9 19:53:54.210376 kernel: random: crng init done Feb 9 19:53:54.210391 kernel: SMBIOS 2.4 present. Feb 9 19:53:54.210406 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023 Feb 9 19:53:54.210421 kernel: Hypervisor detected: KVM Feb 9 19:53:54.210465 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 19:53:54.210480 kernel: kvm-clock: cpu 0, msr 105faa001, primary cpu clock Feb 9 19:53:54.210495 kernel: kvm-clock: using sched offset of 13281044364 cycles Feb 9 19:53:54.210511 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 19:53:54.210526 kernel: tsc: Detected 2299.998 MHz processor Feb 9 19:53:54.210541 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:53:54.210557 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:53:54.210572 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 Feb 9 19:53:54.210588 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:53:54.210602 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 Feb 9 19:53:54.210622 kernel: Using GB pages for direct mapping Feb 9 19:53:54.210637 kernel: Secure boot disabled Feb 9 19:53:54.210652 kernel: ACPI: Early table checksum verification disabled Feb 9 19:53:54.210665 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) Feb 9 19:53:54.210680 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) Feb 9 19:53:54.210695 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) Feb 9 19:53:54.210709 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) Feb 9 19:53:54.210724 kernel: ACPI: FACS 0x00000000BFBF2000 000040 Feb 9 19:53:54.210750 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20211217) Feb 9 19:53:54.210767 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) Feb 9 19:53:54.210783 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) Feb 9 19:53:54.210800 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) Feb 9 19:53:54.210817 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) Feb 9 19:53:54.210834 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) Feb 9 19:53:54.210854 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] Feb 9 19:53:54.210871 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] Feb 9 19:53:54.210887 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] Feb 9 19:53:54.210903 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] Feb 9 19:53:54.210920 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] Feb 9 19:53:54.210936 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] Feb 9 19:53:54.210952 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] Feb 9 19:53:54.210968 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] Feb 9 19:53:54.210985 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] Feb 9 19:53:54.211006 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 19:53:54.211022 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 19:53:54.211039 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 9 19:53:54.211056 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] Feb 9 19:53:54.211072 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] Feb 9 19:53:54.211089 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] Feb 9 19:53:54.211113 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] Feb 9 19:53:54.211130 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] Feb 9 19:53:54.211146 kernel: Zone ranges: Feb 9 19:53:54.211167 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:53:54.211184 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 19:53:54.211200 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] Feb 9 19:53:54.211216 kernel: Movable zone start for each node Feb 9 19:53:54.211233 kernel: Early memory node ranges Feb 9 19:53:54.211249 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] Feb 9 19:53:54.211265 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] Feb 9 19:53:54.211282 kernel: node 0: [mem 0x0000000000100000-0x00000000bf8ecfff] Feb 9 19:53:54.211299 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] Feb 9 19:53:54.211320 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] Feb 9 19:53:54.211336 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] Feb 9 19:53:54.211353 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:53:54.211369 kernel: On node 0, zone DMA: 11 pages in unavailable ranges Feb 9 19:53:54.211385 kernel: On node 0, zone DMA: 104 pages in unavailable ranges Feb 9 19:53:54.211403 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges Feb 9 19:53:54.211420 kernel: On node 0, zone Normal: 32 pages in unavailable ranges Feb 9 19:53:54.212589 kernel: ACPI: PM-Timer IO Port: 0xb008 Feb 9 19:53:54.212613 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 19:53:54.212636 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:53:54.212652 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 19:53:54.212669 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:53:54.212686 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 19:53:54.212703 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 19:53:54.212719 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:53:54.212737 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:53:54.212753 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices Feb 9 19:53:54.212770 kernel: Booting paravirtualized kernel on KVM Feb 9 19:53:54.212791 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:53:54.212808 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:53:54.212825 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:53:54.212840 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:53:54.212856 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:53:54.212872 kernel: kvm-guest: PV spinlocks enabled Feb 9 19:53:54.212888 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 19:53:54.212904 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1931256 Feb 9 19:53:54.212920 kernel: Policy zone: Normal Feb 9 19:53:54.212942 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:53:54.212960 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:53:54.212977 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 9 19:53:54.212994 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:53:54.213010 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:53:54.213027 kernel: Memory: 7536516K/7860584K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 323808K reserved, 0K cma-reserved) Feb 9 19:53:54.213057 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:53:54.213074 kernel: Kernel/User page tables isolation: enabled Feb 9 19:53:54.213106 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:53:54.213123 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:53:54.213139 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:53:54.213156 kernel: rcu: RCU event tracing is enabled. Feb 9 19:53:54.213172 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:53:54.213188 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:53:54.213205 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:53:54.213221 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:53:54.213238 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:53:54.213259 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 19:53:54.213289 kernel: Console: colour dummy device 80x25 Feb 9 19:53:54.213306 kernel: printk: console [ttyS0] enabled Feb 9 19:53:54.213327 kernel: ACPI: Core revision 20210730 Feb 9 19:53:54.213345 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:53:54.213362 kernel: x2apic enabled Feb 9 19:53:54.213379 kernel: Switched APIC routing to physical x2apic. Feb 9 19:53:54.213397 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 Feb 9 19:53:54.213416 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 9 19:53:54.213482 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) Feb 9 19:53:54.213503 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 Feb 9 19:53:54.213518 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 Feb 9 19:53:54.213535 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:53:54.213552 kernel: Spectre V2 : Mitigation: IBRS Feb 9 19:53:54.213568 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:53:54.213584 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:53:54.213603 kernel: RETBleed: Mitigation: IBRS Feb 9 19:53:54.213620 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 9 19:53:54.213635 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl Feb 9 19:53:54.213653 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 9 19:53:54.213669 kernel: MDS: Mitigation: Clear CPU buffers Feb 9 19:53:54.213684 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:53:54.213699 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:53:54.213716 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:53:54.213732 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:53:54.213753 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:53:54.213770 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 9 19:53:54.213787 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:53:54.213802 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:53:54.213819 kernel: LSM: Security Framework initializing Feb 9 19:53:54.213833 kernel: SELinux: Initializing. Feb 9 19:53:54.213849 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:53:54.213863 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:53:54.213878 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) Feb 9 19:53:54.213899 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 9 19:53:54.213915 kernel: signal: max sigframe size: 1776 Feb 9 19:53:54.213931 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:53:54.213948 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 19:53:54.213965 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:53:54.213982 kernel: x86: Booting SMP configuration: Feb 9 19:53:54.213997 kernel: .... node #0, CPUs: #1 Feb 9 19:53:54.214014 kernel: kvm-clock: cpu 1, msr 105faa041, secondary cpu clock Feb 9 19:53:54.214029 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. Feb 9 19:53:54.214050 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 19:53:54.214065 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:53:54.214084 kernel: smpboot: Max logical packages: 1 Feb 9 19:53:54.214115 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) Feb 9 19:53:54.214132 kernel: devtmpfs: initialized Feb 9 19:53:54.214147 kernel: x86/mm: Memory block size: 128MB Feb 9 19:53:54.214162 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) Feb 9 19:53:54.221133 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:53:54.221159 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:53:54.221184 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:53:54.221202 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:53:54.221219 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:53:54.221236 kernel: audit: type=2000 audit(1707508433.092:1): state=initialized audit_enabled=0 res=1 Feb 9 19:53:54.221253 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:53:54.221271 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:53:54.221289 kernel: cpuidle: using governor menu Feb 9 19:53:54.221307 kernel: ACPI: bus type PCI registered Feb 9 19:53:54.221324 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:53:54.221345 kernel: dca service started, version 1.12.1 Feb 9 19:53:54.221362 kernel: PCI: Using configuration type 1 for base access Feb 9 19:53:54.221379 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:53:54.221396 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:53:54.221413 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:53:54.221444 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:53:54.221461 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:53:54.221478 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:53:54.221495 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:53:54.221517 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:53:54.221533 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:53:54.221551 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:53:54.221566 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded Feb 9 19:53:54.221583 kernel: ACPI: Interpreter enabled Feb 9 19:53:54.221600 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 19:53:54.221616 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:53:54.221634 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:53:54.221651 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F Feb 9 19:53:54.221673 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 19:53:54.221918 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:53:54.222084 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 19:53:54.222114 kernel: PCI host bridge to bus 0000:00 Feb 9 19:53:54.222275 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 19:53:54.222445 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 19:53:54.222597 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 19:53:54.222749 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] Feb 9 19:53:54.222888 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 19:53:54.223064 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 19:53:54.223243 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 Feb 9 19:53:54.223420 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 19:53:54.223603 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI Feb 9 19:53:54.223781 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 Feb 9 19:53:54.223943 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] Feb 9 19:53:54.224112 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] Feb 9 19:53:54.224285 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 9 19:53:54.224470 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] Feb 9 19:53:54.224631 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] Feb 9 19:53:54.224811 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 19:53:54.224975 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] Feb 9 19:53:54.225152 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] Feb 9 19:53:54.225175 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 19:53:54.225193 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 19:53:54.225211 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 19:53:54.225229 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 19:53:54.225247 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 19:53:54.225270 kernel: iommu: Default domain type: Translated Feb 9 19:53:54.225288 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:53:54.225312 kernel: vgaarb: loaded Feb 9 19:53:54.225330 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:53:54.225348 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:53:54.225366 kernel: PTP clock support registered Feb 9 19:53:54.225384 kernel: Registered efivars operations Feb 9 19:53:54.225401 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:53:54.225419 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 19:53:54.231691 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] Feb 9 19:53:54.231718 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] Feb 9 19:53:54.231735 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] Feb 9 19:53:54.231752 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] Feb 9 19:53:54.231768 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 19:53:54.231786 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:53:54.231803 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:53:54.231820 kernel: pnp: PnP ACPI init Feb 9 19:53:54.231837 kernel: pnp: PnP ACPI: found 7 devices Feb 9 19:53:54.231861 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:53:54.231892 kernel: NET: Registered PF_INET protocol family Feb 9 19:53:54.231912 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:53:54.231929 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 9 19:53:54.231947 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:53:54.231964 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:53:54.231991 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 19:53:54.232008 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 9 19:53:54.232024 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:53:54.232045 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:53:54.232117 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:53:54.232137 kernel: NET: Registered PF_XDP protocol family Feb 9 19:53:54.232334 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 19:53:54.232490 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 19:53:54.232631 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 19:53:54.232768 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] Feb 9 19:53:54.232930 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 19:53:54.232960 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:53:54.232977 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 19:53:54.232995 kernel: software IO TLB: mapped [mem 0x00000000b7ff7000-0x00000000bbff7000] (64MB) Feb 9 19:53:54.233012 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 19:53:54.233030 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns Feb 9 19:53:54.233047 kernel: clocksource: Switched to clocksource tsc Feb 9 19:53:54.233064 kernel: Initialise system trusted keyrings Feb 9 19:53:54.233081 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 9 19:53:54.233110 kernel: Key type asymmetric registered Feb 9 19:53:54.233126 kernel: Asymmetric key parser 'x509' registered Feb 9 19:53:54.233143 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:53:54.233160 kernel: io scheduler mq-deadline registered Feb 9 19:53:54.233177 kernel: io scheduler kyber registered Feb 9 19:53:54.233194 kernel: io scheduler bfq registered Feb 9 19:53:54.233210 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:53:54.233228 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 19:53:54.233387 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver Feb 9 19:53:54.233413 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Feb 9 19:53:54.233580 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver Feb 9 19:53:54.233602 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 19:53:54.233757 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver Feb 9 19:53:54.233778 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:53:54.233795 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:53:54.233812 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 19:53:54.233829 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A Feb 9 19:53:54.233846 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A Feb 9 19:53:54.234013 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) Feb 9 19:53:54.234038 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 19:53:54.234056 kernel: i8042: Warning: Keylock active Feb 9 19:53:54.234074 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 19:53:54.234100 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 19:53:54.234257 kernel: rtc_cmos 00:00: RTC can wake from S4 Feb 9 19:53:54.234399 kernel: rtc_cmos 00:00: registered as rtc0 Feb 9 19:53:54.234589 kernel: rtc_cmos 00:00: setting system clock to 2024-02-09T19:53:53 UTC (1707508433) Feb 9 19:53:54.234736 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram Feb 9 19:53:54.234759 kernel: intel_pstate: CPU model not supported Feb 9 19:53:54.234777 kernel: pstore: Registered efi as persistent store backend Feb 9 19:53:54.234795 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:53:54.234813 kernel: Segment Routing with IPv6 Feb 9 19:53:54.234831 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:53:54.234848 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:53:54.234866 kernel: Key type dns_resolver registered Feb 9 19:53:54.234889 kernel: IPI shorthand broadcast: enabled Feb 9 19:53:54.234907 kernel: sched_clock: Marking stable (733677910, 141887950)->(951013408, -75447548) Feb 9 19:53:54.234925 kernel: registered taskstats version 1 Feb 9 19:53:54.234943 kernel: Loading compiled-in X.509 certificates Feb 9 19:53:54.234960 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 19:53:54.234978 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:53:54.234996 kernel: Key type .fscrypt registered Feb 9 19:53:54.235013 kernel: Key type fscrypt-provisioning registered Feb 9 19:53:54.235031 kernel: pstore: Using crash dump compression: deflate Feb 9 19:53:54.235052 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:53:54.235069 kernel: ima: No architecture policies found Feb 9 19:53:54.235087 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:53:54.235113 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:53:54.235131 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:53:54.235154 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:53:54.235173 kernel: Run /init as init process Feb 9 19:53:54.235190 kernel: with arguments: Feb 9 19:53:54.235212 kernel: /init Feb 9 19:53:54.235229 kernel: with environment: Feb 9 19:53:54.235246 kernel: HOME=/ Feb 9 19:53:54.235263 kernel: TERM=linux Feb 9 19:53:54.235280 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:53:54.235302 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:53:54.235324 systemd[1]: Detected virtualization kvm. Feb 9 19:53:54.235343 systemd[1]: Detected architecture x86-64. Feb 9 19:53:54.235364 systemd[1]: Running in initrd. Feb 9 19:53:54.235383 systemd[1]: No hostname configured, using default hostname. Feb 9 19:53:54.235401 systemd[1]: Hostname set to . Feb 9 19:53:54.235420 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:53:54.240590 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:53:54.240619 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:53:54.240637 systemd[1]: Reached target cryptsetup.target. Feb 9 19:53:54.240655 systemd[1]: Reached target paths.target. Feb 9 19:53:54.240681 systemd[1]: Reached target slices.target. Feb 9 19:53:54.240699 systemd[1]: Reached target swap.target. Feb 9 19:53:54.240729 systemd[1]: Reached target timers.target. Feb 9 19:53:54.240749 systemd[1]: Listening on iscsid.socket. Feb 9 19:53:54.240767 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:53:54.240785 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:53:54.240802 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:53:54.240819 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:53:54.240840 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:53:54.240857 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:53:54.240874 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:53:54.240891 systemd[1]: Reached target sockets.target. Feb 9 19:53:54.240909 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:53:54.240926 systemd[1]: Finished network-cleanup.service. Feb 9 19:53:54.240944 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:53:54.240961 systemd[1]: Starting systemd-journald.service... Feb 9 19:53:54.240979 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:53:54.241010 systemd[1]: Starting systemd-resolved.service... Feb 9 19:53:54.241031 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:53:54.241066 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:53:54.241097 kernel: audit: type=1130 audit(1707508434.224:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.241116 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:53:54.241133 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:53:54.241154 kernel: audit: type=1130 audit(1707508434.234:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.241181 systemd-journald[190]: Journal started Feb 9 19:53:54.241292 systemd-journald[190]: Runtime Journal (/run/log/journal/313089cf1b89e94fab1058693afaa17e) is 8.0M, max 148.8M, 140.8M free. Feb 9 19:53:54.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.243276 systemd-modules-load[191]: Inserted module 'overlay' Feb 9 19:53:54.254707 systemd[1]: Started systemd-journald.service. Feb 9 19:53:54.254762 kernel: audit: type=1130 audit(1707508434.245:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.260226 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:53:54.268961 kernel: audit: type=1130 audit(1707508434.257:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.268728 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:53:54.282726 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:53:54.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.287459 kernel: audit: type=1130 audit(1707508434.281:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.294019 systemd-resolved[192]: Positive Trust Anchors: Feb 9 19:53:54.294394 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:53:54.294575 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:53:54.299402 systemd-resolved[192]: Defaulting to hostname 'linux'. Feb 9 19:53:54.301037 systemd[1]: Started systemd-resolved.service. Feb 9 19:53:54.301232 systemd[1]: Reached target nss-lookup.target. Feb 9 19:53:54.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.308553 kernel: audit: type=1130 audit(1707508434.299:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.314621 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:53:54.314383 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:53:54.324756 kernel: Bridge firewalling registered Feb 9 19:53:54.324795 kernel: audit: type=1130 audit(1707508434.317:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.317637 systemd-modules-load[191]: Inserted module 'br_netfilter' Feb 9 19:53:54.319932 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:53:54.340837 dracut-cmdline[206]: dracut-dracut-053 Feb 9 19:53:54.348858 dracut-cmdline[206]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:53:54.358567 kernel: SCSI subsystem initialized Feb 9 19:53:54.371950 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:53:54.372027 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:53:54.372727 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:53:54.379250 systemd-modules-load[191]: Inserted module 'dm_multipath' Feb 9 19:53:54.381056 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:53:54.393591 kernel: audit: type=1130 audit(1707508434.383:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.389653 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:53:54.403214 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:53:54.415578 kernel: audit: type=1130 audit(1707508434.406:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.442473 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:53:54.456469 kernel: iscsi: registered transport (tcp) Feb 9 19:53:54.480681 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:53:54.480770 kernel: QLogic iSCSI HBA Driver Feb 9 19:53:54.527303 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:53:54.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.529151 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:53:54.586526 kernel: raid6: avx2x4 gen() 17679 MB/s Feb 9 19:53:54.603486 kernel: raid6: avx2x4 xor() 7853 MB/s Feb 9 19:53:54.620483 kernel: raid6: avx2x2 gen() 17780 MB/s Feb 9 19:53:54.637479 kernel: raid6: avx2x2 xor() 18528 MB/s Feb 9 19:53:54.654503 kernel: raid6: avx2x1 gen() 13653 MB/s Feb 9 19:53:54.671522 kernel: raid6: avx2x1 xor() 16089 MB/s Feb 9 19:53:54.688493 kernel: raid6: sse2x4 gen() 10898 MB/s Feb 9 19:53:54.705490 kernel: raid6: sse2x4 xor() 6719 MB/s Feb 9 19:53:54.722483 kernel: raid6: sse2x2 gen() 11951 MB/s Feb 9 19:53:54.739484 kernel: raid6: sse2x2 xor() 7423 MB/s Feb 9 19:53:54.756507 kernel: raid6: sse2x1 gen() 10444 MB/s Feb 9 19:53:54.775255 kernel: raid6: sse2x1 xor() 5186 MB/s Feb 9 19:53:54.775326 kernel: raid6: using algorithm avx2x2 gen() 17780 MB/s Feb 9 19:53:54.775349 kernel: raid6: .... xor() 18528 MB/s, rmw enabled Feb 9 19:53:54.775374 kernel: raid6: using avx2x2 recovery algorithm Feb 9 19:53:54.790474 kernel: xor: automatically using best checksumming function avx Feb 9 19:53:54.903608 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:53:54.915111 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:53:54.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.914000 audit: BPF prog-id=7 op=LOAD Feb 9 19:53:54.914000 audit: BPF prog-id=8 op=LOAD Feb 9 19:53:54.916512 systemd[1]: Starting systemd-udevd.service... Feb 9 19:53:54.933558 systemd-udevd[388]: Using default interface naming scheme 'v252'. Feb 9 19:53:54.953790 systemd[1]: Started systemd-udevd.service. Feb 9 19:53:54.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:54.963948 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:53:54.979622 dracut-pre-trigger[405]: rd.md=0: removing MD RAID activation Feb 9 19:53:55.018965 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:53:55.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:55.028679 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:53:55.092329 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:53:55.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:55.181764 kernel: scsi host0: Virtio SCSI HBA Feb 9 19:53:55.198464 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 Feb 9 19:53:55.234461 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:53:55.327406 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:53:55.334905 kernel: AES CTR mode by8 optimization enabled Feb 9 19:53:55.334970 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) Feb 9 19:53:55.346423 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks Feb 9 19:53:55.346756 kernel: sd 0:0:1:0: [sda] Write Protect is off Feb 9 19:53:55.360969 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 Feb 9 19:53:55.361293 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Feb 9 19:53:55.381845 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:53:55.381933 kernel: GPT:17805311 != 25165823 Feb 9 19:53:55.381957 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:53:55.388354 kernel: GPT:17805311 != 25165823 Feb 9 19:53:55.392058 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:53:55.402424 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:53:55.411331 kernel: sd 0:0:1:0: [sda] Attached SCSI disk Feb 9 19:53:55.467460 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (450) Feb 9 19:53:55.473109 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:53:55.492305 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:53:55.510838 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:53:55.523652 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:53:55.546656 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:53:55.564756 systemd[1]: Starting disk-uuid.service... Feb 9 19:53:55.588784 disk-uuid[518]: Primary Header is updated. Feb 9 19:53:55.588784 disk-uuid[518]: Secondary Entries is updated. Feb 9 19:53:55.588784 disk-uuid[518]: Secondary Header is updated. Feb 9 19:53:55.615581 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:53:55.622457 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:53:55.640469 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:53:56.640468 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:53:56.640853 disk-uuid[519]: The operation has completed successfully. Feb 9 19:53:56.708143 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:53:56.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:56.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:56.708274 systemd[1]: Finished disk-uuid.service. Feb 9 19:53:56.727615 systemd[1]: Starting verity-setup.service... Feb 9 19:53:56.756484 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 19:53:56.844229 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:53:56.846912 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:53:56.859169 systemd[1]: Finished verity-setup.service. Feb 9 19:53:56.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:56.954537 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:53:56.954644 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:53:56.955043 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:53:57.004757 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:53:57.004805 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:53:57.004837 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:53:56.956033 systemd[1]: Starting ignition-setup.service... Feb 9 19:53:57.027601 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:53:56.969026 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:53:57.033999 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:53:57.052916 systemd[1]: Finished ignition-setup.service. Feb 9 19:53:57.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:57.054462 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:53:57.089944 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:53:57.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:57.098000 audit: BPF prog-id=9 op=LOAD Feb 9 19:53:57.100585 systemd[1]: Starting systemd-networkd.service... Feb 9 19:53:57.134777 systemd-networkd[693]: lo: Link UP Feb 9 19:53:57.134792 systemd-networkd[693]: lo: Gained carrier Feb 9 19:53:57.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:57.135626 systemd-networkd[693]: Enumeration completed Feb 9 19:53:57.135916 systemd[1]: Started systemd-networkd.service. Feb 9 19:53:57.136302 systemd-networkd[693]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:53:57.139532 systemd-networkd[693]: eth0: Link UP Feb 9 19:53:57.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:57.139540 systemd-networkd[693]: eth0: Gained carrier Feb 9 19:53:57.142949 systemd[1]: Reached target network.target. Feb 9 19:53:57.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:57.235698 iscsid[702]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:53:57.235698 iscsid[702]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 19:53:57.235698 iscsid[702]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:53:57.235698 iscsid[702]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:53:57.235698 iscsid[702]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:53:57.235698 iscsid[702]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:53:57.235698 iscsid[702]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:53:57.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:57.149595 systemd-networkd[693]: eth0: DHCPv4 address 10.128.0.58/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 9 19:53:57.350949 ignition[661]: Ignition 2.14.0 Feb 9 19:53:57.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:57.164734 systemd[1]: Starting iscsiuio.service... Feb 9 19:53:57.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:57.350964 ignition[661]: Stage: fetch-offline Feb 9 19:53:57.178965 systemd[1]: Started iscsiuio.service. Feb 9 19:53:57.351046 ignition[661]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:53:57.203310 systemd[1]: Starting iscsid.service... Feb 9 19:53:57.351094 ignition[661]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:53:57.215838 systemd[1]: Started iscsid.service. Feb 9 19:53:57.385754 ignition[661]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:53:57.224474 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:53:57.385971 ignition[661]: parsed url from cmdline: "" Feb 9 19:53:57.243917 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:53:57.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:57.385978 ignition[661]: no config URL provided Feb 9 19:53:57.253945 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:53:57.385985 ignition[661]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:53:57.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:57.287831 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:53:57.385997 ignition[661]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:53:57.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:57.315807 systemd[1]: Reached target remote-fs.target. Feb 9 19:53:57.386006 ignition[661]: failed to fetch config: resource requires networking Feb 9 19:53:57.360775 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:53:57.386188 ignition[661]: Ignition finished successfully Feb 9 19:53:57.380043 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:53:57.427655 ignition[717]: Ignition 2.14.0 Feb 9 19:53:57.400029 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:53:57.427666 ignition[717]: Stage: fetch Feb 9 19:53:57.414889 systemd[1]: Starting ignition-fetch.service... Feb 9 19:53:57.427806 ignition[717]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:53:57.465639 unknown[717]: fetched base config from "system" Feb 9 19:53:57.427837 ignition[717]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:53:57.465651 unknown[717]: fetched base config from "system" Feb 9 19:53:57.435257 ignition[717]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:53:57.465658 unknown[717]: fetched user config from "gcp" Feb 9 19:53:57.435796 ignition[717]: parsed url from cmdline: "" Feb 9 19:53:57.468145 systemd[1]: Finished ignition-fetch.service. Feb 9 19:53:57.435802 ignition[717]: no config URL provided Feb 9 19:53:57.494077 systemd[1]: Starting ignition-kargs.service... Feb 9 19:53:57.435811 ignition[717]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:53:57.517761 systemd[1]: Finished ignition-kargs.service. Feb 9 19:53:57.435823 ignition[717]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:53:57.532013 systemd[1]: Starting ignition-disks.service... Feb 9 19:53:57.435861 ignition[717]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 Feb 9 19:53:57.555508 systemd[1]: Finished ignition-disks.service. Feb 9 19:53:57.443140 ignition[717]: GET result: OK Feb 9 19:53:57.564960 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:53:57.443236 ignition[717]: parsing config with SHA512: 7f1e601c7f5390979291940b6054b4e409b046f75cf346400dbbd6e8ab892936654f4c34a3e4ceae39521662c0c5d57c9ce58f6971996dc676e47fc36f4f431b Feb 9 19:53:57.580746 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:53:57.466233 ignition[717]: fetch: fetch complete Feb 9 19:53:57.595719 systemd[1]: Reached target local-fs.target. Feb 9 19:53:57.466239 ignition[717]: fetch: fetch passed Feb 9 19:53:57.605817 systemd[1]: Reached target sysinit.target. Feb 9 19:53:57.466288 ignition[717]: Ignition finished successfully Feb 9 19:53:57.627749 systemd[1]: Reached target basic.target. Feb 9 19:53:57.507327 ignition[723]: Ignition 2.14.0 Feb 9 19:53:57.635963 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:53:57.507338 ignition[723]: Stage: kargs Feb 9 19:53:57.507511 ignition[723]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:53:57.507557 ignition[723]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:53:57.515234 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:53:57.516671 ignition[723]: kargs: kargs passed Feb 9 19:53:57.516730 ignition[723]: Ignition finished successfully Feb 9 19:53:57.544210 ignition[729]: Ignition 2.14.0 Feb 9 19:53:57.544219 ignition[729]: Stage: disks Feb 9 19:53:57.544354 ignition[729]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:53:57.544386 ignition[729]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:53:57.552818 ignition[729]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:53:57.554414 ignition[729]: disks: disks passed Feb 9 19:53:57.554502 ignition[729]: Ignition finished successfully Feb 9 19:53:57.674980 systemd-fsck[737]: ROOT: clean, 602/1628000 files, 124051/1617920 blocks Feb 9 19:53:57.893426 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:53:57.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:57.902799 systemd[1]: Mounting sysroot.mount... Feb 9 19:53:57.933610 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:53:57.928996 systemd[1]: Mounted sysroot.mount. Feb 9 19:53:57.940960 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:53:57.958211 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:53:57.971159 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:53:57.971214 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:53:57.971251 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:53:58.057645 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (743) Feb 9 19:53:58.057688 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:53:58.057811 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:53:58.057853 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:53:57.986857 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:53:58.077607 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:53:58.011088 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:53:58.070916 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:53:58.117580 initrd-setup-root[766]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:53:58.088214 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:53:58.136655 initrd-setup-root[774]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:53:58.146636 initrd-setup-root[782]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:53:58.156604 initrd-setup-root[790]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:53:58.172690 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:53:58.213617 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 9 19:53:58.213660 kernel: audit: type=1130 audit(1707508438.171:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:58.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:58.174184 systemd[1]: Starting ignition-mount.service... Feb 9 19:53:58.221689 systemd[1]: Starting sysroot-boot.service... Feb 9 19:53:58.236321 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:53:58.236522 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:53:58.262614 ignition[809]: INFO : Ignition 2.14.0 Feb 9 19:53:58.262614 ignition[809]: INFO : Stage: mount Feb 9 19:53:58.262614 ignition[809]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:53:58.262614 ignition[809]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:53:58.360715 kernel: audit: type=1130 audit(1707508438.283:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:58.360772 kernel: audit: type=1130 audit(1707508438.314:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:58.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:58.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:53:58.269225 systemd[1]: Finished sysroot-boot.service. Feb 9 19:53:58.375671 ignition[809]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:53:58.375671 ignition[809]: INFO : mount: mount passed Feb 9 19:53:58.375671 ignition[809]: INFO : Ignition finished successfully Feb 9 19:53:58.420806 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (819) Feb 9 19:53:58.420853 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:53:58.420871 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:53:58.420886 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:53:58.285131 systemd[1]: Finished ignition-mount.service. Feb 9 19:53:58.447717 kernel: BTRFS info (device sda6): enabling ssd optimizations Feb 9 19:53:58.317625 systemd[1]: Starting ignition-files.service... Feb 9 19:53:58.372548 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:53:58.444194 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:53:58.481672 ignition[838]: INFO : Ignition 2.14.0 Feb 9 19:53:58.481672 ignition[838]: INFO : Stage: files Feb 9 19:53:58.481672 ignition[838]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:53:58.481672 ignition[838]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:53:58.538660 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (843) Feb 9 19:53:58.502373 unknown[838]: wrote ssh authorized keys file for user: core Feb 9 19:53:58.547624 ignition[838]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:53:58.547624 ignition[838]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:53:58.547624 ignition[838]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:53:58.547624 ignition[838]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:53:58.547624 ignition[838]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:53:58.547624 ignition[838]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:53:58.547624 ignition[838]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:53:58.547624 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" Feb 9 19:53:58.547624 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:53:58.547624 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1290617187" Feb 9 19:53:58.547624 ignition[838]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1290617187": device or resource busy Feb 9 19:53:58.547624 ignition[838]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1290617187", trying btrfs: device or resource busy Feb 9 19:53:58.547624 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1290617187" Feb 9 19:53:58.547624 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1290617187" Feb 9 19:53:58.547624 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem1290617187" Feb 9 19:53:58.547624 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem1290617187" Feb 9 19:53:58.547624 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" Feb 9 19:53:58.547624 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:53:58.814686 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 19:53:58.899936 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 9 19:53:59.067632 systemd-networkd[693]: eth0: Gained IPv6LL Feb 9 19:53:59.125033 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 19:53:59.150709 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:53:59.150709 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:53:59.150709 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:53:59.304624 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 9 19:53:59.416293 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 19:53:59.440641 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:53:59.440641 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 9 19:53:59.440641 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:53:59.440641 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1088914111" Feb 9 19:53:59.440641 ignition[838]: CRITICAL : files: createFilesystemsFiles: createFiles: op(9): op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1088914111": device or resource busy Feb 9 19:53:59.440641 ignition[838]: ERROR : files: createFilesystemsFiles: createFiles: op(9): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1088914111", trying btrfs: device or resource busy Feb 9 19:53:59.440641 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1088914111" Feb 9 19:53:59.440641 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1088914111" Feb 9 19:53:59.440641 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [started] unmounting "/mnt/oem1088914111" Feb 9 19:53:59.440641 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): op(c): [finished] unmounting "/mnt/oem1088914111" Feb 9 19:53:59.440641 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" Feb 9 19:53:59.440641 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:53:59.440641 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:53:59.434118 systemd[1]: mnt-oem1088914111.mount: Deactivated successfully. Feb 9 19:53:59.676724 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(d): GET result: OK Feb 9 19:53:59.816609 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(d): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 19:53:59.840673 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:53:59.840673 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:53:59.840673 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:53:59.840673 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Feb 9 19:54:00.433848 ignition[838]: DEBUG : files: createFilesystemsFiles: createFiles: op(e): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 19:54:00.459642 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:54:00.459642 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:54:00.459642 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:54:00.459642 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:54:00.459642 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:54:00.459642 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:54:00.459642 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:54:00.459642 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 9 19:54:00.459642 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:54:00.459642 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1938126764" Feb 9 19:54:00.459642 ignition[838]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1938126764": device or resource busy Feb 9 19:54:00.459642 ignition[838]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1938126764", trying btrfs: device or resource busy Feb 9 19:54:00.459642 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1938126764" Feb 9 19:54:00.459642 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1938126764" Feb 9 19:54:00.459642 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem1938126764" Feb 9 19:54:00.882646 kernel: audit: type=1130 audit(1707508440.497:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.882705 kernel: audit: type=1130 audit(1707508440.606:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.882733 kernel: audit: type=1130 audit(1707508440.690:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.882757 kernel: audit: type=1131 audit(1707508440.690:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.882780 kernel: audit: type=1130 audit(1707508440.819:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.882816 kernel: audit: type=1131 audit(1707508440.819:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.458298 systemd[1]: mnt-oem1938126764.mount: Deactivated successfully. Feb 9 19:54:00.899621 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem1938126764" Feb 9 19:54:00.899621 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" Feb 9 19:54:00.899621 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 9 19:54:00.899621 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:54:00.899621 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem691277192" Feb 9 19:54:00.899621 ignition[838]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem691277192": device or resource busy Feb 9 19:54:00.899621 ignition[838]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem691277192", trying btrfs: device or resource busy Feb 9 19:54:00.899621 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem691277192" Feb 9 19:54:00.899621 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem691277192" Feb 9 19:54:00.899621 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem691277192" Feb 9 19:54:00.899621 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem691277192" Feb 9 19:54:00.899621 ignition[838]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" Feb 9 19:54:00.899621 ignition[838]: INFO : files: op(1a): [started] processing unit "oem-gce.service" Feb 9 19:54:00.899621 ignition[838]: INFO : files: op(1a): [finished] processing unit "oem-gce.service" Feb 9 19:54:00.899621 ignition[838]: INFO : files: op(1b): [started] processing unit "oem-gce-enable-oslogin.service" Feb 9 19:54:00.899621 ignition[838]: INFO : files: op(1b): [finished] processing unit "oem-gce-enable-oslogin.service" Feb 9 19:54:01.224813 kernel: audit: type=1130 audit(1707508440.967:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.480682 systemd[1]: Finished ignition-files.service. Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(1c): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(1c): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(1d): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(1d): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(1f): [started] processing unit "prepare-critools.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(1f): op(20): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(1f): op(20): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(1f): [finished] processing unit "prepare-critools.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(21): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(21): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(22): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(22): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(23): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(24): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(24): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(25): [started] setting preset to enabled for "oem-gce.service" Feb 9 19:54:01.249725 ignition[838]: INFO : files: op(25): [finished] setting preset to enabled for "oem-gce.service" Feb 9 19:54:01.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.509742 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:54:01.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.655712 iscsid[702]: iscsid shutting down. Feb 9 19:54:01.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.669699 ignition[838]: INFO : files: createResultFile: createFiles: op(26): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:54:01.669699 ignition[838]: INFO : files: createResultFile: createFiles: op(26): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:54:01.669699 ignition[838]: INFO : files: files passed Feb 9 19:54:01.669699 ignition[838]: INFO : Ignition finished successfully Feb 9 19:54:01.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.721981 initrd-setup-root-after-ignition[861]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:54:01.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.569760 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:54:01.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.570992 systemd[1]: Starting ignition-quench.service... Feb 9 19:54:01.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.593063 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:54:01.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.608225 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:54:00.608384 systemd[1]: Finished ignition-quench.service. Feb 9 19:54:00.691895 systemd[1]: Reached target ignition-complete.target. Feb 9 19:54:00.780885 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:54:01.866754 ignition[876]: INFO : Ignition 2.14.0 Feb 9 19:54:01.866754 ignition[876]: INFO : Stage: umount Feb 9 19:54:01.866754 ignition[876]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:54:01.866754 ignition[876]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 Feb 9 19:54:01.866754 ignition[876]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" Feb 9 19:54:01.866754 ignition[876]: INFO : umount: umount passed Feb 9 19:54:01.866754 ignition[876]: INFO : Ignition finished successfully Feb 9 19:54:01.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.811871 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:54:00.812003 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:54:00.821051 systemd[1]: Reached target initrd-fs.target. Feb 9 19:54:00.891800 systemd[1]: Reached target initrd.target. Feb 9 19:54:02.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:00.899884 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:54:02.055000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:02.055000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:54:00.901172 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:54:00.921066 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:54:00.970254 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:54:02.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.014989 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:54:02.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.027996 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:54:02.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.079974 systemd[1]: Stopped target timers.target. Feb 9 19:54:01.118992 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:54:01.119184 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:54:02.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.133234 systemd[1]: Stopped target initrd.target. Feb 9 19:54:01.178006 systemd[1]: Stopped target basic.target. Feb 9 19:54:01.189013 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:54:02.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.206098 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:54:02.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.242951 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:54:02.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.257909 systemd[1]: Stopped target remote-fs.target. Feb 9 19:54:01.271024 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:54:01.289012 systemd[1]: Stopped target sysinit.target. Feb 9 19:54:02.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.332030 systemd[1]: Stopped target local-fs.target. Feb 9 19:54:02.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.350026 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:54:02.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.385972 systemd[1]: Stopped target swap.target. Feb 9 19:54:02.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.402951 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:54:02.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:02.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:01.403167 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:54:01.455057 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:54:01.477798 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:54:01.478000 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:54:01.512018 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:54:01.512209 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:54:01.534903 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:54:02.446666 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). Feb 9 19:54:01.535239 systemd[1]: Stopped ignition-files.service. Feb 9 19:54:01.558394 systemd[1]: Stopping ignition-mount.service... Feb 9 19:54:01.580420 systemd[1]: Stopping iscsid.service... Feb 9 19:54:01.596101 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:54:01.614641 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:54:01.614947 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:54:01.623941 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:54:01.624138 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:54:01.650656 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:54:01.651792 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:54:01.651914 systemd[1]: Stopped iscsid.service. Feb 9 19:54:01.663482 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:54:01.663602 systemd[1]: Stopped ignition-mount.service. Feb 9 19:54:01.678289 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:54:01.678401 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:54:01.714324 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:54:01.714529 systemd[1]: Stopped ignition-disks.service. Feb 9 19:54:01.735847 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:54:01.735926 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:54:01.758888 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:54:01.758966 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:54:01.784797 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:54:01.784869 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:54:01.800833 systemd[1]: Stopped target paths.target. Feb 9 19:54:01.815719 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:54:01.820555 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:54:01.831681 systemd[1]: Stopped target slices.target. Feb 9 19:54:01.844620 systemd[1]: Stopped target sockets.target. Feb 9 19:54:01.858656 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:54:01.858741 systemd[1]: Closed iscsid.socket. Feb 9 19:54:01.873692 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:54:01.873782 systemd[1]: Stopped ignition-setup.service. Feb 9 19:54:01.888719 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:54:01.888793 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:54:01.903826 systemd[1]: Stopping iscsiuio.service... Feb 9 19:54:01.922288 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:54:01.922408 systemd[1]: Stopped iscsiuio.service. Feb 9 19:54:01.942258 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:54:01.942370 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:54:01.966762 systemd[1]: Stopped target network.target. Feb 9 19:54:01.980641 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:54:01.980758 systemd[1]: Closed iscsiuio.socket. Feb 9 19:54:01.995885 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:54:01.999503 systemd-networkd[693]: eth0: DHCPv6 lease lost Feb 9 19:54:02.011864 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:54:02.026177 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:54:02.026305 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:54:02.042403 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:54:02.042565 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:54:02.057422 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:54:02.057495 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:54:02.076641 systemd[1]: Stopping network-cleanup.service... Feb 9 19:54:02.090595 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:54:02.090811 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:54:02.106768 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:54:02.106849 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:54:02.122886 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:54:02.122953 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:54:02.138877 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:54:02.155405 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:54:02.156118 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:54:02.156272 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:54:02.178292 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:54:02.178381 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:54:02.191785 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:54:02.191840 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:54:02.207679 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:54:02.207767 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:54:02.222797 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:54:02.222870 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:54:02.239799 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:54:02.239883 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:54:02.257830 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:54:02.280781 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 19:54:02.280886 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 19:54:02.297046 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:54:02.297114 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:54:02.311852 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:54:02.311933 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:54:02.328252 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 19:54:02.328941 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:54:02.329063 systemd[1]: Stopped network-cleanup.service. Feb 9 19:54:02.342032 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:54:02.342155 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:54:02.357969 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:54:02.376724 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:54:02.406235 systemd[1]: Switching root. Feb 9 19:54:02.450758 systemd-journald[190]: Journal stopped Feb 9 19:54:07.229182 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:54:07.229326 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:54:07.229359 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:54:07.229383 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:54:07.229405 kernel: SELinux: policy capability open_perms=1 Feb 9 19:54:07.229587 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:54:07.229614 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:54:07.229636 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:54:07.229658 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:54:07.229688 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:54:07.229709 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:54:07.229734 systemd[1]: Successfully loaded SELinux policy in 113.921ms. Feb 9 19:54:07.229776 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.215ms. Feb 9 19:54:07.229801 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:54:07.229831 systemd[1]: Detected virtualization kvm. Feb 9 19:54:07.229854 systemd[1]: Detected architecture x86-64. Feb 9 19:54:07.229879 systemd[1]: Detected first boot. Feb 9 19:54:07.229903 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:54:07.230045 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:54:07.230300 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:54:07.230328 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:54:07.230361 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:54:07.230388 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:54:07.230420 kernel: kauditd_printk_skb: 52 callbacks suppressed Feb 9 19:54:07.230456 kernel: audit: type=1334 audit(1707508446.265:89): prog-id=12 op=LOAD Feb 9 19:54:07.230478 kernel: audit: type=1334 audit(1707508446.265:90): prog-id=3 op=UNLOAD Feb 9 19:54:07.230499 kernel: audit: type=1334 audit(1707508446.271:91): prog-id=13 op=LOAD Feb 9 19:54:07.230522 kernel: audit: type=1334 audit(1707508446.278:92): prog-id=14 op=LOAD Feb 9 19:54:07.230553 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:54:07.230581 kernel: audit: type=1334 audit(1707508446.278:93): prog-id=4 op=UNLOAD Feb 9 19:54:07.230602 kernel: audit: type=1334 audit(1707508446.278:94): prog-id=5 op=UNLOAD Feb 9 19:54:07.230625 kernel: audit: type=1131 audit(1707508446.280:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.230647 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:54:07.230668 kernel: audit: type=1334 audit(1707508446.349:96): prog-id=12 op=UNLOAD Feb 9 19:54:07.230689 kernel: audit: type=1130 audit(1707508446.365:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.230710 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:54:07.230735 kernel: audit: type=1131 audit(1707508446.365:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.230763 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:54:07.230891 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:54:07.230927 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 19:54:07.230951 systemd[1]: Created slice system-getty.slice. Feb 9 19:54:07.230970 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:54:07.230986 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:54:07.231001 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:54:07.231022 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:54:07.231046 systemd[1]: Created slice user.slice. Feb 9 19:54:07.231062 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:54:07.231084 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:54:07.231124 systemd[1]: Set up automount boot.automount. Feb 9 19:54:07.231139 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:54:07.231155 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:54:07.231170 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:54:07.231189 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:54:07.231209 systemd[1]: Reached target integritysetup.target. Feb 9 19:54:07.231224 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:54:07.231240 systemd[1]: Reached target remote-fs.target. Feb 9 19:54:07.231255 systemd[1]: Reached target slices.target. Feb 9 19:54:07.231270 systemd[1]: Reached target swap.target. Feb 9 19:54:07.231285 systemd[1]: Reached target torcx.target. Feb 9 19:54:07.231300 systemd[1]: Reached target veritysetup.target. Feb 9 19:54:07.231315 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:54:07.231336 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:54:07.231358 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:54:07.231386 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:54:07.231410 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:54:07.231450 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:54:07.231472 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:54:07.231487 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:54:07.231503 systemd[1]: Mounting media.mount... Feb 9 19:54:07.231519 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:54:07.231535 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:54:07.231550 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:54:07.231569 systemd[1]: Mounting tmp.mount... Feb 9 19:54:07.231584 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:54:07.231599 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:54:07.231613 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:54:07.231628 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:54:07.231643 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:54:07.231657 systemd[1]: Starting modprobe@drm.service... Feb 9 19:54:07.231672 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:54:07.231688 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:54:07.231715 systemd[1]: Starting modprobe@loop.service... Feb 9 19:54:07.231739 kernel: fuse: init (API version 7.34) Feb 9 19:54:07.231761 kernel: loop: module loaded Feb 9 19:54:07.231783 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:54:07.231806 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:54:07.231827 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:54:07.231849 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:54:07.231871 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:54:07.231895 systemd[1]: Stopped systemd-journald.service. Feb 9 19:54:07.231923 systemd[1]: Starting systemd-journald.service... Feb 9 19:54:07.231946 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:54:07.231969 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:54:07.231998 systemd-journald[999]: Journal started Feb 9 19:54:07.232109 systemd-journald[999]: Runtime Journal (/run/log/journal/313089cf1b89e94fab1058693afaa17e) is 8.0M, max 148.8M, 140.8M free. Feb 9 19:54:02.450000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:54:02.760000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:54:02.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:54:02.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:54:02.923000 audit: BPF prog-id=10 op=LOAD Feb 9 19:54:02.923000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:54:02.923000 audit: BPF prog-id=11 op=LOAD Feb 9 19:54:02.923000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:54:03.106000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:54:03.106000 audit[909]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001078e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:03.106000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:54:03.116000 audit[909]: AVC avc: denied { associate } for pid=909 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:54:03.116000 audit[909]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001079b9 a2=1ed a3=0 items=2 ppid=892 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:03.116000 audit: CWD cwd="/" Feb 9 19:54:03.116000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:03.116000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:03.116000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:54:06.265000 audit: BPF prog-id=12 op=LOAD Feb 9 19:54:06.265000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:54:06.271000 audit: BPF prog-id=13 op=LOAD Feb 9 19:54:06.278000 audit: BPF prog-id=14 op=LOAD Feb 9 19:54:06.278000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:54:06.278000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:54:06.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:06.349000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:54:06.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:06.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.180000 audit: BPF prog-id=15 op=LOAD Feb 9 19:54:07.180000 audit: BPF prog-id=16 op=LOAD Feb 9 19:54:07.181000 audit: BPF prog-id=17 op=LOAD Feb 9 19:54:07.181000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:54:07.181000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:54:07.224000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:54:07.224000 audit[999]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffcfedcf5f0 a2=4000 a3=7ffcfedcf68c items=0 ppid=1 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:07.224000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:54:06.264886 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:54:03.102570 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:54:06.281284 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:54:03.104141 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:54:03.104169 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:54:03.104212 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:54:03.104225 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:54:03.104270 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:54:03.104287 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:54:03.104577 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:54:03.104629 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:54:03.104644 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:54:03.106246 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:54:03.106300 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:54:03.106335 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:54:03.106354 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:54:03.106376 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:54:03.106393 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:03Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:54:05.631266 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:05Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:54:05.631589 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:05Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:54:05.631725 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:05Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:54:05.631962 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:05Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:54:05.632018 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:05Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:54:05.632099 /usr/lib/systemd/system-generators/torcx-generator[909]: time="2024-02-09T19:54:05Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:54:07.242476 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:54:07.259488 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:54:07.278523 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:54:07.278666 systemd[1]: Stopped verity-setup.service. Feb 9 19:54:07.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.298521 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:54:07.308500 systemd[1]: Started systemd-journald.service. Feb 9 19:54:07.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.317040 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:54:07.325890 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:54:07.332870 systemd[1]: Mounted media.mount. Feb 9 19:54:07.339814 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:54:07.348838 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:54:07.357916 systemd[1]: Mounted tmp.mount. Feb 9 19:54:07.366066 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:54:07.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.375169 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:54:07.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.384250 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:54:07.384550 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:54:07.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.393185 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:54:07.393447 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:54:07.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.402241 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:54:07.402543 systemd[1]: Finished modprobe@drm.service. Feb 9 19:54:07.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.412208 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:54:07.412476 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:54:07.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.422278 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:54:07.422552 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:54:07.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.432212 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:54:07.432500 systemd[1]: Finished modprobe@loop.service. Feb 9 19:54:07.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.441341 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:54:07.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.450182 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:54:07.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.459210 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:54:07.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.468281 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:54:07.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.477524 systemd[1]: Reached target network-pre.target. Feb 9 19:54:07.487383 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:54:07.497110 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:54:07.504661 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:54:07.507989 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:54:07.517629 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:54:07.527915 systemd-journald[999]: Time spent on flushing to /var/log/journal/313089cf1b89e94fab1058693afaa17e is 78.357ms for 1156 entries. Feb 9 19:54:07.527915 systemd-journald[999]: System Journal (/var/log/journal/313089cf1b89e94fab1058693afaa17e) is 8.0M, max 584.8M, 576.8M free. Feb 9 19:54:07.647262 systemd-journald[999]: Received client request to flush runtime journal. Feb 9 19:54:07.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.525668 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:54:07.527597 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:54:07.542729 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:54:07.544654 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:54:07.553804 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:54:07.649377 udevadm[1013]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 19:54:07.562381 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:54:07.573141 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:54:07.581796 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:54:07.590945 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:54:07.600057 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:54:07.613464 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:54:07.634307 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:54:07.644555 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:54:07.656413 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:54:07.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:07.703299 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:54:07.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:08.242890 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:54:08.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:08.251000 audit: BPF prog-id=18 op=LOAD Feb 9 19:54:08.251000 audit: BPF prog-id=19 op=LOAD Feb 9 19:54:08.251000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:54:08.251000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:54:08.253641 systemd[1]: Starting systemd-udevd.service... Feb 9 19:54:08.277497 systemd-udevd[1018]: Using default interface naming scheme 'v252'. Feb 9 19:54:08.331756 systemd[1]: Started systemd-udevd.service. Feb 9 19:54:08.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:08.341000 audit: BPF prog-id=20 op=LOAD Feb 9 19:54:08.344531 systemd[1]: Starting systemd-networkd.service... Feb 9 19:54:08.357000 audit: BPF prog-id=21 op=LOAD Feb 9 19:54:08.358000 audit: BPF prog-id=22 op=LOAD Feb 9 19:54:08.358000 audit: BPF prog-id=23 op=LOAD Feb 9 19:54:08.360653 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:54:08.422510 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:54:08.434060 systemd[1]: Started systemd-userdbd.service. Feb 9 19:54:08.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:08.575516 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 19:54:08.593518 systemd-networkd[1033]: lo: Link UP Feb 9 19:54:08.593533 systemd-networkd[1033]: lo: Gained carrier Feb 9 19:54:08.594250 systemd-networkd[1033]: Enumeration completed Feb 9 19:54:08.594426 systemd-networkd[1033]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:54:08.594464 systemd[1]: Started systemd-networkd.service. Feb 9 19:54:08.596275 systemd-networkd[1033]: eth0: Link UP Feb 9 19:54:08.596289 systemd-networkd[1033]: eth0: Gained carrier Feb 9 19:54:08.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:08.604664 systemd-networkd[1033]: eth0: DHCPv4 address 10.128.0.58/32, gateway 10.128.0.1 acquired from 169.254.169.254 Feb 9 19:54:08.533000 audit[1039]: AVC avc: denied { confidentiality } for pid=1039 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:54:08.533000 audit[1039]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564fd13fb6f0 a1=32194 a2=7f45dccbbbc5 a3=5 items=108 ppid=1018 pid=1039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:08.533000 audit: CWD cwd="/" Feb 9 19:54:08.533000 audit: PATH item=0 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=1 name=(null) inode=12972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=2 name=(null) inode=12972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=3 name=(null) inode=12973 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=4 name=(null) inode=12972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=5 name=(null) inode=12974 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=6 name=(null) inode=12972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=7 name=(null) inode=12975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=8 name=(null) inode=12975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=9 name=(null) inode=12976 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=10 name=(null) inode=12975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=11 name=(null) inode=12977 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=12 name=(null) inode=12975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=13 name=(null) inode=12978 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=14 name=(null) inode=12975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=15 name=(null) inode=12979 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=16 name=(null) inode=12975 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=17 name=(null) inode=12980 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=18 name=(null) inode=12972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=19 name=(null) inode=12981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=20 name=(null) inode=12981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=21 name=(null) inode=12982 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=22 name=(null) inode=12981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=23 name=(null) inode=12983 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=24 name=(null) inode=12981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=25 name=(null) inode=12984 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=26 name=(null) inode=12981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=27 name=(null) inode=12985 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=28 name=(null) inode=12981 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=29 name=(null) inode=12986 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=30 name=(null) inode=12972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=31 name=(null) inode=12987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=32 name=(null) inode=12987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=33 name=(null) inode=12988 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=34 name=(null) inode=12987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=35 name=(null) inode=12989 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=36 name=(null) inode=12987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=37 name=(null) inode=12990 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=38 name=(null) inode=12987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=39 name=(null) inode=12991 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=40 name=(null) inode=12987 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=41 name=(null) inode=12992 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=42 name=(null) inode=12972 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=43 name=(null) inode=12993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=44 name=(null) inode=12993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=45 name=(null) inode=12994 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=46 name=(null) inode=12993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=47 name=(null) inode=12995 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=48 name=(null) inode=12993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=49 name=(null) inode=12996 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=50 name=(null) inode=12993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=51 name=(null) inode=12997 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=52 name=(null) inode=12993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=53 name=(null) inode=12998 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=54 name=(null) inode=1042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=55 name=(null) inode=12999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=56 name=(null) inode=12999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=57 name=(null) inode=13000 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=58 name=(null) inode=12999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=59 name=(null) inode=13001 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=60 name=(null) inode=12999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=61 name=(null) inode=13002 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=62 name=(null) inode=13002 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=63 name=(null) inode=13003 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=64 name=(null) inode=13002 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=65 name=(null) inode=13004 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=66 name=(null) inode=13002 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=67 name=(null) inode=13005 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=68 name=(null) inode=13002 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=69 name=(null) inode=13006 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=70 name=(null) inode=13002 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=71 name=(null) inode=13007 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=72 name=(null) inode=12999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=73 name=(null) inode=13008 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=74 name=(null) inode=13008 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=75 name=(null) inode=13009 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=76 name=(null) inode=13008 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=77 name=(null) inode=13010 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=78 name=(null) inode=13008 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=79 name=(null) inode=13011 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=80 name=(null) inode=13008 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=81 name=(null) inode=13012 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=82 name=(null) inode=13008 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=83 name=(null) inode=13013 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=84 name=(null) inode=12999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=85 name=(null) inode=13014 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=86 name=(null) inode=13014 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=87 name=(null) inode=13015 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=88 name=(null) inode=13014 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=89 name=(null) inode=13016 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=90 name=(null) inode=13014 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=91 name=(null) inode=13017 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=92 name=(null) inode=13014 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=93 name=(null) inode=13018 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=94 name=(null) inode=13014 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=95 name=(null) inode=13019 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=96 name=(null) inode=12999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=97 name=(null) inode=13020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=98 name=(null) inode=13020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=99 name=(null) inode=13021 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=100 name=(null) inode=13020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=101 name=(null) inode=13022 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=102 name=(null) inode=13020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=103 name=(null) inode=13023 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=104 name=(null) inode=13020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=105 name=(null) inode=13024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=106 name=(null) inode=13020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PATH item=107 name=(null) inode=13025 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:54:08.533000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:54:08.639486 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr Feb 9 19:54:08.665668 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1029) Feb 9 19:54:08.684466 kernel: ACPI: button: Power Button [PWRF] Feb 9 19:54:08.705473 kernel: EDAC MC: Ver: 3.0.0 Feb 9 19:54:08.725478 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 Feb 9 19:54:08.742473 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Feb 9 19:54:08.749554 kernel: ACPI: button: Sleep Button [SLPF] Feb 9 19:54:08.762254 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:54:08.770580 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:54:08.784084 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:54:08.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:08.794763 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:54:08.826551 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:54:08.857404 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:54:08.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:08.865899 systemd[1]: Reached target cryptsetup.target. Feb 9 19:54:08.876652 systemd[1]: Starting lvm2-activation.service... Feb 9 19:54:08.884114 lvm[1056]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:54:08.913630 systemd[1]: Finished lvm2-activation.service. Feb 9 19:54:08.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:08.922946 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:54:08.931718 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:54:08.931806 systemd[1]: Reached target local-fs.target. Feb 9 19:54:08.940725 systemd[1]: Reached target machines.target. Feb 9 19:54:08.951747 systemd[1]: Starting ldconfig.service... Feb 9 19:54:08.959721 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:54:08.959834 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:54:08.961919 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:54:08.972265 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:54:08.984611 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:54:08.994307 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:54:08.994411 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:54:08.996565 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:54:09.010142 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1058 (bootctl) Feb 9 19:54:09.012860 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:54:09.022168 systemd-tmpfiles[1062]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:54:09.028012 systemd-tmpfiles[1062]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:54:09.031551 systemd-tmpfiles[1062]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:54:09.043364 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:54:09.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:09.183556 systemd-fsck[1068]: fsck.fat 4.2 (2021-01-31) Feb 9 19:54:09.183556 systemd-fsck[1068]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 19:54:09.187827 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:54:09.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:09.200828 systemd[1]: Mounting boot.mount... Feb 9 19:54:09.245706 systemd[1]: Mounted boot.mount. Feb 9 19:54:09.284928 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:54:09.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:09.405686 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:54:09.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:09.418906 systemd[1]: Starting audit-rules.service... Feb 9 19:54:09.428640 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:54:09.440056 systemd[1]: Starting oem-gce-enable-oslogin.service... Feb 9 19:54:09.451071 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:54:09.459000 audit: BPF prog-id=24 op=LOAD Feb 9 19:54:09.462715 systemd[1]: Starting systemd-resolved.service... Feb 9 19:54:09.470000 audit: BPF prog-id=25 op=LOAD Feb 9 19:54:09.473841 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:54:09.485248 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:54:09.525357 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:54:09.535900 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:54:09.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:09.542000 audit[1080]: SYSTEM_BOOT pid=1080 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:54:09.552160 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:54:09.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:09.603699 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:54:09.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:09.614145 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. Feb 9 19:54:09.614445 systemd[1]: Finished oem-gce-enable-oslogin.service. Feb 9 19:54:09.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:09.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:09.716692 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:54:09.720177 systemd-timesyncd[1079]: Contacted time server 169.254.169.254:123 (169.254.169.254). Feb 9 19:54:09.720273 systemd-timesyncd[1079]: Initial clock synchronization to Fri 2024-02-09 19:54:09.966055 UTC. Feb 9 19:54:09.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:09.726984 systemd[1]: Reached target time-set.target. Feb 9 19:54:09.727456 systemd-resolved[1078]: Positive Trust Anchors: Feb 9 19:54:09.727471 systemd-resolved[1078]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:54:09.727527 systemd-resolved[1078]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:54:09.734142 augenrules[1104]: No rules Feb 9 19:54:09.732000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:54:09.732000 audit[1104]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe2163cde0 a2=420 a3=0 items=0 ppid=1073 pid=1104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:09.732000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:54:09.735897 systemd[1]: Finished audit-rules.service. Feb 9 19:54:09.767510 systemd-resolved[1078]: Defaulting to hostname 'linux'. Feb 9 19:54:09.770423 systemd[1]: Started systemd-resolved.service. Feb 9 19:54:09.778799 systemd[1]: Reached target network.target. Feb 9 19:54:09.787684 systemd[1]: Reached target nss-lookup.target. Feb 9 19:54:09.834005 ldconfig[1057]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:54:09.851051 systemd[1]: Finished ldconfig.service. Feb 9 19:54:09.861011 systemd[1]: Starting systemd-update-done.service... Feb 9 19:54:09.870985 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:54:09.872387 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:54:09.883204 systemd[1]: Finished systemd-update-done.service. Feb 9 19:54:09.891978 systemd[1]: Reached target sysinit.target. Feb 9 19:54:09.900868 systemd[1]: Started motdgen.path. Feb 9 19:54:09.907758 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:54:09.917987 systemd[1]: Started logrotate.timer. Feb 9 19:54:09.925838 systemd[1]: Started mdadm.timer. Feb 9 19:54:09.932676 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:54:09.941706 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:54:09.941898 systemd[1]: Reached target paths.target. Feb 9 19:54:09.948666 systemd[1]: Reached target timers.target. Feb 9 19:54:09.956236 systemd[1]: Listening on dbus.socket. Feb 9 19:54:09.965480 systemd[1]: Starting docker.socket... Feb 9 19:54:09.977427 systemd[1]: Listening on sshd.socket. Feb 9 19:54:09.984809 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:54:09.985692 systemd[1]: Listening on docker.socket. Feb 9 19:54:09.992822 systemd[1]: Reached target sockets.target. Feb 9 19:54:10.001673 systemd[1]: Reached target basic.target. Feb 9 19:54:10.008726 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:54:10.008783 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:54:10.010864 systemd[1]: Starting containerd.service... Feb 9 19:54:10.019426 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 19:54:10.031847 systemd[1]: Starting dbus.service... Feb 9 19:54:10.039532 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:54:10.050301 systemd[1]: Starting extend-filesystems.service... Feb 9 19:54:10.057651 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:54:10.061846 jq[1115]: false Feb 9 19:54:10.059954 systemd[1]: Starting motdgen.service... Feb 9 19:54:10.070057 systemd[1]: Starting oem-gce.service... Feb 9 19:54:10.079792 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:54:10.089963 systemd[1]: Starting prepare-critools.service... Feb 9 19:54:10.099786 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:54:10.110342 systemd[1]: Starting sshd-keygen.service... Feb 9 19:54:10.122797 systemd[1]: Starting systemd-logind.service... Feb 9 19:54:10.130688 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:54:10.130824 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). Feb 9 19:54:10.131814 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:54:10.133417 systemd[1]: Starting update-engine.service... Feb 9 19:54:10.143553 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:54:10.150521 jq[1139]: true Feb 9 19:54:10.152132 extend-filesystems[1116]: Found sda Feb 9 19:54:10.157612 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:54:10.157925 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:54:10.158647 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:54:10.158941 systemd[1]: Finished motdgen.service. Feb 9 19:54:10.163759 extend-filesystems[1116]: Found sda1 Feb 9 19:54:10.172829 extend-filesystems[1116]: Found sda2 Feb 9 19:54:10.172829 extend-filesystems[1116]: Found sda3 Feb 9 19:54:10.172829 extend-filesystems[1116]: Found usr Feb 9 19:54:10.172829 extend-filesystems[1116]: Found sda4 Feb 9 19:54:10.172829 extend-filesystems[1116]: Found sda6 Feb 9 19:54:10.172829 extend-filesystems[1116]: Found sda7 Feb 9 19:54:10.172829 extend-filesystems[1116]: Found sda9 Feb 9 19:54:10.172829 extend-filesystems[1116]: Checking size of /dev/sda9 Feb 9 19:54:10.172543 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:54:10.172860 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:54:10.244923 extend-filesystems[1116]: Resized partition /dev/sda9 Feb 9 19:54:10.255735 tar[1143]: ./ Feb 9 19:54:10.255735 tar[1143]: ./macvlan Feb 9 19:54:10.257174 mkfs.ext4[1148]: mke2fs 1.46.5 (30-Dec-2021) Feb 9 19:54:10.257174 mkfs.ext4[1148]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done Feb 9 19:54:10.257174 mkfs.ext4[1148]: Creating filesystem with 262144 4k blocks and 65536 inodes Feb 9 19:54:10.257174 mkfs.ext4[1148]: Filesystem UUID: e73699c6-89f9-4d13-87ec-bb7093917a33 Feb 9 19:54:10.257174 mkfs.ext4[1148]: Superblock backups stored on blocks: Feb 9 19:54:10.257174 mkfs.ext4[1148]: 32768, 98304, 163840, 229376 Feb 9 19:54:10.257174 mkfs.ext4[1148]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:54:10.257174 mkfs.ext4[1148]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:54:10.257174 mkfs.ext4[1148]: Creating journal (8192 blocks): done Feb 9 19:54:10.257174 mkfs.ext4[1148]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done Feb 9 19:54:10.258181 jq[1146]: true Feb 9 19:54:10.264897 extend-filesystems[1155]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:54:10.267694 systemd-networkd[1033]: eth0: Gained IPv6LL Feb 9 19:54:10.284506 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks Feb 9 19:54:10.317038 dbus-daemon[1114]: [system] SELinux support is enabled Feb 9 19:54:10.317316 systemd[1]: Started dbus.service. Feb 9 19:54:10.328551 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:54:10.328625 systemd[1]: Reached target system-config.target. Feb 9 19:54:10.337734 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:54:10.337791 systemd[1]: Reached target user-config.target. Feb 9 19:54:10.340384 dbus-daemon[1114]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1033 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Feb 9 19:54:10.346609 umount[1162]: umount: /var/lib/flatcar-oem-gce.img: not mounted. Feb 9 19:54:10.355132 dbus-daemon[1114]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 19:54:10.365920 systemd[1]: Starting systemd-hostnamed.service... Feb 9 19:54:10.371842 update_engine[1137]: I0209 19:54:10.371768 1137 main.cc:92] Flatcar Update Engine starting Feb 9 19:54:10.379731 kernel: EXT4-fs (sda9): resized filesystem to 2538491 Feb 9 19:54:10.386156 systemd[1]: Started update-engine.service. Feb 9 19:54:10.395036 update_engine[1137]: I0209 19:54:10.386193 1137 update_check_scheduler.cc:74] Next update check in 2m20s Feb 9 19:54:10.395184 tar[1144]: crictl Feb 9 19:54:10.399224 systemd[1]: Started locksmithd.service. Feb 9 19:54:10.409951 extend-filesystems[1155]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Feb 9 19:54:10.409951 extend-filesystems[1155]: old_desc_blocks = 1, new_desc_blocks = 2 Feb 9 19:54:10.409951 extend-filesystems[1155]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. Feb 9 19:54:10.466779 kernel: loop0: detected capacity change from 0 to 2097152 Feb 9 19:54:10.466864 kernel: EXT4-fs (loop0): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:54:10.413579 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:54:10.467046 extend-filesystems[1116]: Resized filesystem in /dev/sda9 Feb 9 19:54:10.413908 systemd[1]: Finished extend-filesystems.service. Feb 9 19:54:10.524907 bash[1183]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:54:10.526974 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:54:10.587264 env[1147]: time="2024-02-09T19:54:10.587185900Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:54:10.593904 dbus-daemon[1114]: [system] Successfully activated service 'org.freedesktop.hostname1' Feb 9 19:54:10.594126 systemd[1]: Started systemd-hostnamed.service. Feb 9 19:54:10.594530 dbus-daemon[1114]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1169 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Feb 9 19:54:10.609751 systemd[1]: Starting polkit.service... Feb 9 19:54:10.693531 systemd-logind[1136]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 19:54:10.712843 systemd-logind[1136]: Watching system buttons on /dev/input/event2 (Sleep Button) Feb 9 19:54:10.713076 systemd-logind[1136]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:54:10.716807 systemd-logind[1136]: New seat seat0. Feb 9 19:54:10.727436 systemd[1]: Started systemd-logind.service. Feb 9 19:54:10.730799 tar[1143]: ./static Feb 9 19:54:10.770204 polkitd[1191]: Started polkitd version 121 Feb 9 19:54:10.782946 coreos-metadata[1113]: Feb 09 19:54:10.782 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 Feb 9 19:54:10.792598 coreos-metadata[1113]: Feb 09 19:54:10.792 INFO Fetch failed with 404: resource not found Feb 9 19:54:10.792855 coreos-metadata[1113]: Feb 09 19:54:10.792 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 Feb 9 19:54:10.797367 coreos-metadata[1113]: Feb 09 19:54:10.797 INFO Fetch successful Feb 9 19:54:10.797660 coreos-metadata[1113]: Feb 09 19:54:10.797 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 Feb 9 19:54:10.800997 coreos-metadata[1113]: Feb 09 19:54:10.800 INFO Fetch failed with 404: resource not found Feb 9 19:54:10.801262 coreos-metadata[1113]: Feb 09 19:54:10.801 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 Feb 9 19:54:10.804769 coreos-metadata[1113]: Feb 09 19:54:10.804 INFO Fetch failed with 404: resource not found Feb 9 19:54:10.805008 coreos-metadata[1113]: Feb 09 19:54:10.804 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 Feb 9 19:54:10.809226 coreos-metadata[1113]: Feb 09 19:54:10.809 INFO Fetch successful Feb 9 19:54:10.812798 unknown[1113]: wrote ssh authorized keys file for user: core Feb 9 19:54:10.846820 update-ssh-keys[1194]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:54:10.847447 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 19:54:10.850966 polkitd[1191]: Loading rules from directory /etc/polkit-1/rules.d Feb 9 19:54:10.859091 polkitd[1191]: Loading rules from directory /usr/share/polkit-1/rules.d Feb 9 19:54:10.862127 polkitd[1191]: Finished loading, compiling and executing 2 rules Feb 9 19:54:10.863152 dbus-daemon[1114]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Feb 9 19:54:10.863396 systemd[1]: Started polkit.service. Feb 9 19:54:10.868226 polkitd[1191]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Feb 9 19:54:10.889089 systemd-hostnamed[1169]: Hostname set to (transient) Feb 9 19:54:10.892820 systemd-resolved[1078]: System hostname changed to 'ci-3510-3-2-380f49cf55f43ce7843d.c.flatcar-212911.internal'. Feb 9 19:54:10.937802 env[1147]: time="2024-02-09T19:54:10.937723840Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:54:10.938010 env[1147]: time="2024-02-09T19:54:10.937943755Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:54:10.950908 tar[1143]: ./vlan Feb 9 19:54:10.952781 env[1147]: time="2024-02-09T19:54:10.952706051Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:54:10.952906 env[1147]: time="2024-02-09T19:54:10.952786567Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:54:10.953178 env[1147]: time="2024-02-09T19:54:10.953136971Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:54:10.953264 env[1147]: time="2024-02-09T19:54:10.953178966Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:54:10.953264 env[1147]: time="2024-02-09T19:54:10.953201070Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:54:10.953264 env[1147]: time="2024-02-09T19:54:10.953220280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:54:10.953421 env[1147]: time="2024-02-09T19:54:10.953344488Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:54:10.953761 env[1147]: time="2024-02-09T19:54:10.953727365Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:54:10.954010 env[1147]: time="2024-02-09T19:54:10.953973757Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:54:10.954101 env[1147]: time="2024-02-09T19:54:10.954010790Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:54:10.954160 env[1147]: time="2024-02-09T19:54:10.954093692Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:54:10.954160 env[1147]: time="2024-02-09T19:54:10.954114568Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964099546Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964158399Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964184965Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964248153Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964275048Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964301309Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964323880Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964347806Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964377267Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964399816Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964420009Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964442429Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964640567Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:54:10.965496 env[1147]: time="2024-02-09T19:54:10.964765456Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:54:10.966223 env[1147]: time="2024-02-09T19:54:10.965129568Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:54:10.966223 env[1147]: time="2024-02-09T19:54:10.965173138Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:54:10.966223 env[1147]: time="2024-02-09T19:54:10.965199946Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:54:10.966223 env[1147]: time="2024-02-09T19:54:10.965277504Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:54:10.966223 env[1147]: time="2024-02-09T19:54:10.965300123Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:54:10.966223 env[1147]: time="2024-02-09T19:54:10.965343341Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:54:10.966223 env[1147]: time="2024-02-09T19:54:10.965364704Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:54:10.966223 env[1147]: time="2024-02-09T19:54:10.965396597Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:54:10.966223 env[1147]: time="2024-02-09T19:54:10.965420855Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:54:10.966223 env[1147]: time="2024-02-09T19:54:10.965443789Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:54:10.968461 env[1147]: time="2024-02-09T19:54:10.966770954Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:54:10.968461 env[1147]: time="2024-02-09T19:54:10.966882524Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:54:10.968461 env[1147]: time="2024-02-09T19:54:10.967070716Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:54:10.968461 env[1147]: time="2024-02-09T19:54:10.967098089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:54:10.968461 env[1147]: time="2024-02-09T19:54:10.967121284Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:54:10.968461 env[1147]: time="2024-02-09T19:54:10.967147916Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:54:10.968461 env[1147]: time="2024-02-09T19:54:10.967175627Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:54:10.968461 env[1147]: time="2024-02-09T19:54:10.967196939Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:54:10.968461 env[1147]: time="2024-02-09T19:54:10.967227144Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:54:10.968461 env[1147]: time="2024-02-09T19:54:10.967279081Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:54:10.969037 env[1147]: time="2024-02-09T19:54:10.967629891Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:54:10.969037 env[1147]: time="2024-02-09T19:54:10.967738166Z" level=info msg="Connect containerd service" Feb 9 19:54:10.969037 env[1147]: time="2024-02-09T19:54:10.967794865Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:54:10.972543 env[1147]: time="2024-02-09T19:54:10.969744970Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:54:10.972543 env[1147]: time="2024-02-09T19:54:10.969926008Z" level=info msg="Start subscribing containerd event" Feb 9 19:54:10.972543 env[1147]: time="2024-02-09T19:54:10.970015669Z" level=info msg="Start recovering state" Feb 9 19:54:10.972543 env[1147]: time="2024-02-09T19:54:10.970108638Z" level=info msg="Start event monitor" Feb 9 19:54:10.972543 env[1147]: time="2024-02-09T19:54:10.970125253Z" level=info msg="Start snapshots syncer" Feb 9 19:54:10.972543 env[1147]: time="2024-02-09T19:54:10.970139016Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:54:10.972543 env[1147]: time="2024-02-09T19:54:10.970150498Z" level=info msg="Start streaming server" Feb 9 19:54:10.972543 env[1147]: time="2024-02-09T19:54:10.971061430Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:54:10.972543 env[1147]: time="2024-02-09T19:54:10.971187843Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:54:10.971405 systemd[1]: Started containerd.service. Feb 9 19:54:10.985162 env[1147]: time="2024-02-09T19:54:10.983665309Z" level=info msg="containerd successfully booted in 0.422329s" Feb 9 19:54:11.092150 tar[1143]: ./portmap Feb 9 19:54:11.203832 tar[1143]: ./host-local Feb 9 19:54:11.302544 tar[1143]: ./vrf Feb 9 19:54:11.396638 tar[1143]: ./bridge Feb 9 19:54:11.509200 tar[1143]: ./tuning Feb 9 19:54:11.601787 tar[1143]: ./firewall Feb 9 19:54:11.723937 tar[1143]: ./host-device Feb 9 19:54:11.834763 tar[1143]: ./sbr Feb 9 19:54:11.929352 tar[1143]: ./loopback Feb 9 19:54:12.015204 tar[1143]: ./dhcp Feb 9 19:54:12.162169 systemd[1]: Finished prepare-critools.service. Feb 9 19:54:12.218175 tar[1143]: ./ptp Feb 9 19:54:12.275721 tar[1143]: ./ipvlan Feb 9 19:54:12.331774 tar[1143]: ./bandwidth Feb 9 19:54:12.440173 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:54:14.553541 locksmithd[1173]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:54:16.978433 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. Feb 9 19:54:19.312843 kernel: loop0: detected capacity change from 0 to 2097152 Feb 9 19:54:19.336310 systemd-nspawn[1211]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. Feb 9 19:54:19.336958 systemd-nspawn[1211]: Press ^] three times within 1s to kill container. Feb 9 19:54:19.354467 kernel: EXT4-fs (loop0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:54:19.382279 systemd[1]: tmp-unifiedPD4fgf.mount: Deactivated successfully. Feb 9 19:54:19.403141 sshd_keygen[1138]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:54:19.450386 systemd[1]: Finished sshd-keygen.service. Feb 9 19:54:19.461834 systemd[1]: Starting issuegen.service... Feb 9 19:54:19.474508 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:54:19.474802 systemd[1]: Finished issuegen.service. Feb 9 19:54:19.483541 systemd[1]: Started oem-gce.service. Feb 9 19:54:19.493597 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:54:19.504257 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:54:19.515804 systemd[1]: Started getty@tty1.service. Feb 9 19:54:19.526358 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:54:19.535285 systemd[1]: Reached target getty.target. Feb 9 19:54:19.542914 systemd[1]: Reached target multi-user.target. Feb 9 19:54:19.555553 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:54:19.570300 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:54:19.570560 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:54:19.580994 systemd[1]: Startup finished in 1.103s (kernel) + 8.743s (initrd) + 16.949s (userspace) = 26.796s. Feb 9 19:54:19.586943 systemd-nspawn[1211]: + '[' -e /etc/default/instance_configs.cfg.template ']' Feb 9 19:54:19.587147 systemd-nspawn[1211]: + echo -e '[InstanceSetup]\nset_host_keys = false' Feb 9 19:54:19.587255 systemd-nspawn[1211]: + /usr/bin/google_instance_setup Feb 9 19:54:19.675727 systemd[1]: Created slice system-sshd.slice. Feb 9 19:54:19.678426 systemd[1]: Started sshd@0-10.128.0.58:22-147.75.109.163:54764.service. Feb 9 19:54:20.023129 sshd[1231]: Accepted publickey for core from 147.75.109.163 port 54764 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:54:20.026405 sshd[1231]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:54:20.045966 systemd[1]: Created slice user-500.slice. Feb 9 19:54:20.049353 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:54:20.053811 systemd-logind[1136]: New session 1 of user core. Feb 9 19:54:20.065690 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:54:20.067966 systemd[1]: Starting user@500.service... Feb 9 19:54:20.084291 (systemd)[1234]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:54:20.243798 systemd[1234]: Queued start job for default target default.target. Feb 9 19:54:20.244659 systemd[1234]: Reached target paths.target. Feb 9 19:54:20.244702 systemd[1234]: Reached target sockets.target. Feb 9 19:54:20.244724 systemd[1234]: Reached target timers.target. Feb 9 19:54:20.244753 systemd[1234]: Reached target basic.target. Feb 9 19:54:20.244843 systemd[1234]: Reached target default.target. Feb 9 19:54:20.244899 systemd[1234]: Startup finished in 148ms. Feb 9 19:54:20.244939 systemd[1]: Started user@500.service. Feb 9 19:54:20.246636 systemd[1]: Started session-1.scope. Feb 9 19:54:20.470523 systemd[1]: Started sshd@1-10.128.0.58:22-147.75.109.163:54778.service. Feb 9 19:54:20.480092 instance-setup[1229]: INFO Running google_set_multiqueue. Feb 9 19:54:20.499214 instance-setup[1229]: INFO Set channels for eth0 to 2. Feb 9 19:54:20.502985 instance-setup[1229]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. Feb 9 19:54:20.504396 instance-setup[1229]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 Feb 9 19:54:20.504993 instance-setup[1229]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. Feb 9 19:54:20.506623 instance-setup[1229]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 Feb 9 19:54:20.506786 instance-setup[1229]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. Feb 9 19:54:20.508612 instance-setup[1229]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 Feb 9 19:54:20.508771 instance-setup[1229]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. Feb 9 19:54:20.510696 instance-setup[1229]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 Feb 9 19:54:20.523421 instance-setup[1229]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus Feb 9 19:54:20.523637 instance-setup[1229]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus Feb 9 19:54:20.568503 systemd-nspawn[1211]: + /usr/bin/google_metadata_script_runner --script-type startup Feb 9 19:54:20.780922 sshd[1249]: Accepted publickey for core from 147.75.109.163 port 54778 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:54:20.782667 sshd[1249]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:54:20.791568 systemd[1]: Started session-2.scope. Feb 9 19:54:20.794170 systemd-logind[1136]: New session 2 of user core. Feb 9 19:54:20.931900 startup-script[1275]: INFO Starting startup scripts. Feb 9 19:54:20.946401 startup-script[1275]: INFO No startup scripts found in metadata. Feb 9 19:54:20.946612 startup-script[1275]: INFO Finished running startup scripts. Feb 9 19:54:20.989067 systemd-nspawn[1211]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM Feb 9 19:54:20.989067 systemd-nspawn[1211]: + daemon_pids=() Feb 9 19:54:20.989376 systemd-nspawn[1211]: + for d in accounts clock_skew network Feb 9 19:54:20.989795 systemd-nspawn[1211]: + daemon_pids+=($!) Feb 9 19:54:20.989945 systemd-nspawn[1211]: + /usr/bin/google_accounts_daemon Feb 9 19:54:20.990183 systemd-nspawn[1211]: + for d in accounts clock_skew network Feb 9 19:54:20.990616 systemd-nspawn[1211]: + daemon_pids+=($!) Feb 9 19:54:20.990757 systemd-nspawn[1211]: + /usr/bin/google_clock_skew_daemon Feb 9 19:54:20.991001 systemd-nspawn[1211]: + for d in accounts clock_skew network Feb 9 19:54:20.991484 systemd-nspawn[1211]: + daemon_pids+=($!) Feb 9 19:54:20.991749 systemd-nspawn[1211]: + NOTIFY_SOCKET=/run/systemd/notify Feb 9 19:54:20.991977 systemd-nspawn[1211]: + /usr/bin/systemd-notify --ready Feb 9 19:54:20.992973 systemd-nspawn[1211]: + /usr/bin/google_network_daemon Feb 9 19:54:21.003918 sshd[1249]: pam_unix(sshd:session): session closed for user core Feb 9 19:54:21.008792 systemd[1]: sshd@1-10.128.0.58:22-147.75.109.163:54778.service: Deactivated successfully. Feb 9 19:54:21.010002 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:54:21.012824 systemd-logind[1136]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:54:21.014995 systemd-logind[1136]: Removed session 2. Feb 9 19:54:21.049995 systemd[1]: Started sshd@2-10.128.0.58:22-147.75.109.163:54792.service. Feb 9 19:54:21.090006 systemd-nspawn[1211]: + wait -n 36 37 38 Feb 9 19:54:21.367299 sshd[1286]: Accepted publickey for core from 147.75.109.163 port 54792 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:54:21.368814 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:54:21.377478 systemd[1]: Started session-3.scope. Feb 9 19:54:21.379937 systemd-logind[1136]: New session 3 of user core. Feb 9 19:54:21.578772 sshd[1286]: pam_unix(sshd:session): session closed for user core Feb 9 19:54:21.582950 systemd[1]: sshd@2-10.128.0.58:22-147.75.109.163:54792.service: Deactivated successfully. Feb 9 19:54:21.584110 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:54:21.586762 systemd-logind[1136]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:54:21.588329 systemd-logind[1136]: Removed session 3. Feb 9 19:54:21.626556 systemd[1]: Started sshd@3-10.128.0.58:22-147.75.109.163:54802.service. Feb 9 19:54:21.726411 google-networking[1282]: INFO Starting Google Networking daemon. Feb 9 19:54:21.784436 google-clock-skew[1281]: INFO Starting Google Clock Skew daemon. Feb 9 19:54:21.797978 google-clock-skew[1281]: INFO Clock drift token has changed: 0. Feb 9 19:54:21.803147 systemd-nspawn[1211]: hwclock: Cannot access the Hardware Clock via any known method. Feb 9 19:54:21.803147 systemd-nspawn[1211]: hwclock: Use the --verbose option to see the details of our search for an access method. Feb 9 19:54:21.803928 google-clock-skew[1281]: WARNING Failed to sync system time with hardware clock. Feb 9 19:54:21.888308 groupadd[1302]: group added to /etc/group: name=google-sudoers, GID=1000 Feb 9 19:54:21.893826 groupadd[1302]: group added to /etc/gshadow: name=google-sudoers Feb 9 19:54:21.898368 groupadd[1302]: new group: name=google-sudoers, GID=1000 Feb 9 19:54:21.912902 google-accounts[1280]: INFO Starting Google Accounts daemon. Feb 9 19:54:21.940456 sshd[1296]: Accepted publickey for core from 147.75.109.163 port 54802 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:54:21.941965 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:54:21.943158 google-accounts[1280]: WARNING OS Login not installed. Feb 9 19:54:21.944665 google-accounts[1280]: INFO Creating a new user account for 0. Feb 9 19:54:21.950296 systemd-logind[1136]: New session 4 of user core. Feb 9 19:54:21.950662 systemd[1]: Started session-4.scope. Feb 9 19:54:21.954433 systemd-nspawn[1211]: useradd: invalid user name '0': use --badname to ignore Feb 9 19:54:21.959332 google-accounts[1280]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. Feb 9 19:54:22.159578 sshd[1296]: pam_unix(sshd:session): session closed for user core Feb 9 19:54:22.164171 systemd[1]: sshd@3-10.128.0.58:22-147.75.109.163:54802.service: Deactivated successfully. Feb 9 19:54:22.165204 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:54:22.166063 systemd-logind[1136]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:54:22.167313 systemd-logind[1136]: Removed session 4. Feb 9 19:54:22.204561 systemd[1]: Started sshd@4-10.128.0.58:22-147.75.109.163:54814.service. Feb 9 19:54:22.494704 sshd[1316]: Accepted publickey for core from 147.75.109.163 port 54814 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:54:22.496743 sshd[1316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:54:22.503323 systemd[1]: Started session-5.scope. Feb 9 19:54:22.503952 systemd-logind[1136]: New session 5 of user core. Feb 9 19:54:22.694767 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:54:22.695174 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:54:22.705798 dbus-daemon[1114]: \xd0M\xfa\x842V: received setenforce notice (enforcing=1477749984) Feb 9 19:54:22.708253 sudo[1319]: pam_unix(sudo:session): session closed for user root Feb 9 19:54:22.753162 sshd[1316]: pam_unix(sshd:session): session closed for user core Feb 9 19:54:22.758392 systemd[1]: sshd@4-10.128.0.58:22-147.75.109.163:54814.service: Deactivated successfully. Feb 9 19:54:22.759709 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:54:22.760726 systemd-logind[1136]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:54:22.762132 systemd-logind[1136]: Removed session 5. Feb 9 19:54:22.800385 systemd[1]: Started sshd@5-10.128.0.58:22-147.75.109.163:54824.service. Feb 9 19:54:23.093568 sshd[1323]: Accepted publickey for core from 147.75.109.163 port 54824 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:54:23.095775 sshd[1323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:54:23.102516 systemd[1]: Started session-6.scope. Feb 9 19:54:23.103136 systemd-logind[1136]: New session 6 of user core. Feb 9 19:54:23.273593 sudo[1327]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:54:23.273989 sudo[1327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:54:23.278302 sudo[1327]: pam_unix(sudo:session): session closed for user root Feb 9 19:54:23.290902 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:54:23.291285 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:54:23.304280 systemd[1]: Stopping audit-rules.service... Feb 9 19:54:23.304000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:54:23.309693 auditctl[1330]: No rules Feb 9 19:54:23.312890 kernel: kauditd_printk_skb: 180 callbacks suppressed Feb 9 19:54:23.313023 kernel: audit: type=1305 audit(1707508463.304:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:54:23.310456 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:54:23.310727 systemd[1]: Stopped audit-rules.service. Feb 9 19:54:23.314319 systemd[1]: Starting audit-rules.service... Feb 9 19:54:23.304000 audit[1330]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd6a914980 a2=420 a3=0 items=0 ppid=1 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:23.359263 kernel: audit: type=1300 audit(1707508463.304:164): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd6a914980 a2=420 a3=0 items=0 ppid=1 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:23.359508 kernel: audit: type=1327 audit(1707508463.304:164): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:54:23.304000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:54:23.391107 kernel: audit: type=1131 audit(1707508463.309:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:23.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:23.396919 augenrules[1347]: No rules Feb 9 19:54:23.397793 systemd[1]: Finished audit-rules.service. Feb 9 19:54:23.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:23.399471 sudo[1326]: pam_unix(sudo:session): session closed for user root Feb 9 19:54:23.397000 audit[1326]: USER_END pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:54:23.446797 kernel: audit: type=1130 audit(1707508463.396:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:23.446953 kernel: audit: type=1106 audit(1707508463.397:167): pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:54:23.446998 kernel: audit: type=1104 audit(1707508463.397:168): pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:54:23.397000 audit[1326]: CRED_DISP pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:54:23.450238 sshd[1323]: pam_unix(sshd:session): session closed for user core Feb 9 19:54:23.455633 systemd-logind[1136]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:54:23.458088 systemd[1]: sshd@5-10.128.0.58:22-147.75.109.163:54824.service: Deactivated successfully. Feb 9 19:54:23.459189 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:54:23.461296 systemd-logind[1136]: Removed session 6. Feb 9 19:54:23.451000 audit[1323]: USER_END pid=1323 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:23.491985 systemd[1]: Started sshd@6-10.128.0.58:22-147.75.109.163:54826.service. Feb 9 19:54:23.502463 kernel: audit: type=1106 audit(1707508463.451:169): pid=1323 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:23.502619 kernel: audit: type=1104 audit(1707508463.451:170): pid=1323 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:23.451000 audit[1323]: CRED_DISP pid=1323 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:23.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.58:22-147.75.109.163:54824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:23.552420 kernel: audit: type=1131 audit(1707508463.456:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.58:22-147.75.109.163:54824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:23.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.58:22-147.75.109.163:54826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:23.788000 audit[1353]: USER_ACCT pid=1353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:23.789478 sshd[1353]: Accepted publickey for core from 147.75.109.163 port 54826 ssh2: RSA SHA256:gHuyt805b0E//lBVQS5dx6KwwMuuFJQYy4yl8Es5sNg Feb 9 19:54:23.790000 audit[1353]: CRED_ACQ pid=1353 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:23.790000 audit[1353]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe923aa620 a2=3 a3=0 items=0 ppid=1 pid=1353 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:23.790000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:54:23.791560 sshd[1353]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:54:23.798400 systemd[1]: Started session-7.scope. Feb 9 19:54:23.799390 systemd-logind[1136]: New session 7 of user core. Feb 9 19:54:23.807000 audit[1353]: USER_START pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:23.809000 audit[1355]: CRED_ACQ pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:23.966000 audit[1356]: USER_ACCT pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:54:23.967291 sudo[1356]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:54:23.967000 audit[1356]: CRED_REFR pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:54:23.967721 sudo[1356]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:54:23.969000 audit[1356]: USER_START pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:54:24.657650 systemd[1]: Reloading. Feb 9 19:54:24.761740 /usr/lib/systemd/system-generators/torcx-generator[1386]: time="2024-02-09T19:54:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:54:24.761795 /usr/lib/systemd/system-generators/torcx-generator[1386]: time="2024-02-09T19:54:24Z" level=info msg="torcx already run" Feb 9 19:54:24.884929 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:54:24.884960 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:54:24.912472 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:54:25.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.000000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.000000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit: BPF prog-id=34 op=LOAD Feb 9 19:54:25.001000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit: BPF prog-id=35 op=LOAD Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.001000 audit: BPF prog-id=36 op=LOAD Feb 9 19:54:25.001000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:54:25.001000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:54:25.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.003000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.003000 audit: BPF prog-id=37 op=LOAD Feb 9 19:54:25.004000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit: BPF prog-id=38 op=LOAD Feb 9 19:54:25.005000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit: BPF prog-id=39 op=LOAD Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.006000 audit: BPF prog-id=40 op=LOAD Feb 9 19:54:25.006000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:54:25.006000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:54:25.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.010000 audit: BPF prog-id=41 op=LOAD Feb 9 19:54:25.010000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:54:25.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.011000 audit: BPF prog-id=42 op=LOAD Feb 9 19:54:25.011000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:54:25.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit: BPF prog-id=43 op=LOAD Feb 9 19:54:25.012000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit: BPF prog-id=44 op=LOAD Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.012000 audit: BPF prog-id=45 op=LOAD Feb 9 19:54:25.012000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:54:25.012000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit: BPF prog-id=46 op=LOAD Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.013000 audit: BPF prog-id=47 op=LOAD Feb 9 19:54:25.013000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:54:25.013000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:54:25.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.017000 audit: BPF prog-id=48 op=LOAD Feb 9 19:54:25.017000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:54:25.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit: BPF prog-id=49 op=LOAD Feb 9 19:54:25.047000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit: BPF prog-id=50 op=LOAD Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:25.047000 audit: BPF prog-id=51 op=LOAD Feb 9 19:54:25.047000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:54:25.047000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:54:25.064730 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:54:25.075690 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:54:25.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:25.076659 systemd[1]: Reached target network-online.target. Feb 9 19:54:25.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:25.079728 systemd[1]: Started kubelet.service. Feb 9 19:54:25.101015 systemd[1]: Starting coreos-metadata.service... Feb 9 19:54:25.182970 coreos-metadata[1438]: Feb 09 19:54:25.182 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/hostname: Attempt #1 Feb 9 19:54:25.185493 coreos-metadata[1438]: Feb 09 19:54:25.185 INFO Fetch successful Feb 9 19:54:25.185777 coreos-metadata[1438]: Feb 09 19:54:25.185 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/access-configs/0/external-ip: Attempt #1 Feb 9 19:54:25.191816 coreos-metadata[1438]: Feb 09 19:54:25.191 INFO Fetch successful Feb 9 19:54:25.192087 coreos-metadata[1438]: Feb 09 19:54:25.191 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/network-interfaces/0/ip: Attempt #1 Feb 9 19:54:25.193527 coreos-metadata[1438]: Feb 09 19:54:25.193 INFO Fetch successful Feb 9 19:54:25.193527 coreos-metadata[1438]: Feb 09 19:54:25.193 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/machine-type: Attempt #1 Feb 9 19:54:25.196157 coreos-metadata[1438]: Feb 09 19:54:25.194 INFO Fetch successful Feb 9 19:54:25.202621 kubelet[1429]: E0209 19:54:25.202552 1429 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:54:25.205821 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:54:25.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:54:25.206039 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:54:25.211390 systemd[1]: Finished coreos-metadata.service. Feb 9 19:54:25.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:25.669068 systemd[1]: Stopped kubelet.service. Feb 9 19:54:25.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:25.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:25.692590 systemd[1]: Reloading. Feb 9 19:54:25.821487 /usr/lib/systemd/system-generators/torcx-generator[1494]: time="2024-02-09T19:54:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:54:25.821536 /usr/lib/systemd/system-generators/torcx-generator[1494]: time="2024-02-09T19:54:25Z" level=info msg="torcx already run" Feb 9 19:54:25.918951 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:54:25.918981 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:54:25.946554 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:54:26.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit: BPF prog-id=52 op=LOAD Feb 9 19:54:26.035000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit: BPF prog-id=53 op=LOAD Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.036000 audit: BPF prog-id=54 op=LOAD Feb 9 19:54:26.036000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:54:26.036000 audit: BPF prog-id=36 op=UNLOAD Feb 9 19:54:26.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.038000 audit: BPF prog-id=55 op=LOAD Feb 9 19:54:26.038000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit: BPF prog-id=56 op=LOAD Feb 9 19:54:26.039000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit: BPF prog-id=57 op=LOAD Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.039000 audit: BPF prog-id=58 op=LOAD Feb 9 19:54:26.039000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:54:26.039000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:54:26.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.042000 audit: BPF prog-id=59 op=LOAD Feb 9 19:54:26.042000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:54:26.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.043000 audit: BPF prog-id=60 op=LOAD Feb 9 19:54:26.043000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:54:26.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit: BPF prog-id=61 op=LOAD Feb 9 19:54:26.044000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit: BPF prog-id=62 op=LOAD Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.044000 audit: BPF prog-id=63 op=LOAD Feb 9 19:54:26.044000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:54:26.044000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit: BPF prog-id=64 op=LOAD Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.045000 audit: BPF prog-id=65 op=LOAD Feb 9 19:54:26.045000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:54:26.045000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:54:26.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.048000 audit: BPF prog-id=66 op=LOAD Feb 9 19:54:26.048000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit: BPF prog-id=67 op=LOAD Feb 9 19:54:26.051000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit: BPF prog-id=68 op=LOAD Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.051000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:26.052000 audit: BPF prog-id=69 op=LOAD Feb 9 19:54:26.052000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:54:26.052000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:54:26.077948 systemd[1]: Started kubelet.service. Feb 9 19:54:26.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:26.149312 kubelet[1538]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:54:26.149312 kubelet[1538]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:54:26.150013 kubelet[1538]: I0209 19:54:26.149425 1538 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:54:26.151549 kubelet[1538]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:54:26.151549 kubelet[1538]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:54:27.102808 kubelet[1538]: I0209 19:54:27.102734 1538 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:54:27.102808 kubelet[1538]: I0209 19:54:27.102791 1538 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:54:27.103242 kubelet[1538]: I0209 19:54:27.103207 1538 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:54:27.106384 kubelet[1538]: I0209 19:54:27.106347 1538 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:54:27.113342 kubelet[1538]: I0209 19:54:27.113290 1538 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:54:27.113776 kubelet[1538]: I0209 19:54:27.113742 1538 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:54:27.113911 kubelet[1538]: I0209 19:54:27.113860 1538 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:54:27.113911 kubelet[1538]: I0209 19:54:27.113892 1538 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:54:27.113911 kubelet[1538]: I0209 19:54:27.113912 1538 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:54:27.114299 kubelet[1538]: I0209 19:54:27.114132 1538 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:54:27.119666 kubelet[1538]: I0209 19:54:27.119617 1538 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:54:27.119666 kubelet[1538]: I0209 19:54:27.119654 1538 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:54:27.119890 kubelet[1538]: I0209 19:54:27.119694 1538 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:54:27.119890 kubelet[1538]: I0209 19:54:27.119721 1538 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:54:27.120517 kubelet[1538]: E0209 19:54:27.120469 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:27.120718 kubelet[1538]: E0209 19:54:27.120698 1538 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:27.121398 kubelet[1538]: I0209 19:54:27.121374 1538 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:54:27.126308 kubelet[1538]: W0209 19:54:27.126277 1538 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:54:27.127091 kubelet[1538]: I0209 19:54:27.127061 1538 server.go:1186] "Started kubelet" Feb 9 19:54:27.129000 audit[1538]: AVC avc: denied { mac_admin } for pid=1538 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:27.129000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:54:27.129000 audit[1538]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009f3dd0 a1=c0008c3560 a2=c0009f3da0 a3=25 items=0 ppid=1 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.129000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:54:27.129000 audit[1538]: AVC avc: denied { mac_admin } for pid=1538 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:27.129000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:54:27.129000 audit[1538]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b34c40 a1=c0008c3578 a2=c0009f3e60 a3=25 items=0 ppid=1 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.129000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:54:27.130639 kubelet[1538]: I0209 19:54:27.129926 1538 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:54:27.130639 kubelet[1538]: I0209 19:54:27.129989 1538 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:54:27.130639 kubelet[1538]: I0209 19:54:27.130100 1538 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:54:27.131969 kubelet[1538]: E0209 19:54:27.131830 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77213e621", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 127019041, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 127019041, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:27.132245 kubelet[1538]: W0209 19:54:27.132227 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.128.0.58" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:54:27.132391 kubelet[1538]: E0209 19:54:27.132367 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.58" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:54:27.132571 kubelet[1538]: W0209 19:54:27.132555 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:54:27.132661 kubelet[1538]: E0209 19:54:27.132648 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:54:27.132850 kubelet[1538]: E0209 19:54:27.132833 1538 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:54:27.132988 kubelet[1538]: E0209 19:54:27.132973 1538 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:54:27.133591 kubelet[1538]: I0209 19:54:27.133571 1538 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:54:27.134834 kubelet[1538]: I0209 19:54:27.134810 1538 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:54:27.136114 kubelet[1538]: I0209 19:54:27.136056 1538 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:54:27.138048 kubelet[1538]: I0209 19:54:27.138009 1538 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:54:27.148866 kubelet[1538]: E0209 19:54:27.148718 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e7726e78e7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 132954855, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 132954855, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:27.149355 kubelet[1538]: E0209 19:54:27.149319 1538 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.128.0.58" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:54:27.149625 kubelet[1538]: W0209 19:54:27.149604 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:54:27.150169 kubelet[1538]: E0209 19:54:27.150148 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:54:27.194462 kubelet[1538]: I0209 19:54:27.194406 1538 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:54:27.194746 kubelet[1538]: I0209 19:54:27.194727 1538 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:54:27.194887 kubelet[1538]: I0209 19:54:27.194874 1538 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:54:27.195731 kubelet[1538]: E0209 19:54:27.195598 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605da21", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.58 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193207329, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193207329, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:27.197227 kubelet[1538]: E0209 19:54:27.197133 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605fbb1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.58 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193215921, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193215921, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:27.197000 audit[1550]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1550 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.197000 audit[1550]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe2a1cbcb0 a2=0 a3=7ffe2a1cbc9c items=0 ppid=1538 pid=1550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:54:27.198763 kubelet[1538]: I0209 19:54:27.198296 1538 policy_none.go:49] "None policy: Start" Feb 9 19:54:27.199345 kubelet[1538]: E0209 19:54:27.199231 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e776060d45", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.58 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193220421, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193220421, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:27.200414 kubelet[1538]: I0209 19:54:27.200393 1538 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:54:27.200657 kubelet[1538]: I0209 19:54:27.200640 1538 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:54:27.201000 audit[1556]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1556 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.201000 audit[1556]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe6def95b0 a2=0 a3=7ffe6def959c items=0 ppid=1538 pid=1556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:54:27.209427 systemd[1]: Created slice kubepods.slice. Feb 9 19:54:27.217782 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:54:27.222645 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:54:27.205000 audit[1558]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1558 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.205000 audit[1558]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffda29d3fa0 a2=0 a3=7ffda29d3f8c items=0 ppid=1538 pid=1558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:54:27.230638 kubelet[1538]: I0209 19:54:27.230593 1538 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:54:27.230000 audit[1538]: AVC avc: denied { mac_admin } for pid=1538 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:27.230000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:54:27.230000 audit[1538]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000911770 a1=c0010ffd88 a2=c000911740 a3=25 items=0 ppid=1 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.230000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:54:27.231109 kubelet[1538]: I0209 19:54:27.230679 1538 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:54:27.231109 kubelet[1538]: I0209 19:54:27.230922 1538 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:54:27.232795 kubelet[1538]: E0209 19:54:27.232770 1538 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.58\" not found" Feb 9 19:54:27.236000 audit[1563]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1563 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.236000 audit[1563]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd2395bb60 a2=0 a3=7ffd2395bb4c items=0 ppid=1538 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.236000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:54:27.238388 kubelet[1538]: E0209 19:54:27.237362 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e7788f8164", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 235783012, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 235783012, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:27.239025 kubelet[1538]: I0209 19:54:27.238150 1538 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.58" Feb 9 19:54:27.240279 kubelet[1538]: E0209 19:54:27.240169 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605da21", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.58 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193207329, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 238103248, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e77605da21" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:27.240609 kubelet[1538]: E0209 19:54:27.240583 1538 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.58" Feb 9 19:54:27.241415 kubelet[1538]: E0209 19:54:27.241328 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605fbb1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.58 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193215921, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 238111188, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e77605fbb1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:27.242686 kubelet[1538]: E0209 19:54:27.242577 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e776060d45", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.58 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193220421, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 238115910, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e776060d45" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:27.296000 audit[1568]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1568 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.296000 audit[1568]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff5b037270 a2=0 a3=7fff5b03725c items=0 ppid=1538 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:54:27.299000 audit[1569]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.299000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffec972b290 a2=0 a3=7ffec972b27c items=0 ppid=1538 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:54:27.307000 audit[1572]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.307000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcce40cea0 a2=0 a3=7ffcce40ce8c items=0 ppid=1538 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.307000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:54:27.313000 audit[1575]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1575 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.313000 audit[1575]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff4575fba0 a2=0 a3=7fff4575fb8c items=0 ppid=1538 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:54:27.315000 audit[1576]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=1576 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.315000 audit[1576]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcd21a5d30 a2=0 a3=7ffcd21a5d1c items=0 ppid=1538 pid=1576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:54:27.317000 audit[1577]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=1577 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.317000 audit[1577]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffddaa47670 a2=0 a3=7ffddaa4765c items=0 ppid=1538 pid=1577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:54:27.320000 audit[1579]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=1579 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.320000 audit[1579]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc329d30f0 a2=0 a3=7ffc329d30dc items=0 ppid=1538 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.320000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:54:27.324000 audit[1581]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1581 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.324000 audit[1581]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd15007af0 a2=0 a3=7ffd15007adc items=0 ppid=1538 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.324000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:54:27.351526 kubelet[1538]: E0209 19:54:27.351494 1538 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.128.0.58" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:54:27.353000 audit[1584]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1584 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.353000 audit[1584]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffce63cbcc0 a2=0 a3=7ffce63cbcac items=0 ppid=1538 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:54:27.358000 audit[1586]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.358000 audit[1586]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffc8deed7d0 a2=0 a3=7ffc8deed7bc items=0 ppid=1538 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:54:27.370000 audit[1589]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=1589 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.370000 audit[1589]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffdf6093de0 a2=0 a3=7ffdf6093dcc items=0 ppid=1538 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:54:27.372306 kubelet[1538]: I0209 19:54:27.372267 1538 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:54:27.372000 audit[1590]: NETFILTER_CFG table=mangle:17 family=10 entries=2 op=nft_register_chain pid=1590 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.372000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff900d84b0 a2=0 a3=7fff900d849c items=0 ppid=1538 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:54:27.373000 audit[1591]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=1591 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.373000 audit[1591]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3bf555d0 a2=0 a3=7ffd3bf555bc items=0 ppid=1538 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:54:27.374000 audit[1592]: NETFILTER_CFG table=nat:19 family=10 entries=2 op=nft_register_chain pid=1592 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.374000 audit[1592]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fffd3597b10 a2=0 a3=7fffd3597afc items=0 ppid=1538 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.374000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:54:27.375000 audit[1593]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=1593 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.375000 audit[1593]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2f64df90 a2=0 a3=7ffd2f64df7c items=0 ppid=1538 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.375000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:54:27.377000 audit[1595]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=1595 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:54:27.377000 audit[1595]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff25a62fb0 a2=0 a3=7fff25a62f9c items=0 ppid=1538 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.377000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:54:27.377000 audit[1596]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=1596 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.377000 audit[1596]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc782e07e0 a2=0 a3=7ffc782e07cc items=0 ppid=1538 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:54:27.379000 audit[1597]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=1597 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.379000 audit[1597]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffc5d1afb20 a2=0 a3=7ffc5d1afb0c items=0 ppid=1538 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.379000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:54:27.382000 audit[1599]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=1599 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.382000 audit[1599]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffca258fea0 a2=0 a3=7ffca258fe8c items=0 ppid=1538 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.382000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:54:27.384000 audit[1600]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=1600 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.384000 audit[1600]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff2eaba170 a2=0 a3=7fff2eaba15c items=0 ppid=1538 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.384000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:54:27.385000 audit[1601]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=1601 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.385000 audit[1601]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4461bcd0 a2=0 a3=7ffd4461bcbc items=0 ppid=1538 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.385000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:54:27.388000 audit[1603]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=1603 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.388000 audit[1603]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffee396bbb0 a2=0 a3=7ffee396bb9c items=0 ppid=1538 pid=1603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.388000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:54:27.392000 audit[1605]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=1605 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.392000 audit[1605]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffb15ae680 a2=0 a3=7fffb15ae66c items=0 ppid=1538 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:54:27.395000 audit[1607]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=1607 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.395000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe0c0a1420 a2=0 a3=7ffe0c0a140c items=0 ppid=1538 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.395000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:54:27.400000 audit[1609]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1609 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.400000 audit[1609]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffff8f6d410 a2=0 a3=7ffff8f6d3fc items=0 ppid=1538 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.400000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:54:27.406000 audit[1611]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=1611 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.406000 audit[1611]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffd4e60c0b0 a2=0 a3=7ffd4e60c09c items=0 ppid=1538 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.406000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:54:27.408162 kubelet[1538]: I0209 19:54:27.408126 1538 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:54:27.408162 kubelet[1538]: I0209 19:54:27.408164 1538 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:54:27.408323 kubelet[1538]: I0209 19:54:27.408205 1538 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:54:27.408323 kubelet[1538]: E0209 19:54:27.408269 1538 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 19:54:27.409000 audit[1612]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1612 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.409000 audit[1612]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe591448e0 a2=0 a3=7ffe591448cc items=0 ppid=1538 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.410260 kubelet[1538]: W0209 19:54:27.410138 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:54:27.410260 kubelet[1538]: E0209 19:54:27.410174 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:54:27.409000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:54:27.411000 audit[1613]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=1613 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.411000 audit[1613]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0fbacb70 a2=0 a3=7ffe0fbacb5c items=0 ppid=1538 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.411000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:54:27.413000 audit[1614]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=1614 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:54:27.413000 audit[1614]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff05dbc130 a2=0 a3=7fff05dbc11c items=0 ppid=1538 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:27.413000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:54:27.441802 kubelet[1538]: I0209 19:54:27.441756 1538 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.58" Feb 9 19:54:27.443329 kubelet[1538]: E0209 19:54:27.443296 1538 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.58" Feb 9 19:54:27.443519 kubelet[1538]: E0209 19:54:27.443291 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605da21", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.58 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193207329, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 441617305, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e77605da21" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:27.445046 kubelet[1538]: E0209 19:54:27.444899 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605fbb1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.58 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193215921, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 441626080, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e77605fbb1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:27.530115 kubelet[1538]: E0209 19:54:27.529998 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e776060d45", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.58 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193220421, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 441681707, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e776060d45" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:27.753316 kubelet[1538]: E0209 19:54:27.753270 1538 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.128.0.58" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:54:27.844869 kubelet[1538]: I0209 19:54:27.844811 1538 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.58" Feb 9 19:54:27.846297 kubelet[1538]: E0209 19:54:27.846249 1538 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.58" Feb 9 19:54:27.847745 kubelet[1538]: E0209 19:54:27.847646 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605da21", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.58 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193207329, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 844753959, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e77605da21" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:27.930060 kubelet[1538]: E0209 19:54:27.929935 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605fbb1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.58 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193215921, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 844769393, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e77605fbb1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:28.121018 kubelet[1538]: E0209 19:54:28.120856 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:28.129588 kubelet[1538]: E0209 19:54:28.129424 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e776060d45", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.58 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193220421, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 844773834, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e776060d45" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:28.337861 kubelet[1538]: W0209 19:54:28.337822 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.128.0.58" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:54:28.337861 kubelet[1538]: E0209 19:54:28.337864 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.58" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:54:28.416068 kubelet[1538]: W0209 19:54:28.415925 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:54:28.416068 kubelet[1538]: E0209 19:54:28.415974 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:54:28.555306 kubelet[1538]: E0209 19:54:28.555245 1538 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.128.0.58" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:54:28.647916 kubelet[1538]: I0209 19:54:28.647856 1538 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.58" Feb 9 19:54:28.649270 kubelet[1538]: E0209 19:54:28.649210 1538 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.58" Feb 9 19:54:28.649962 kubelet[1538]: E0209 19:54:28.649832 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605da21", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.58 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193207329, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 28, 647801243, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e77605da21" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:28.651431 kubelet[1538]: E0209 19:54:28.651334 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605fbb1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.58 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193215921, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 28, 647808990, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e77605fbb1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:28.713282 kubelet[1538]: W0209 19:54:28.713234 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:54:28.713282 kubelet[1538]: E0209 19:54:28.713282 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:54:28.730182 kubelet[1538]: E0209 19:54:28.730055 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e776060d45", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.58 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193220421, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 28, 647814410, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e776060d45" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:28.953513 kubelet[1538]: W0209 19:54:28.953467 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:54:28.953513 kubelet[1538]: E0209 19:54:28.953511 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:54:29.121667 kubelet[1538]: E0209 19:54:29.121522 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:30.121936 kubelet[1538]: E0209 19:54:30.121856 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:30.157410 kubelet[1538]: E0209 19:54:30.157349 1538 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.128.0.58" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:54:30.250787 kubelet[1538]: I0209 19:54:30.250424 1538 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.58" Feb 9 19:54:30.252064 kubelet[1538]: E0209 19:54:30.252015 1538 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.58" Feb 9 19:54:30.252214 kubelet[1538]: E0209 19:54:30.252014 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605da21", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.58 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193207329, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 30, 250302901, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e77605da21" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:30.253284 kubelet[1538]: E0209 19:54:30.253164 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605fbb1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.58 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193215921, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 30, 250331929, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e77605fbb1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:30.254326 kubelet[1538]: E0209 19:54:30.254229 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e776060d45", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.58 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193220421, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 30, 250350618, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e776060d45" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:30.640244 kubelet[1538]: W0209 19:54:30.640201 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:54:30.640244 kubelet[1538]: E0209 19:54:30.640249 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:54:30.659858 kubelet[1538]: W0209 19:54:30.659816 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.128.0.58" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:54:30.659858 kubelet[1538]: E0209 19:54:30.659867 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.58" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:54:31.073387 kubelet[1538]: W0209 19:54:31.073336 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:54:31.073669 kubelet[1538]: E0209 19:54:31.073628 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:54:31.122779 kubelet[1538]: E0209 19:54:31.122714 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:31.549535 kubelet[1538]: W0209 19:54:31.549483 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:54:31.549535 kubelet[1538]: E0209 19:54:31.549540 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:54:32.123903 kubelet[1538]: E0209 19:54:32.123820 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:33.124595 kubelet[1538]: E0209 19:54:33.124514 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:33.360043 kubelet[1538]: E0209 19:54:33.359985 1538 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.128.0.58" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:54:33.453861 kubelet[1538]: I0209 19:54:33.453817 1538 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.58" Feb 9 19:54:33.455578 kubelet[1538]: E0209 19:54:33.455543 1538 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.128.0.58" Feb 9 19:54:33.455763 kubelet[1538]: E0209 19:54:33.455472 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605da21", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.128.0.58 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193207329, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 33, 453742367, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e77605da21" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:33.457676 kubelet[1538]: E0209 19:54:33.457577 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e77605fbb1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.128.0.58 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193215921, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 33, 453759214, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e77605fbb1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:33.459102 kubelet[1538]: E0209 19:54:33.459011 1538 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58.17b249e776060d45", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.128.0.58", UID:"10.128.0.58", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.128.0.58 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.128.0.58"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 54, 27, 193220421, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 54, 33, 453777093, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.128.0.58.17b249e776060d45" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:54:34.125292 kubelet[1538]: E0209 19:54:34.125224 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:34.980642 kubelet[1538]: W0209 19:54:34.980596 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.128.0.58" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:54:34.980642 kubelet[1538]: E0209 19:54:34.980645 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.128.0.58" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:54:35.126328 kubelet[1538]: E0209 19:54:35.126261 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:36.127015 kubelet[1538]: E0209 19:54:36.126914 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:36.449486 kubelet[1538]: W0209 19:54:36.449418 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:54:36.449486 kubelet[1538]: E0209 19:54:36.449489 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:54:36.940343 kubelet[1538]: W0209 19:54:36.940262 1538 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:54:36.940343 kubelet[1538]: E0209 19:54:36.940334 1538 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:54:37.106478 kubelet[1538]: I0209 19:54:37.106347 1538 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 19:54:37.128048 kubelet[1538]: E0209 19:54:37.127980 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:37.233233 kubelet[1538]: E0209 19:54:37.232981 1538 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.128.0.58\" not found" Feb 9 19:54:37.506917 kubelet[1538]: E0209 19:54:37.506734 1538 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.128.0.58" not found Feb 9 19:54:38.128843 kubelet[1538]: E0209 19:54:38.128744 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:38.743129 kubelet[1538]: E0209 19:54:38.743065 1538 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.128.0.58" not found Feb 9 19:54:39.129960 kubelet[1538]: E0209 19:54:39.129756 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:39.766790 kubelet[1538]: E0209 19:54:39.766718 1538 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.128.0.58\" not found" node="10.128.0.58" Feb 9 19:54:39.857518 kubelet[1538]: I0209 19:54:39.857481 1538 kubelet_node_status.go:70] "Attempting to register node" node="10.128.0.58" Feb 9 19:54:40.130868 kubelet[1538]: E0209 19:54:40.130711 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:40.144553 kubelet[1538]: I0209 19:54:40.144487 1538 kubelet_node_status.go:73] "Successfully registered node" node="10.128.0.58" Feb 9 19:54:40.169182 kubelet[1538]: E0209 19:54:40.169136 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:40.269380 kubelet[1538]: E0209 19:54:40.269320 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:40.369679 kubelet[1538]: E0209 19:54:40.369556 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:40.470387 kubelet[1538]: E0209 19:54:40.470338 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:40.571411 kubelet[1538]: E0209 19:54:40.571343 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:40.603471 sudo[1356]: pam_unix(sudo:session): session closed for user root Feb 9 19:54:40.609663 kernel: kauditd_printk_skb: 541 callbacks suppressed Feb 9 19:54:40.609714 kernel: audit: type=1106 audit(1707508480.603:636): pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:54:40.603000 audit[1356]: USER_END pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:54:40.603000 audit[1356]: CRED_DISP pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:54:40.648850 sshd[1353]: pam_unix(sshd:session): session closed for user core Feb 9 19:54:40.654161 systemd-logind[1136]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:54:40.656852 systemd[1]: sshd@6-10.128.0.58:22-147.75.109.163:54826.service: Deactivated successfully. Feb 9 19:54:40.658005 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:54:40.661078 kernel: audit: type=1104 audit(1707508480.603:637): pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:54:40.649000 audit[1353]: USER_END pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:40.661754 systemd-logind[1136]: Removed session 7. Feb 9 19:54:40.671929 kubelet[1538]: E0209 19:54:40.671842 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:40.649000 audit[1353]: CRED_DISP pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:40.720939 kernel: audit: type=1106 audit(1707508480.649:638): pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:40.721154 kernel: audit: type=1104 audit(1707508480.649:639): pid=1353 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Feb 9 19:54:40.721194 kernel: audit: type=1131 audit(1707508480.654:640): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.58:22-147.75.109.163:54826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:40.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.58:22-147.75.109.163:54826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:40.773335 kubelet[1538]: E0209 19:54:40.773270 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:40.874173 kubelet[1538]: E0209 19:54:40.874117 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:40.921915 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Feb 9 19:54:40.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:40.945474 kernel: audit: type=1131 audit(1707508480.921:641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:54:40.963000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:54:40.963000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:54:40.978471 kernel: audit: type=1334 audit(1707508480.963:642): prog-id=69 op=UNLOAD Feb 9 19:54:40.978630 kernel: audit: type=1334 audit(1707508480.963:643): prog-id=68 op=UNLOAD Feb 9 19:54:40.978672 kernel: audit: type=1334 audit(1707508480.963:644): prog-id=67 op=UNLOAD Feb 9 19:54:40.963000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:54:40.978833 kubelet[1538]: E0209 19:54:40.978563 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:41.078919 kubelet[1538]: E0209 19:54:41.078807 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:41.131582 kubelet[1538]: E0209 19:54:41.131507 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:41.179627 kubelet[1538]: E0209 19:54:41.179546 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:41.280895 kubelet[1538]: E0209 19:54:41.280741 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:41.381777 kubelet[1538]: E0209 19:54:41.381704 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:41.482241 kubelet[1538]: E0209 19:54:41.482167 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:41.583576 kubelet[1538]: E0209 19:54:41.583381 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:41.683976 kubelet[1538]: E0209 19:54:41.683885 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:41.784158 kubelet[1538]: E0209 19:54:41.784073 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:41.885384 kubelet[1538]: E0209 19:54:41.885182 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:41.986423 kubelet[1538]: E0209 19:54:41.986328 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:42.087465 kubelet[1538]: E0209 19:54:42.087382 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:42.132219 kubelet[1538]: E0209 19:54:42.132132 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:42.188408 kubelet[1538]: E0209 19:54:42.188315 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:42.288796 kubelet[1538]: E0209 19:54:42.288719 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:42.389657 kubelet[1538]: E0209 19:54:42.389579 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:42.490174 kubelet[1538]: E0209 19:54:42.489969 1538 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.128.0.58\" not found" Feb 9 19:54:42.592459 kubelet[1538]: I0209 19:54:42.592392 1538 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 19:54:42.593031 env[1147]: time="2024-02-09T19:54:42.592957915Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:54:42.593665 kubelet[1538]: I0209 19:54:42.593281 1538 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 19:54:43.132836 kubelet[1538]: I0209 19:54:43.132755 1538 apiserver.go:52] "Watching apiserver" Feb 9 19:54:43.133536 kubelet[1538]: E0209 19:54:43.132806 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:43.136413 kubelet[1538]: I0209 19:54:43.136359 1538 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:54:43.136683 kubelet[1538]: I0209 19:54:43.136543 1538 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:54:43.136683 kubelet[1538]: I0209 19:54:43.136637 1538 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:54:43.137146 kubelet[1538]: E0209 19:54:43.136923 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:54:43.139920 kubelet[1538]: I0209 19:54:43.139888 1538 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:54:43.145729 systemd[1]: Created slice kubepods-besteffort-pod7ead9787_1437_4319_8185_2b13ea094834.slice. Feb 9 19:54:43.160050 kubelet[1538]: I0209 19:54:43.159994 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e2ec9463-43c7-4d47-8292-b20b787e7f80-xtables-lock\") pod \"kube-proxy-j8hjc\" (UID: \"e2ec9463-43c7-4d47-8292-b20b787e7f80\") " pod="kube-system/kube-proxy-j8hjc" Feb 9 19:54:43.160050 kubelet[1538]: I0209 19:54:43.160053 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/7ead9787-1437-4319-8185-2b13ea094834-cni-net-dir\") pod \"calico-node-gdgz5\" (UID: \"7ead9787-1437-4319-8185-2b13ea094834\") " pod="calico-system/calico-node-gdgz5" Feb 9 19:54:43.160360 kubelet[1538]: I0209 19:54:43.160090 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f2becf64-cb84-41f4-ab24-14aaa81a8f0b-socket-dir\") pod \"csi-node-driver-gxzmq\" (UID: \"f2becf64-cb84-41f4-ab24-14aaa81a8f0b\") " pod="calico-system/csi-node-driver-gxzmq" Feb 9 19:54:43.160360 kubelet[1538]: I0209 19:54:43.160128 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f2becf64-cb84-41f4-ab24-14aaa81a8f0b-registration-dir\") pod \"csi-node-driver-gxzmq\" (UID: \"f2becf64-cb84-41f4-ab24-14aaa81a8f0b\") " pod="calico-system/csi-node-driver-gxzmq" Feb 9 19:54:43.160360 kubelet[1538]: I0209 19:54:43.160162 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e2ec9463-43c7-4d47-8292-b20b787e7f80-kube-proxy\") pod \"kube-proxy-j8hjc\" (UID: \"e2ec9463-43c7-4d47-8292-b20b787e7f80\") " pod="kube-system/kube-proxy-j8hjc" Feb 9 19:54:43.160360 kubelet[1538]: I0209 19:54:43.160195 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7ead9787-1437-4319-8185-2b13ea094834-var-lib-calico\") pod \"calico-node-gdgz5\" (UID: \"7ead9787-1437-4319-8185-2b13ea094834\") " pod="calico-system/calico-node-gdgz5" Feb 9 19:54:43.160360 kubelet[1538]: I0209 19:54:43.160228 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/7ead9787-1437-4319-8185-2b13ea094834-cni-bin-dir\") pod \"calico-node-gdgz5\" (UID: \"7ead9787-1437-4319-8185-2b13ea094834\") " pod="calico-system/calico-node-gdgz5" Feb 9 19:54:43.160694 kubelet[1538]: I0209 19:54:43.160261 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b4gfg\" (UniqueName: \"kubernetes.io/projected/f2becf64-cb84-41f4-ab24-14aaa81a8f0b-kube-api-access-b4gfg\") pod \"csi-node-driver-gxzmq\" (UID: \"f2becf64-cb84-41f4-ab24-14aaa81a8f0b\") " pod="calico-system/csi-node-driver-gxzmq" Feb 9 19:54:43.160694 kubelet[1538]: I0209 19:54:43.160296 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f2becf64-cb84-41f4-ab24-14aaa81a8f0b-varrun\") pod \"csi-node-driver-gxzmq\" (UID: \"f2becf64-cb84-41f4-ab24-14aaa81a8f0b\") " pod="calico-system/csi-node-driver-gxzmq" Feb 9 19:54:43.160694 kubelet[1538]: I0209 19:54:43.160348 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e2ec9463-43c7-4d47-8292-b20b787e7f80-lib-modules\") pod \"kube-proxy-j8hjc\" (UID: \"e2ec9463-43c7-4d47-8292-b20b787e7f80\") " pod="kube-system/kube-proxy-j8hjc" Feb 9 19:54:43.160694 kubelet[1538]: I0209 19:54:43.160385 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7ead9787-1437-4319-8185-2b13ea094834-lib-modules\") pod \"calico-node-gdgz5\" (UID: \"7ead9787-1437-4319-8185-2b13ea094834\") " pod="calico-system/calico-node-gdgz5" Feb 9 19:54:43.160694 kubelet[1538]: I0209 19:54:43.160425 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/7ead9787-1437-4319-8185-2b13ea094834-policysync\") pod \"calico-node-gdgz5\" (UID: \"7ead9787-1437-4319-8185-2b13ea094834\") " pod="calico-system/calico-node-gdgz5" Feb 9 19:54:43.160933 kubelet[1538]: I0209 19:54:43.160507 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7ead9787-1437-4319-8185-2b13ea094834-tigera-ca-bundle\") pod \"calico-node-gdgz5\" (UID: \"7ead9787-1437-4319-8185-2b13ea094834\") " pod="calico-system/calico-node-gdgz5" Feb 9 19:54:43.160933 kubelet[1538]: I0209 19:54:43.160546 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/7ead9787-1437-4319-8185-2b13ea094834-cni-log-dir\") pod \"calico-node-gdgz5\" (UID: \"7ead9787-1437-4319-8185-2b13ea094834\") " pod="calico-system/calico-node-gdgz5" Feb 9 19:54:43.160933 kubelet[1538]: I0209 19:54:43.160587 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/7ead9787-1437-4319-8185-2b13ea094834-flexvol-driver-host\") pod \"calico-node-gdgz5\" (UID: \"7ead9787-1437-4319-8185-2b13ea094834\") " pod="calico-system/calico-node-gdgz5" Feb 9 19:54:43.160933 kubelet[1538]: I0209 19:54:43.160627 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tqkjb\" (UniqueName: \"kubernetes.io/projected/7ead9787-1437-4319-8185-2b13ea094834-kube-api-access-tqkjb\") pod \"calico-node-gdgz5\" (UID: \"7ead9787-1437-4319-8185-2b13ea094834\") " pod="calico-system/calico-node-gdgz5" Feb 9 19:54:43.160933 kubelet[1538]: I0209 19:54:43.160666 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f2becf64-cb84-41f4-ab24-14aaa81a8f0b-kubelet-dir\") pod \"csi-node-driver-gxzmq\" (UID: \"f2becf64-cb84-41f4-ab24-14aaa81a8f0b\") " pod="calico-system/csi-node-driver-gxzmq" Feb 9 19:54:43.161182 kubelet[1538]: I0209 19:54:43.160706 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jxjj6\" (UniqueName: \"kubernetes.io/projected/e2ec9463-43c7-4d47-8292-b20b787e7f80-kube-api-access-jxjj6\") pod \"kube-proxy-j8hjc\" (UID: \"e2ec9463-43c7-4d47-8292-b20b787e7f80\") " pod="kube-system/kube-proxy-j8hjc" Feb 9 19:54:43.161182 kubelet[1538]: I0209 19:54:43.160744 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7ead9787-1437-4319-8185-2b13ea094834-xtables-lock\") pod \"calico-node-gdgz5\" (UID: \"7ead9787-1437-4319-8185-2b13ea094834\") " pod="calico-system/calico-node-gdgz5" Feb 9 19:54:43.161182 kubelet[1538]: I0209 19:54:43.160782 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/7ead9787-1437-4319-8185-2b13ea094834-node-certs\") pod \"calico-node-gdgz5\" (UID: \"7ead9787-1437-4319-8185-2b13ea094834\") " pod="calico-system/calico-node-gdgz5" Feb 9 19:54:43.161182 kubelet[1538]: I0209 19:54:43.160820 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/7ead9787-1437-4319-8185-2b13ea094834-var-run-calico\") pod \"calico-node-gdgz5\" (UID: \"7ead9787-1437-4319-8185-2b13ea094834\") " pod="calico-system/calico-node-gdgz5" Feb 9 19:54:43.161182 kubelet[1538]: I0209 19:54:43.160845 1538 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:54:43.164975 systemd[1]: Created slice kubepods-besteffort-pode2ec9463_43c7_4d47_8292_b20b787e7f80.slice. Feb 9 19:54:43.264262 kubelet[1538]: E0209 19:54:43.264214 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.264637 kubelet[1538]: W0209 19:54:43.264606 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.264797 kubelet[1538]: E0209 19:54:43.264775 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.265260 kubelet[1538]: E0209 19:54:43.265237 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.265406 kubelet[1538]: W0209 19:54:43.265377 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.265537 kubelet[1538]: E0209 19:54:43.265521 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.265959 kubelet[1538]: E0209 19:54:43.265935 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.266126 kubelet[1538]: W0209 19:54:43.266105 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.266238 kubelet[1538]: E0209 19:54:43.266225 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.266678 kubelet[1538]: E0209 19:54:43.266660 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.266797 kubelet[1538]: W0209 19:54:43.266781 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.266895 kubelet[1538]: E0209 19:54:43.266882 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.267273 kubelet[1538]: E0209 19:54:43.267257 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.267400 kubelet[1538]: W0209 19:54:43.267372 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.267563 kubelet[1538]: E0209 19:54:43.267547 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.267912 kubelet[1538]: E0209 19:54:43.267895 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.268049 kubelet[1538]: W0209 19:54:43.268031 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.268154 kubelet[1538]: E0209 19:54:43.268138 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.273635 kubelet[1538]: E0209 19:54:43.273606 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.273997 kubelet[1538]: W0209 19:54:43.273971 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.274259 kubelet[1538]: E0209 19:54:43.274241 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.274981 kubelet[1538]: E0209 19:54:43.274961 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.275107 kubelet[1538]: W0209 19:54:43.275090 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.275207 kubelet[1538]: E0209 19:54:43.275193 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.275704 kubelet[1538]: E0209 19:54:43.275685 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.275828 kubelet[1538]: W0209 19:54:43.275811 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.275948 kubelet[1538]: E0209 19:54:43.275933 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.276319 kubelet[1538]: E0209 19:54:43.276267 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.276319 kubelet[1538]: W0209 19:54:43.276285 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.276319 kubelet[1538]: E0209 19:54:43.276312 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.276696 kubelet[1538]: E0209 19:54:43.276675 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.276696 kubelet[1538]: W0209 19:54:43.276693 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.276852 kubelet[1538]: E0209 19:54:43.276721 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.277079 kubelet[1538]: E0209 19:54:43.277059 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.277079 kubelet[1538]: W0209 19:54:43.277076 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.277206 kubelet[1538]: E0209 19:54:43.277102 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.277496 kubelet[1538]: E0209 19:54:43.277478 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.277577 kubelet[1538]: W0209 19:54:43.277539 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.277676 kubelet[1538]: E0209 19:54:43.277658 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.278072 kubelet[1538]: E0209 19:54:43.277994 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.278072 kubelet[1538]: W0209 19:54:43.278041 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.278230 kubelet[1538]: E0209 19:54:43.278214 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.278590 kubelet[1538]: E0209 19:54:43.278567 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.278590 kubelet[1538]: W0209 19:54:43.278586 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.278753 kubelet[1538]: E0209 19:54:43.278615 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.278973 kubelet[1538]: E0209 19:54:43.278952 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.278973 kubelet[1538]: W0209 19:54:43.278970 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.279103 kubelet[1538]: E0209 19:54:43.278997 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.279312 kubelet[1538]: E0209 19:54:43.279293 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.279312 kubelet[1538]: W0209 19:54:43.279310 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.279473 kubelet[1538]: E0209 19:54:43.279336 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.279764 kubelet[1538]: E0209 19:54:43.279744 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.279764 kubelet[1538]: W0209 19:54:43.279767 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.279905 kubelet[1538]: E0209 19:54:43.279889 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.280141 kubelet[1538]: E0209 19:54:43.280094 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.280141 kubelet[1538]: W0209 19:54:43.280117 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.280141 kubelet[1538]: E0209 19:54:43.280136 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.280476 kubelet[1538]: E0209 19:54:43.280424 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.280476 kubelet[1538]: W0209 19:54:43.280474 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.280609 kubelet[1538]: E0209 19:54:43.280494 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.280987 kubelet[1538]: E0209 19:54:43.280967 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.280987 kubelet[1538]: W0209 19:54:43.280983 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.281124 kubelet[1538]: E0209 19:54:43.281003 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.363684 kubelet[1538]: E0209 19:54:43.363633 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.363684 kubelet[1538]: W0209 19:54:43.363668 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.363684 kubelet[1538]: E0209 19:54:43.363705 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.364092 kubelet[1538]: E0209 19:54:43.364071 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.364092 kubelet[1538]: W0209 19:54:43.364092 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.364292 kubelet[1538]: E0209 19:54:43.364113 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.364499 kubelet[1538]: E0209 19:54:43.364419 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.364499 kubelet[1538]: W0209 19:54:43.364466 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.364499 kubelet[1538]: E0209 19:54:43.364489 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.466172 kubelet[1538]: E0209 19:54:43.466124 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.466172 kubelet[1538]: W0209 19:54:43.466157 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.466589 kubelet[1538]: E0209 19:54:43.466193 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.466657 kubelet[1538]: E0209 19:54:43.466637 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.466657 kubelet[1538]: W0209 19:54:43.466653 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.466752 kubelet[1538]: E0209 19:54:43.466678 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.467182 kubelet[1538]: E0209 19:54:43.467104 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.467182 kubelet[1538]: W0209 19:54:43.467144 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.467182 kubelet[1538]: E0209 19:54:43.467172 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.557040 kubelet[1538]: E0209 19:54:43.556972 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.557040 kubelet[1538]: W0209 19:54:43.557031 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.557310 kubelet[1538]: E0209 19:54:43.557070 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.568573 kubelet[1538]: E0209 19:54:43.568516 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.568573 kubelet[1538]: W0209 19:54:43.568554 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.568573 kubelet[1538]: E0209 19:54:43.568590 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.568991 kubelet[1538]: E0209 19:54:43.568972 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.568991 kubelet[1538]: W0209 19:54:43.568986 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.569134 kubelet[1538]: E0209 19:54:43.569008 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.670357 kubelet[1538]: E0209 19:54:43.670283 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.670357 kubelet[1538]: W0209 19:54:43.670321 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.670357 kubelet[1538]: E0209 19:54:43.670359 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.670860 kubelet[1538]: E0209 19:54:43.670835 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.670860 kubelet[1538]: W0209 19:54:43.670862 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.671011 kubelet[1538]: E0209 19:54:43.670888 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.752890 kubelet[1538]: E0209 19:54:43.752747 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.752890 kubelet[1538]: W0209 19:54:43.752775 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.752890 kubelet[1538]: E0209 19:54:43.752818 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.759893 env[1147]: time="2024-02-09T19:54:43.759819762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gdgz5,Uid:7ead9787-1437-4319-8185-2b13ea094834,Namespace:calico-system,Attempt:0,}" Feb 9 19:54:43.772841 kubelet[1538]: E0209 19:54:43.772793 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.772841 kubelet[1538]: W0209 19:54:43.772831 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.773141 kubelet[1538]: E0209 19:54:43.772868 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.873990 kubelet[1538]: E0209 19:54:43.873937 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.873990 kubelet[1538]: W0209 19:54:43.873977 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.873990 kubelet[1538]: E0209 19:54:43.874011 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:43.953537 kubelet[1538]: E0209 19:54:43.953495 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:43.953537 kubelet[1538]: W0209 19:54:43.953525 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:43.953785 kubelet[1538]: E0209 19:54:43.953559 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:44.071118 env[1147]: time="2024-02-09T19:54:44.070489139Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-j8hjc,Uid:e2ec9463-43c7-4d47-8292-b20b787e7f80,Namespace:kube-system,Attempt:0,}" Feb 9 19:54:44.133643 kubelet[1538]: E0209 19:54:44.133562 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:44.374544 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1827474012.mount: Deactivated successfully. Feb 9 19:54:44.391417 env[1147]: time="2024-02-09T19:54:44.391313787Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:44.394581 env[1147]: time="2024-02-09T19:54:44.394496038Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:44.396236 env[1147]: time="2024-02-09T19:54:44.396187828Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:44.399126 env[1147]: time="2024-02-09T19:54:44.399059420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:44.400374 env[1147]: time="2024-02-09T19:54:44.400322573Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:44.401667 env[1147]: time="2024-02-09T19:54:44.401629850Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:44.403799 env[1147]: time="2024-02-09T19:54:44.403742475Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:44.405103 env[1147]: time="2024-02-09T19:54:44.405062468Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:44.409705 kubelet[1538]: E0209 19:54:44.409658 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:54:44.456987 env[1147]: time="2024-02-09T19:54:44.456851768Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:54:44.456987 env[1147]: time="2024-02-09T19:54:44.456928646Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:54:44.456987 env[1147]: time="2024-02-09T19:54:44.456948186Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:54:44.458512 env[1147]: time="2024-02-09T19:54:44.457626545Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0390fb8c8d83d31f32094a6cb823c93a2cb85d1efcb63730139ef4062abb9fe6 pid=1664 runtime=io.containerd.runc.v2 Feb 9 19:54:44.472734 env[1147]: time="2024-02-09T19:54:44.472607940Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:54:44.472734 env[1147]: time="2024-02-09T19:54:44.472675414Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:54:44.473120 env[1147]: time="2024-02-09T19:54:44.472706015Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:54:44.473120 env[1147]: time="2024-02-09T19:54:44.473030631Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b2b4af61a70cd18b394ec9cf148b23bdc96cef2bf50cbbb80779876b631cf8a7 pid=1680 runtime=io.containerd.runc.v2 Feb 9 19:54:44.515096 systemd[1]: Started cri-containerd-0390fb8c8d83d31f32094a6cb823c93a2cb85d1efcb63730139ef4062abb9fe6.scope. Feb 9 19:54:44.520378 systemd[1]: Started cri-containerd-b2b4af61a70cd18b394ec9cf148b23bdc96cef2bf50cbbb80779876b631cf8a7.scope. Feb 9 19:54:44.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.576496 kernel: audit: type=1400 audit(1707508484.553:645): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.553000 audit: BPF prog-id=70 op=LOAD Feb 9 19:54:44.558000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.558000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1680 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:44.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623461663631613730636431386233393465633963663134386232 Feb 9 19:54:44.558000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.558000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1680 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:44.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623461663631613730636431386233393465633963663134386232 Feb 9 19:54:44.558000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.558000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.558000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.558000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.558000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.558000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.558000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.558000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.558000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.558000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.558000 audit: BPF prog-id=71 op=LOAD Feb 9 19:54:44.558000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003768e0 items=0 ppid=1680 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:44.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623461663631613730636431386233393465633963663134386232 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit: BPF prog-id=72 op=LOAD Feb 9 19:54:44.575000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000376928 items=0 ppid=1680 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:44.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623461663631613730636431386233393465633963663134386232 Feb 9 19:54:44.575000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:54:44.575000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.575000 audit: BPF prog-id=73 op=LOAD Feb 9 19:54:44.575000 audit[1693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000376d38 items=0 ppid=1680 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:44.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232623461663631613730636431386233393465633963663134386232 Feb 9 19:54:44.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:44.604413 env[1147]: time="2024-02-09T19:54:44.604351200Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-j8hjc,Uid:e2ec9463-43c7-4d47-8292-b20b787e7f80,Namespace:kube-system,Attempt:0,} returns sandbox id \"b2b4af61a70cd18b394ec9cf148b23bdc96cef2bf50cbbb80779876b631cf8a7\"" Feb 9 19:54:44.610535 env[1147]: time="2024-02-09T19:54:44.610481486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gdgz5,Uid:7ead9787-1437-4319-8185-2b13ea094834,Namespace:calico-system,Attempt:0,} returns sandbox id \"0390fb8c8d83d31f32094a6cb823c93a2cb85d1efcb63730139ef4062abb9fe6\"" Feb 9 19:54:44.613359 kubelet[1538]: E0209 19:54:44.613155 1538 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Feb 9 19:54:44.614098 env[1147]: time="2024-02-09T19:54:44.614053495Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 19:54:45.134080 kubelet[1538]: E0209 19:54:45.134029 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:45.616698 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2107065681.mount: Deactivated successfully. Feb 9 19:54:46.135177 kubelet[1538]: E0209 19:54:46.135056 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:46.222572 env[1147]: time="2024-02-09T19:54:46.222489459Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:46.226593 env[1147]: time="2024-02-09T19:54:46.226523133Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:46.229587 env[1147]: time="2024-02-09T19:54:46.229506885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:46.232072 env[1147]: time="2024-02-09T19:54:46.232023257Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:46.232854 env[1147]: time="2024-02-09T19:54:46.232802557Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 19:54:46.234010 kubelet[1538]: E0209 19:54:46.233969 1538 kuberuntime_manager.go:872] container &Container{Name:kube-proxy,Image:registry.k8s.io/kube-proxy:v1.26.13,Command:[/usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=$(NODE_NAME)],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-proxy,ReadOnly:false,MountPath:/var/lib/kube-proxy,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:xtables-lock,ReadOnly:false,MountPath:/run/xtables.lock,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:lib-modules,ReadOnly:true,MountPath:/lib/modules,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-jxjj6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod kube-proxy-j8hjc_kube-system(e2ec9463-43c7-4d47-8292-b20b787e7f80): CreateContainerConfigError: services have not yet been read at least once, cannot construct envvars Feb 9 19:54:46.234279 kubelet[1538]: E0209 19:54:46.234069 1538 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-proxy\" with CreateContainerConfigError: \"services have not yet been read at least once, cannot construct envvars\"" pod="kube-system/kube-proxy-j8hjc" podUID=e2ec9463-43c7-4d47-8292-b20b787e7f80 Feb 9 19:54:46.235048 env[1147]: time="2024-02-09T19:54:46.235005262Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:54:46.409864 kubelet[1538]: E0209 19:54:46.409569 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:54:46.452317 kubelet[1538]: E0209 19:54:46.452271 1538 kuberuntime_manager.go:872] container &Container{Name:kube-proxy,Image:registry.k8s.io/kube-proxy:v1.26.13,Command:[/usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=$(NODE_NAME)],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-proxy,ReadOnly:false,MountPath:/var/lib/kube-proxy,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:xtables-lock,ReadOnly:false,MountPath:/run/xtables.lock,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:lib-modules,ReadOnly:true,MountPath:/lib/modules,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-jxjj6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod kube-proxy-j8hjc_kube-system(e2ec9463-43c7-4d47-8292-b20b787e7f80): CreateContainerConfigError: services have not yet been read at least once, cannot construct envvars Feb 9 19:54:46.452761 kubelet[1538]: E0209 19:54:46.452335 1538 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-proxy\" with CreateContainerConfigError: \"services have not yet been read at least once, cannot construct envvars\"" pod="kube-system/kube-proxy-j8hjc" podUID=e2ec9463-43c7-4d47-8292-b20b787e7f80 Feb 9 19:54:46.464536 kubelet[1538]: E0209 19:54:46.464489 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.464536 kubelet[1538]: W0209 19:54:46.464521 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.464536 kubelet[1538]: E0209 19:54:46.464554 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.465094 kubelet[1538]: E0209 19:54:46.464901 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.465094 kubelet[1538]: W0209 19:54:46.464916 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.465094 kubelet[1538]: E0209 19:54:46.464942 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.465346 kubelet[1538]: E0209 19:54:46.465212 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.465346 kubelet[1538]: W0209 19:54:46.465226 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.465346 kubelet[1538]: E0209 19:54:46.465245 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.465726 kubelet[1538]: E0209 19:54:46.465685 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.465726 kubelet[1538]: W0209 19:54:46.465729 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.466006 kubelet[1538]: E0209 19:54:46.465754 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.466108 kubelet[1538]: E0209 19:54:46.466072 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.466108 kubelet[1538]: W0209 19:54:46.466101 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.466283 kubelet[1538]: E0209 19:54:46.466123 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.466405 kubelet[1538]: E0209 19:54:46.466382 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.466405 kubelet[1538]: W0209 19:54:46.466401 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.466586 kubelet[1538]: E0209 19:54:46.466420 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.466824 kubelet[1538]: E0209 19:54:46.466802 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.466824 kubelet[1538]: W0209 19:54:46.466821 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.466990 kubelet[1538]: E0209 19:54:46.466841 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.467184 kubelet[1538]: E0209 19:54:46.467164 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.467184 kubelet[1538]: W0209 19:54:46.467181 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.467409 kubelet[1538]: E0209 19:54:46.467200 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.467508 kubelet[1538]: E0209 19:54:46.467497 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.467581 kubelet[1538]: W0209 19:54:46.467510 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.467581 kubelet[1538]: E0209 19:54:46.467530 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.467919 kubelet[1538]: E0209 19:54:46.467884 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.467919 kubelet[1538]: W0209 19:54:46.467906 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.468101 kubelet[1538]: E0209 19:54:46.467927 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.468197 kubelet[1538]: E0209 19:54:46.468176 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.468197 kubelet[1538]: W0209 19:54:46.468196 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.468371 kubelet[1538]: E0209 19:54:46.468214 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.468501 kubelet[1538]: E0209 19:54:46.468483 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.468609 kubelet[1538]: W0209 19:54:46.468501 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.468609 kubelet[1538]: E0209 19:54:46.468520 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.468798 kubelet[1538]: E0209 19:54:46.468779 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.468914 kubelet[1538]: W0209 19:54:46.468799 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.468914 kubelet[1538]: E0209 19:54:46.468821 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.469088 kubelet[1538]: E0209 19:54:46.469068 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.469196 kubelet[1538]: W0209 19:54:46.469090 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.469196 kubelet[1538]: E0209 19:54:46.469108 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.469367 kubelet[1538]: E0209 19:54:46.469350 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.469494 kubelet[1538]: W0209 19:54:46.469369 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.469494 kubelet[1538]: E0209 19:54:46.469387 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.469720 kubelet[1538]: E0209 19:54:46.469704 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.469720 kubelet[1538]: W0209 19:54:46.469720 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.469872 kubelet[1538]: E0209 19:54:46.469739 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.491845 kubelet[1538]: E0209 19:54:46.491723 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.492140 kubelet[1538]: W0209 19:54:46.491856 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.492140 kubelet[1538]: E0209 19:54:46.491909 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.492485 kubelet[1538]: E0209 19:54:46.492461 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.492485 kubelet[1538]: W0209 19:54:46.492482 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.492756 kubelet[1538]: E0209 19:54:46.492518 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.492978 kubelet[1538]: E0209 19:54:46.492958 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.492978 kubelet[1538]: W0209 19:54:46.492976 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.493239 kubelet[1538]: E0209 19:54:46.493012 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.493381 kubelet[1538]: E0209 19:54:46.493363 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.493381 kubelet[1538]: W0209 19:54:46.493381 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.493599 kubelet[1538]: E0209 19:54:46.493410 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.493789 kubelet[1538]: E0209 19:54:46.493766 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.493789 kubelet[1538]: W0209 19:54:46.493787 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.493947 kubelet[1538]: E0209 19:54:46.493923 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.494232 kubelet[1538]: E0209 19:54:46.494211 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.494232 kubelet[1538]: W0209 19:54:46.494229 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.494399 kubelet[1538]: E0209 19:54:46.494257 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.494628 kubelet[1538]: E0209 19:54:46.494608 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.494724 kubelet[1538]: W0209 19:54:46.494625 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.494724 kubelet[1538]: E0209 19:54:46.494656 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.494981 kubelet[1538]: E0209 19:54:46.494961 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.494981 kubelet[1538]: W0209 19:54:46.494978 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.495151 kubelet[1538]: E0209 19:54:46.495005 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.495375 kubelet[1538]: E0209 19:54:46.495356 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.495375 kubelet[1538]: W0209 19:54:46.495372 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.495563 kubelet[1538]: E0209 19:54:46.495521 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.496015 kubelet[1538]: E0209 19:54:46.495994 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.496015 kubelet[1538]: W0209 19:54:46.496011 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.496271 kubelet[1538]: E0209 19:54:46.496038 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.496622 kubelet[1538]: E0209 19:54:46.496601 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.496622 kubelet[1538]: W0209 19:54:46.496622 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.496781 kubelet[1538]: E0209 19:54:46.496650 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:46.497000 kubelet[1538]: E0209 19:54:46.496979 1538 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:54:46.497092 kubelet[1538]: W0209 19:54:46.497004 1538 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:54:46.497092 kubelet[1538]: E0209 19:54:46.497025 1538 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:54:47.101245 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2136082325.mount: Deactivated successfully. Feb 9 19:54:47.120599 kubelet[1538]: E0209 19:54:47.120547 1538 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:47.135546 kubelet[1538]: E0209 19:54:47.135505 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:47.796663 env[1147]: time="2024-02-09T19:54:47.796576181Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:47.800909 env[1147]: time="2024-02-09T19:54:47.800834958Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:47.805293 env[1147]: time="2024-02-09T19:54:47.805241066Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:47.808701 env[1147]: time="2024-02-09T19:54:47.808650427Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:47.810905 env[1147]: time="2024-02-09T19:54:47.810837051Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:54:47.814068 env[1147]: time="2024-02-09T19:54:47.814019523Z" level=info msg="CreateContainer within sandbox \"0390fb8c8d83d31f32094a6cb823c93a2cb85d1efcb63730139ef4062abb9fe6\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:54:47.836429 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2709355052.mount: Deactivated successfully. Feb 9 19:54:47.841377 env[1147]: time="2024-02-09T19:54:47.841300170Z" level=info msg="CreateContainer within sandbox \"0390fb8c8d83d31f32094a6cb823c93a2cb85d1efcb63730139ef4062abb9fe6\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"86eacd712cfd9bde34e93d5cff001b19754035a2f44adb7ea83158176c416289\"" Feb 9 19:54:47.842689 env[1147]: time="2024-02-09T19:54:47.842633499Z" level=info msg="StartContainer for \"86eacd712cfd9bde34e93d5cff001b19754035a2f44adb7ea83158176c416289\"" Feb 9 19:54:47.876813 systemd[1]: Started cri-containerd-86eacd712cfd9bde34e93d5cff001b19754035a2f44adb7ea83158176c416289.scope. Feb 9 19:54:47.900000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.928200 kernel: kauditd_printk_skb: 187 callbacks suppressed Feb 9 19:54:47.928419 kernel: audit: type=1400 audit(1707508487.900:668): avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.900000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1664 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:47.990931 kernel: audit: type=1300 audit(1707508487.900:668): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1664 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:47.991123 kernel: audit: type=1327 audit(1707508487.900:668): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836656163643731326366643962646533346539336435636666303031 Feb 9 19:54:47.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836656163643731326366643962646533346539336435636666303031 Feb 9 19:54:48.013899 kernel: audit: type=1400 audit(1707508487.909:669): avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.909000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.909000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:48.035878 kernel: audit: type=1400 audit(1707508487.909:669): avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:48.036078 kernel: audit: type=1400 audit(1707508487.909:669): avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.909000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.909000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:48.057528 kernel: audit: type=1400 audit(1707508487.909:669): avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.909000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:48.099812 kernel: audit: type=1400 audit(1707508487.909:669): avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:48.107562 env[1147]: time="2024-02-09T19:54:48.107501584Z" level=info msg="StartContainer for \"86eacd712cfd9bde34e93d5cff001b19754035a2f44adb7ea83158176c416289\" returns successfully" Feb 9 19:54:47.909000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.909000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:48.136721 kubelet[1538]: E0209 19:54:48.136639 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:48.151881 kernel: audit: type=1400 audit(1707508487.909:669): avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:48.152034 kernel: audit: type=1400 audit(1707508487.909:669): avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:48.152170 systemd[1]: cri-containerd-86eacd712cfd9bde34e93d5cff001b19754035a2f44adb7ea83158176c416289.scope: Deactivated successfully. Feb 9 19:54:47.909000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.909000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.909000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.909000 audit: BPF prog-id=78 op=LOAD Feb 9 19:54:47.909000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022c670 items=0 ppid=1664 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:47.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836656163643731326366643962646533346539336435636666303031 Feb 9 19:54:47.927000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.927000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.927000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.927000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.927000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.927000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.927000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.927000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.927000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.927000 audit: BPF prog-id=79 op=LOAD Feb 9 19:54:47.927000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00038c5f8 items=0 ppid=1664 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:47.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836656163643731326366643962646533346539336435636666303031 Feb 9 19:54:47.960000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:54:47.960000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:54:47.960000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.960000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.960000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.960000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.960000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.960000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.960000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.960000 audit[1776]: AVC avc: denied { perfmon } for pid=1776 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.960000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.960000 audit[1776]: AVC avc: denied { bpf } for pid=1776 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:47.960000 audit: BPF prog-id=80 op=LOAD Feb 9 19:54:47.960000 audit[1776]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00038c688 items=0 ppid=1664 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:47.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836656163643731326366643962646533346539336435636666303031 Feb 9 19:54:48.156000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:54:48.170537 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-86eacd712cfd9bde34e93d5cff001b19754035a2f44adb7ea83158176c416289-rootfs.mount: Deactivated successfully. Feb 9 19:54:48.409395 kubelet[1538]: E0209 19:54:48.409217 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:54:48.481393 env[1147]: time="2024-02-09T19:54:48.481324364Z" level=info msg="shim disconnected" id=86eacd712cfd9bde34e93d5cff001b19754035a2f44adb7ea83158176c416289 Feb 9 19:54:48.481393 env[1147]: time="2024-02-09T19:54:48.481394599Z" level=warning msg="cleaning up after shim disconnected" id=86eacd712cfd9bde34e93d5cff001b19754035a2f44adb7ea83158176c416289 namespace=k8s.io Feb 9 19:54:48.481724 env[1147]: time="2024-02-09T19:54:48.481409384Z" level=info msg="cleaning up dead shim" Feb 9 19:54:48.495144 env[1147]: time="2024-02-09T19:54:48.495058956Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:54:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1816 runtime=io.containerd.runc.v2\n" Feb 9 19:54:49.137255 kubelet[1538]: E0209 19:54:49.137197 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:49.461247 env[1147]: time="2024-02-09T19:54:49.461195284Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:54:50.137573 kubelet[1538]: E0209 19:54:50.137497 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:50.410107 kubelet[1538]: E0209 19:54:50.409534 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:54:51.138199 kubelet[1538]: E0209 19:54:51.138082 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:52.138933 kubelet[1538]: E0209 19:54:52.138838 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:52.409524 kubelet[1538]: E0209 19:54:52.408840 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:54:53.139092 kubelet[1538]: E0209 19:54:53.139003 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:54.069664 env[1147]: time="2024-02-09T19:54:54.069561920Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:54.073455 env[1147]: time="2024-02-09T19:54:54.073360553Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:54.076496 env[1147]: time="2024-02-09T19:54:54.076425642Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:54.080148 env[1147]: time="2024-02-09T19:54:54.080090756Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:54:54.081985 env[1147]: time="2024-02-09T19:54:54.081929890Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:54:54.088579 env[1147]: time="2024-02-09T19:54:54.088518861Z" level=info msg="CreateContainer within sandbox \"0390fb8c8d83d31f32094a6cb823c93a2cb85d1efcb63730139ef4062abb9fe6\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:54:54.105855 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1581624983.mount: Deactivated successfully. Feb 9 19:54:54.118722 env[1147]: time="2024-02-09T19:54:54.118634598Z" level=info msg="CreateContainer within sandbox \"0390fb8c8d83d31f32094a6cb823c93a2cb85d1efcb63730139ef4062abb9fe6\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94\"" Feb 9 19:54:54.119700 env[1147]: time="2024-02-09T19:54:54.119640460Z" level=info msg="StartContainer for \"bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94\"" Feb 9 19:54:54.139177 kubelet[1538]: E0209 19:54:54.139092 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:54.158054 systemd[1]: Started cri-containerd-bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94.scope. Feb 9 19:54:54.210896 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:54:54.211118 kernel: audit: type=1400 audit(1707508494.181:675): avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.181000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.212512 kernel: audit: type=1300 audit(1707508494.181:675): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1664 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:54.181000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1664 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:54.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262343937613832656637643433346633303762666537663736373063 Feb 9 19:54:54.272995 kernel: audit: type=1327 audit(1707508494.181:675): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262343937613832656637643433346633303762666537663736373063 Feb 9 19:54:54.273080 kernel: audit: type=1400 audit(1707508494.181:676): avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.181000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.181000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.321480 kernel: audit: type=1400 audit(1707508494.181:676): avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.344647 kernel: audit: type=1400 audit(1707508494.181:676): avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.181000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.181000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.368522 kernel: audit: type=1400 audit(1707508494.181:676): avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.181000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.393768 kernel: audit: type=1400 audit(1707508494.181:676): avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.393939 kernel: audit: type=1400 audit(1707508494.181:676): avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.181000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.394083 env[1147]: time="2024-02-09T19:54:54.392851590Z" level=info msg="StartContainer for \"bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94\" returns successfully" Feb 9 19:54:54.409411 kubelet[1538]: E0209 19:54:54.409301 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:54:54.181000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.435644 kernel: audit: type=1400 audit(1707508494.181:676): avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.181000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.181000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.181000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.181000 audit: BPF prog-id=81 op=LOAD Feb 9 19:54:54.181000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00022adf0 items=0 ppid=1664 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:54.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262343937613832656637643433346633303762666537663736373063 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit: BPF prog-id=82 op=LOAD Feb 9 19:54:54.209000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00022ae38 items=0 ppid=1664 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:54.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262343937613832656637643433346633303762666537663736373063 Feb 9 19:54:54.209000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:54:54.209000 audit: BPF prog-id=81 op=UNLOAD Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { perfmon } for pid=1841 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit[1841]: AVC avc: denied { bpf } for pid=1841 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:54:54.209000 audit: BPF prog-id=83 op=LOAD Feb 9 19:54:54.209000 audit[1841]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00022aec8 items=0 ppid=1664 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:54:54.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262343937613832656637643433346633303762666537663736373063 Feb 9 19:54:55.102124 systemd[1]: run-containerd-runc-k8s.io-bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94-runc.ji1auv.mount: Deactivated successfully. Feb 9 19:54:55.140103 kubelet[1538]: E0209 19:54:55.140039 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:55.786959 update_engine[1137]: I0209 19:54:55.786854 1137 update_attempter.cc:509] Updating boot flags... Feb 9 19:54:56.140507 kubelet[1538]: E0209 19:54:56.140237 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:56.409253 kubelet[1538]: E0209 19:54:56.409064 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:54:57.141550 kubelet[1538]: E0209 19:54:57.141480 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:58.142295 kubelet[1538]: E0209 19:54:58.142223 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:54:58.409397 kubelet[1538]: E0209 19:54:58.409037 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:54:59.143202 kubelet[1538]: E0209 19:54:59.143116 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:00.143815 kubelet[1538]: E0209 19:55:00.143720 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:00.409080 kubelet[1538]: E0209 19:55:00.408799 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:01.144732 kubelet[1538]: E0209 19:55:01.144665 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:01.413566 env[1147]: time="2024-02-09T19:55:01.413354832Z" level=info msg="CreateContainer within sandbox \"b2b4af61a70cd18b394ec9cf148b23bdc96cef2bf50cbbb80779876b631cf8a7\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:55:01.434851 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3785492976.mount: Deactivated successfully. Feb 9 19:55:01.448483 env[1147]: time="2024-02-09T19:55:01.448386931Z" level=info msg="CreateContainer within sandbox \"b2b4af61a70cd18b394ec9cf148b23bdc96cef2bf50cbbb80779876b631cf8a7\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"93c1225f79d2c5d4a4bd8015d1f39cfa88f815c0f1f9f67dd71dfa33b14956bc\"" Feb 9 19:55:01.450227 env[1147]: time="2024-02-09T19:55:01.449720193Z" level=info msg="StartContainer for \"93c1225f79d2c5d4a4bd8015d1f39cfa88f815c0f1f9f67dd71dfa33b14956bc\"" Feb 9 19:55:01.488558 systemd[1]: Started cri-containerd-93c1225f79d2c5d4a4bd8015d1f39cfa88f815c0f1f9f67dd71dfa33b14956bc.scope. Feb 9 19:55:01.523000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.529365 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 19:55:01.529544 kernel: audit: type=1400 audit(1707508501.523:681): avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.523000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1680 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933633132323566373964326335643461346264383031356431663339 Feb 9 19:55:01.616114 kernel: audit: type=1300 audit(1707508501.523:681): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1680 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.616362 kernel: audit: type=1327 audit(1707508501.523:681): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933633132323566373964326335643461346264383031356431663339 Feb 9 19:55:01.616411 kernel: audit: type=1400 audit(1707508501.523:682): avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.523000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.639850 kernel: audit: type=1400 audit(1707508501.523:682): avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.658653 kernel: audit: type=1400 audit(1707508501.523:682): avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.523000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.523000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.523000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.702035 kernel: audit: type=1400 audit(1707508501.523:682): avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.702313 kernel: audit: type=1400 audit(1707508501.523:682): avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.523000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.724236 env[1147]: time="2024-02-09T19:55:01.724140799Z" level=info msg="StartContainer for \"93c1225f79d2c5d4a4bd8015d1f39cfa88f815c0f1f9f67dd71dfa33b14956bc\" returns successfully" Feb 9 19:55:01.523000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.745380 kernel: audit: type=1400 audit(1707508501.523:682): avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.523000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.766536 kernel: audit: type=1400 audit(1707508501.523:682): avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.523000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.523000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.523000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.523000 audit: BPF prog-id=84 op=LOAD Feb 9 19:55:01.523000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00039aae0 items=0 ppid=1680 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933633132323566373964326335643461346264383031356431663339 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit: BPF prog-id=85 op=LOAD Feb 9 19:55:01.550000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00039ab28 items=0 ppid=1680 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933633132323566373964326335643461346264383031356431663339 Feb 9 19:55:01.550000 audit: BPF prog-id=85 op=UNLOAD Feb 9 19:55:01.550000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:01.550000 audit: BPF prog-id=86 op=LOAD Feb 9 19:55:01.550000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00039abb8 items=0 ppid=1680 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933633132323566373964326335643461346264383031356431663339 Feb 9 19:55:01.780000 audit[1956]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=1956 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.780000 audit[1956]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2baac410 a2=0 a3=7ffe2baac3fc items=0 ppid=1915 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.780000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:55:01.782000 audit[1957]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:01.782000 audit[1957]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd7c5f04f0 a2=0 a3=7ffd7c5f04dc items=0 ppid=1915 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.782000 audit[1958]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1958 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.782000 audit[1958]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea91a6390 a2=0 a3=7ffea91a637c items=0 ppid=1915 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.782000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:55:01.782000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:55:01.784000 audit[1959]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.784000 audit[1959]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd518fd740 a2=0 a3=7ffd518fd72c items=0 ppid=1915 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.784000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:55:01.785000 audit[1960]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=1960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:01.785000 audit[1960]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3cec12c0 a2=0 a3=7fff3cec12ac items=0 ppid=1915 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.785000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:55:01.787000 audit[1961]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:01.787000 audit[1961]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff63832080 a2=0 a3=7fff6383206c items=0 ppid=1915 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.787000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:55:01.888000 audit[1962]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=1962 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.888000 audit[1962]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcdf555a70 a2=0 a3=7ffcdf555a5c items=0 ppid=1915 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:55:01.893000 audit[1964]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1964 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.893000 audit[1964]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcc5e99660 a2=0 a3=7ffcc5e9964c items=0 ppid=1915 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.893000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:55:01.898000 audit[1967]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=1967 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.898000 audit[1967]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff89390dc0 a2=0 a3=7fff89390dac items=0 ppid=1915 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:55:01.900000 audit[1968]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=1968 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.900000 audit[1968]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2b2db1c0 a2=0 a3=7ffe2b2db1ac items=0 ppid=1915 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:55:01.904000 audit[1970]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.904000 audit[1970]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff699e46e0 a2=0 a3=7fff699e46cc items=0 ppid=1915 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:55:01.906000 audit[1971]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=1971 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.906000 audit[1971]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6b8cbe10 a2=0 a3=7ffc6b8cbdfc items=0 ppid=1915 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:55:01.909000 audit[1973]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=1973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.909000 audit[1973]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcbfff18c0 a2=0 a3=7ffcbfff18ac items=0 ppid=1915 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.909000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:55:01.914000 audit[1976]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=1976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.914000 audit[1976]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd59999260 a2=0 a3=7ffd5999924c items=0 ppid=1915 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.914000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:55:01.916000 audit[1977]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=1977 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.916000 audit[1977]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc11550280 a2=0 a3=7ffc1155026c items=0 ppid=1915 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:55:01.920000 audit[1979]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.920000 audit[1979]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcce005be0 a2=0 a3=7ffcce005bcc items=0 ppid=1915 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.920000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:55:01.922000 audit[1980]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=1980 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.922000 audit[1980]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedd0055f0 a2=0 a3=7ffedd0055dc items=0 ppid=1915 pid=1980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.922000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:55:01.926000 audit[1982]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=1982 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.926000 audit[1982]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdaaf05e20 a2=0 a3=7ffdaaf05e0c items=0 ppid=1915 pid=1982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.926000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:55:01.931000 audit[1985]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.931000 audit[1985]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd11c4fb0 a2=0 a3=7fffd11c4f9c items=0 ppid=1915 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.931000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:55:01.940000 audit[1988]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1988 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.940000 audit[1988]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc619d8140 a2=0 a3=7ffc619d812c items=0 ppid=1915 pid=1988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:55:01.942000 audit[1989]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.942000 audit[1989]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc08c17140 a2=0 a3=7ffc08c1712c items=0 ppid=1915 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.942000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:55:01.945000 audit[1991]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=1991 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.945000 audit[1991]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff4f55ccb0 a2=0 a3=7fff4f55cc9c items=0 ppid=1915 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.945000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:55:01.950000 audit[1994]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:55:01.950000 audit[1994]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe136f7b20 a2=0 a3=7ffe136f7b0c items=0 ppid=1915 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:55:01.959000 audit[1998]: NETFILTER_CFG table=filter:58 family=2 entries=3 op=nft_register_rule pid=1998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:01.959000 audit[1998]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd029358c0 a2=0 a3=7ffd029358ac items=0 ppid=1915 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.959000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:01.980000 audit[1998]: NETFILTER_CFG table=nat:59 family=2 entries=57 op=nft_register_chain pid=1998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:01.980000 audit[1998]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd029358c0 a2=0 a3=7ffd029358ac items=0 ppid=1915 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:01.980000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:02.005000 audit[2006]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=2006 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.005000 audit[2006]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff52c76940 a2=0 a3=7fff52c7692c items=0 ppid=1915 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.005000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:55:02.010000 audit[2008]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=2008 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.010000 audit[2008]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff7ae06c00 a2=0 a3=7fff7ae06bec items=0 ppid=1915 pid=2008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.010000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:55:02.017000 audit[2011]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=2011 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.017000 audit[2011]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc710736f0 a2=0 a3=7ffc710736dc items=0 ppid=1915 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.017000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:55:02.019000 audit[2012]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2012 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.019000 audit[2012]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffda98da50 a2=0 a3=7fffda98da3c items=0 ppid=1915 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.019000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:55:02.022000 audit[2014]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2014 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.022000 audit[2014]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc7f99a820 a2=0 a3=7ffc7f99a80c items=0 ppid=1915 pid=2014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.022000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:55:02.024000 audit[2015]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2015 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.024000 audit[2015]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcf58ee30 a2=0 a3=7ffdcf58ee1c items=0 ppid=1915 pid=2015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.024000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:55:02.028000 audit[2017]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=2017 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.028000 audit[2017]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc216a4d70 a2=0 a3=7ffc216a4d5c items=0 ppid=1915 pid=2017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:55:02.034000 audit[2020]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2020 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.034000 audit[2020]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffeb2e3c80 a2=0 a3=7fffeb2e3c6c items=0 ppid=1915 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:55:02.036000 audit[2021]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2021 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.036000 audit[2021]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0506e5a0 a2=0 a3=7fff0506e58c items=0 ppid=1915 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:55:02.040000 audit[2023]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2023 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.040000 audit[2023]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd2f531c10 a2=0 a3=7ffd2f531bfc items=0 ppid=1915 pid=2023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:55:02.042000 audit[2024]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2024 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.042000 audit[2024]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd933d4650 a2=0 a3=7ffd933d463c items=0 ppid=1915 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:55:02.046000 audit[2026]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2026 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.046000 audit[2026]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd561d57e0 a2=0 a3=7ffd561d57cc items=0 ppid=1915 pid=2026 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:55:02.053000 audit[2029]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2029 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.053000 audit[2029]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff827d19f0 a2=0 a3=7fff827d19dc items=0 ppid=1915 pid=2029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:55:02.059000 audit[2032]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2032 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.059000 audit[2032]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3507ec70 a2=0 a3=7ffc3507ec5c items=0 ppid=1915 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.059000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:55:02.060000 audit[2033]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=2033 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.060000 audit[2033]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff15ebbf60 a2=0 a3=7fff15ebbf4c items=0 ppid=1915 pid=2033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:55:02.064000 audit[2035]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=2035 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.064000 audit[2035]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd984ed5e0 a2=0 a3=7ffd984ed5cc items=0 ppid=1915 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.064000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:55:02.071000 audit[2038]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=2038 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:55:02.071000 audit[2038]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc7a1a3ea0 a2=0 a3=7ffc7a1a3e8c items=0 ppid=1915 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:55:02.078000 audit[2042]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=2042 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:55:02.078000 audit[2042]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd141464d0 a2=0 a3=7ffd141464bc items=0 ppid=1915 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.078000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:02.079000 audit[2042]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=2042 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:55:02.079000 audit[2042]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd141464d0 a2=0 a3=7ffd141464bc items=0 ppid=1915 pid=2042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:02.079000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:02.145018 kubelet[1538]: E0209 19:55:02.144940 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:02.409374 kubelet[1538]: E0209 19:55:02.408724 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:02.509907 kubelet[1538]: I0209 19:55:02.509844 1538 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-j8hjc" podStartSLOduration=-9.223372014345018e+09 pod.CreationTimestamp="2024-02-09 19:54:40 +0000 UTC" firstStartedPulling="2024-02-09 19:54:44.608869242 +0000 UTC m=+18.525162336" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:55:02.509180067 +0000 UTC m=+36.425473179" watchObservedRunningTime="2024-02-09 19:55:02.509756734 +0000 UTC m=+36.426049843" Feb 9 19:55:03.145699 kubelet[1538]: E0209 19:55:03.145629 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:04.146885 kubelet[1538]: E0209 19:55:04.146827 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:04.409325 kubelet[1538]: E0209 19:55:04.409129 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:05.148591 kubelet[1538]: E0209 19:55:05.148518 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:06.149735 kubelet[1538]: E0209 19:55:06.149648 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:06.410021 kubelet[1538]: E0209 19:55:06.409781 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:07.120021 kubelet[1538]: E0209 19:55:07.119939 1538 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:07.150314 kubelet[1538]: E0209 19:55:07.150233 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:08.150948 kubelet[1538]: E0209 19:55:08.150874 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:08.409875 kubelet[1538]: E0209 19:55:08.409707 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:09.151720 kubelet[1538]: E0209 19:55:09.151567 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:10.152288 kubelet[1538]: E0209 19:55:10.152195 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:10.409832 kubelet[1538]: E0209 19:55:10.409282 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:11.152866 kubelet[1538]: E0209 19:55:11.152792 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:12.153575 kubelet[1538]: E0209 19:55:12.153498 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:12.410608 kubelet[1538]: E0209 19:55:12.409502 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:13.154717 kubelet[1538]: E0209 19:55:13.154617 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:14.155066 kubelet[1538]: E0209 19:55:14.155006 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:14.409687 kubelet[1538]: E0209 19:55:14.409486 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:15.156277 kubelet[1538]: E0209 19:55:15.156206 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:16.156801 kubelet[1538]: E0209 19:55:16.156736 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:16.409711 kubelet[1538]: E0209 19:55:16.409507 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:17.157493 kubelet[1538]: E0209 19:55:17.157408 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:18.157707 kubelet[1538]: E0209 19:55:18.157652 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:18.408987 kubelet[1538]: E0209 19:55:18.408651 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:19.158457 kubelet[1538]: E0209 19:55:19.158373 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:20.159673 kubelet[1538]: E0209 19:55:20.159599 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:20.409027 kubelet[1538]: E0209 19:55:20.408983 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:21.160060 kubelet[1538]: E0209 19:55:21.159992 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:22.160828 kubelet[1538]: E0209 19:55:22.160761 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:22.409599 kubelet[1538]: E0209 19:55:22.409536 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:23.162131 kubelet[1538]: E0209 19:55:23.162056 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:24.162673 kubelet[1538]: E0209 19:55:24.162602 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:24.409306 kubelet[1538]: E0209 19:55:24.409224 1538 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:25.163184 kubelet[1538]: E0209 19:55:25.163091 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:25.245854 systemd[1]: cri-containerd-bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94.scope: Deactivated successfully. Feb 9 19:55:25.262006 kernel: kauditd_printk_skb: 165 callbacks suppressed Feb 9 19:55:25.262252 kernel: audit: type=1334 audit(1707508525.248:731): prog-id=83 op=UNLOAD Feb 9 19:55:25.248000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:55:25.283909 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94-rootfs.mount: Deactivated successfully. Feb 9 19:55:25.302622 env[1147]: time="2024-02-09T19:55:25.302417084Z" level=info msg="shim disconnected" id=bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94 Feb 9 19:55:25.302622 env[1147]: time="2024-02-09T19:55:25.302615150Z" level=warning msg="cleaning up after shim disconnected" id=bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94 namespace=k8s.io Feb 9 19:55:25.302622 env[1147]: time="2024-02-09T19:55:25.302637568Z" level=info msg="cleaning up dead shim" Feb 9 19:55:25.319130 env[1147]: time="2024-02-09T19:55:25.319028364Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:55:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2056 runtime=io.containerd.runc.v2\n" Feb 9 19:55:25.550193 env[1147]: time="2024-02-09T19:55:25.550096398Z" level=info msg="CreateContainer within sandbox \"0390fb8c8d83d31f32094a6cb823c93a2cb85d1efcb63730139ef4062abb9fe6\" for container &ContainerMetadata{Name:install-cni,Attempt:1,}" Feb 9 19:55:25.574071 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount903083167.mount: Deactivated successfully. Feb 9 19:55:25.584080 env[1147]: time="2024-02-09T19:55:25.583989463Z" level=info msg="CreateContainer within sandbox \"0390fb8c8d83d31f32094a6cb823c93a2cb85d1efcb63730139ef4062abb9fe6\" for &ContainerMetadata{Name:install-cni,Attempt:1,} returns container id \"2fb31f52259a8f61cbcdc9b30156f730fc31d4e07ade29e28c3dafe35f2db3a4\"" Feb 9 19:55:25.585056 env[1147]: time="2024-02-09T19:55:25.584890928Z" level=info msg="StartContainer for \"2fb31f52259a8f61cbcdc9b30156f730fc31d4e07ade29e28c3dafe35f2db3a4\"" Feb 9 19:55:25.630108 systemd[1]: Started cri-containerd-2fb31f52259a8f61cbcdc9b30156f730fc31d4e07ade29e28c3dafe35f2db3a4.scope. Feb 9 19:55:25.662000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684866 kernel: audit: type=1400 audit(1707508525.662:732): avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.662000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1664 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:25.717978 kernel: audit: type=1300 audit(1707508525.662:732): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1664 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:25.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623331663532323539613866363163626364633962333031353666 Feb 9 19:55:25.749566 kernel: audit: type=1327 audit(1707508525.662:732): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623331663532323539613866363163626364633962333031353666 Feb 9 19:55:25.749816 kernel: audit: type=1400 audit(1707508525.662:733): avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.662000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.662000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.791918 kernel: audit: type=1400 audit(1707508525.662:733): avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.792145 kernel: audit: type=1400 audit(1707508525.662:733): avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.662000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.662000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.834396 kernel: audit: type=1400 audit(1707508525.662:733): avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.662000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.662000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.857421 env[1147]: time="2024-02-09T19:55:25.857344221Z" level=info msg="StartContainer for \"2fb31f52259a8f61cbcdc9b30156f730fc31d4e07ade29e28c3dafe35f2db3a4\" returns successfully" Feb 9 19:55:25.878307 kernel: audit: type=1400 audit(1707508525.662:733): avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.878561 kernel: audit: type=1400 audit(1707508525.662:733): avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.662000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.662000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.662000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.662000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.662000 audit: BPF prog-id=87 op=LOAD Feb 9 19:55:25.662000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000396eb0 items=0 ppid=1664 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:25.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623331663532323539613866363163626364633962333031353666 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit: BPF prog-id=88 op=LOAD Feb 9 19:55:25.684000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000024908 items=0 ppid=1664 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:25.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623331663532323539613866363163626364633962333031353666 Feb 9 19:55:25.684000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:55:25.684000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:25.684000 audit: BPF prog-id=89 op=LOAD Feb 9 19:55:25.684000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000024998 items=0 ppid=1664 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:25.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623331663532323539613866363163626364633962333031353666 Feb 9 19:55:26.164189 kubelet[1538]: E0209 19:55:26.163997 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:26.284500 systemd[1]: run-containerd-runc-k8s.io-2fb31f52259a8f61cbcdc9b30156f730fc31d4e07ade29e28c3dafe35f2db3a4-runc.FvhvBB.mount: Deactivated successfully. Feb 9 19:55:26.309929 env[1147]: time="2024-02-09T19:55:26.309808838Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:55:26.314263 systemd[1]: cri-containerd-2fb31f52259a8f61cbcdc9b30156f730fc31d4e07ade29e28c3dafe35f2db3a4.scope: Deactivated successfully. Feb 9 19:55:26.317000 audit: BPF prog-id=89 op=UNLOAD Feb 9 19:55:26.348533 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2fb31f52259a8f61cbcdc9b30156f730fc31d4e07ade29e28c3dafe35f2db3a4-rootfs.mount: Deactivated successfully. Feb 9 19:55:26.354530 kubelet[1538]: I0209 19:55:26.354489 1538 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:55:26.359126 env[1147]: time="2024-02-09T19:55:26.359040554Z" level=info msg="shim disconnected" id=2fb31f52259a8f61cbcdc9b30156f730fc31d4e07ade29e28c3dafe35f2db3a4 Feb 9 19:55:26.359126 env[1147]: time="2024-02-09T19:55:26.359110126Z" level=warning msg="cleaning up after shim disconnected" id=2fb31f52259a8f61cbcdc9b30156f730fc31d4e07ade29e28c3dafe35f2db3a4 namespace=k8s.io Feb 9 19:55:26.359126 env[1147]: time="2024-02-09T19:55:26.359127310Z" level=info msg="cleaning up dead shim" Feb 9 19:55:26.384305 env[1147]: time="2024-02-09T19:55:26.384208752Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:55:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2123 runtime=io.containerd.runc.v2\n" Feb 9 19:55:26.416915 systemd[1]: Created slice kubepods-besteffort-podf2becf64_cb84_41f4_ab24_14aaa81a8f0b.slice. Feb 9 19:55:26.421864 env[1147]: time="2024-02-09T19:55:26.421797309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gxzmq,Uid:f2becf64-cb84-41f4-ab24-14aaa81a8f0b,Namespace:calico-system,Attempt:0,}" Feb 9 19:55:26.528562 env[1147]: time="2024-02-09T19:55:26.528422855Z" level=error msg="Failed to destroy network for sandbox \"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:55:26.529986 env[1147]: time="2024-02-09T19:55:26.529911569Z" level=error msg="encountered an error cleaning up failed sandbox \"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:55:26.530303 env[1147]: time="2024-02-09T19:55:26.530243978Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gxzmq,Uid:f2becf64-cb84-41f4-ab24-14aaa81a8f0b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:55:26.531537 kubelet[1538]: E0209 19:55:26.530908 1538 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:55:26.531537 kubelet[1538]: E0209 19:55:26.531009 1538 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gxzmq" Feb 9 19:55:26.531537 kubelet[1538]: E0209 19:55:26.531048 1538 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gxzmq" Feb 9 19:55:26.531842 kubelet[1538]: E0209 19:55:26.531144 1538 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-gxzmq_calico-system(f2becf64-cb84-41f4-ab24-14aaa81a8f0b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-gxzmq_calico-system(f2becf64-cb84-41f4-ab24-14aaa81a8f0b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:26.531738 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad-shm.mount: Deactivated successfully. Feb 9 19:55:26.551379 kubelet[1538]: I0209 19:55:26.551332 1538 scope.go:115] "RemoveContainer" containerID="bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94" Feb 9 19:55:26.551971 kubelet[1538]: I0209 19:55:26.551942 1538 scope.go:115] "RemoveContainer" containerID="bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94" Feb 9 19:55:26.554644 kubelet[1538]: I0209 19:55:26.553712 1538 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" Feb 9 19:55:26.555475 env[1147]: time="2024-02-09T19:55:26.555397025Z" level=info msg="StopPodSandbox for \"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\"" Feb 9 19:55:26.557333 env[1147]: time="2024-02-09T19:55:26.557266079Z" level=info msg="RemoveContainer for \"bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94\"" Feb 9 19:55:26.558769 env[1147]: time="2024-02-09T19:55:26.557550616Z" level=info msg="RemoveContainer for \"bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94\"" Feb 9 19:55:26.559168 env[1147]: time="2024-02-09T19:55:26.559093171Z" level=error msg="RemoveContainer for \"bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94\" failed" error="failed to set removing state for container \"bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94\": container is already in removing state" Feb 9 19:55:26.559472 kubelet[1538]: E0209 19:55:26.559410 1538 remote_runtime.go:368] "RemoveContainer from runtime service failed" err="rpc error: code = Unknown desc = failed to set removing state for container \"bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94\": container is already in removing state" containerID="bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94" Feb 9 19:55:26.559615 kubelet[1538]: E0209 19:55:26.559533 1538 kuberuntime_container.go:784] failed to remove pod init container "install-cni": rpc error: code = Unknown desc = failed to set removing state for container "bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94": container is already in removing state; Skipping pod "calico-node-gdgz5_calico-system(7ead9787-1437-4319-8185-2b13ea094834)" Feb 9 19:55:26.562508 env[1147]: time="2024-02-09T19:55:26.562466932Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:55:26.564251 env[1147]: time="2024-02-09T19:55:26.564207642Z" level=info msg="RemoveContainer for \"bb497a82ef7d434f307bfe7f7670ca1f9a3165b84680cad72c47231004018e94\" returns successfully" Feb 9 19:55:26.598456 env[1147]: time="2024-02-09T19:55:26.597823978Z" level=error msg="StopPodSandbox for \"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\" failed" error="failed to destroy network for sandbox \"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:55:26.598718 kubelet[1538]: E0209 19:55:26.598334 1538 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" Feb 9 19:55:26.598718 kubelet[1538]: E0209 19:55:26.598395 1538 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad} Feb 9 19:55:26.598915 kubelet[1538]: E0209 19:55:26.598886 1538 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f2becf64-cb84-41f4-ab24-14aaa81a8f0b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:55:26.599066 kubelet[1538]: E0209 19:55:26.598962 1538 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f2becf64-cb84-41f4-ab24-14aaa81a8f0b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gxzmq" podUID=f2becf64-cb84-41f4-ab24-14aaa81a8f0b Feb 9 19:55:27.120222 kubelet[1538]: E0209 19:55:27.120152 1538 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:27.164627 kubelet[1538]: E0209 19:55:27.164554 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:28.165800 kubelet[1538]: E0209 19:55:28.165694 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:28.513025 kubelet[1538]: I0209 19:55:28.512959 1538 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:55:28.520990 systemd[1]: Created slice kubepods-besteffort-podd89722da_db66_49af_9daa_b5c3ebda5305.slice. Feb 9 19:55:28.658171 kubelet[1538]: I0209 19:55:28.658107 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r8vlv\" (UniqueName: \"kubernetes.io/projected/d89722da-db66-49af-9daa-b5c3ebda5305-kube-api-access-r8vlv\") pod \"nginx-deployment-8ffc5cf85-9nv6h\" (UID: \"d89722da-db66-49af-9daa-b5c3ebda5305\") " pod="default/nginx-deployment-8ffc5cf85-9nv6h" Feb 9 19:55:28.825675 env[1147]: time="2024-02-09T19:55:28.825515526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-9nv6h,Uid:d89722da-db66-49af-9daa-b5c3ebda5305,Namespace:default,Attempt:0,}" Feb 9 19:55:29.001705 env[1147]: time="2024-02-09T19:55:29.001622284Z" level=error msg="Failed to destroy network for sandbox \"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:55:29.004424 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb-shm.mount: Deactivated successfully. Feb 9 19:55:29.006096 env[1147]: time="2024-02-09T19:55:29.006028151Z" level=error msg="encountered an error cleaning up failed sandbox \"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:55:29.006236 env[1147]: time="2024-02-09T19:55:29.006128404Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-9nv6h,Uid:d89722da-db66-49af-9daa-b5c3ebda5305,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:55:29.006551 kubelet[1538]: E0209 19:55:29.006515 1538 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:55:29.006667 kubelet[1538]: E0209 19:55:29.006604 1538 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-9nv6h" Feb 9 19:55:29.006667 kubelet[1538]: E0209 19:55:29.006644 1538 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-9nv6h" Feb 9 19:55:29.006788 kubelet[1538]: E0209 19:55:29.006726 1538 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-9nv6h_default(d89722da-db66-49af-9daa-b5c3ebda5305)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-9nv6h_default(d89722da-db66-49af-9daa-b5c3ebda5305)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-9nv6h" podUID=d89722da-db66-49af-9daa-b5c3ebda5305 Feb 9 19:55:29.167569 kubelet[1538]: E0209 19:55:29.166476 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:29.562925 kubelet[1538]: I0209 19:55:29.562883 1538 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" Feb 9 19:55:29.563885 env[1147]: time="2024-02-09T19:55:29.563828599Z" level=info msg="StopPodSandbox for \"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\"" Feb 9 19:55:29.628268 env[1147]: time="2024-02-09T19:55:29.628188891Z" level=error msg="StopPodSandbox for \"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\" failed" error="failed to destroy network for sandbox \"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:55:29.628607 kubelet[1538]: E0209 19:55:29.628580 1538 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" Feb 9 19:55:29.628741 kubelet[1538]: E0209 19:55:29.628652 1538 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb} Feb 9 19:55:29.628741 kubelet[1538]: E0209 19:55:29.628728 1538 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d89722da-db66-49af-9daa-b5c3ebda5305\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:55:29.628921 kubelet[1538]: E0209 19:55:29.628794 1538 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d89722da-db66-49af-9daa-b5c3ebda5305\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-9nv6h" podUID=d89722da-db66-49af-9daa-b5c3ebda5305 Feb 9 19:55:30.167365 kubelet[1538]: E0209 19:55:30.167155 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:31.168162 kubelet[1538]: E0209 19:55:31.168080 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:32.168557 kubelet[1538]: E0209 19:55:32.168505 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:33.169362 kubelet[1538]: E0209 19:55:33.169267 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:33.257214 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount324102905.mount: Deactivated successfully. Feb 9 19:55:33.329767 env[1147]: time="2024-02-09T19:55:33.329697406Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:33.333593 env[1147]: time="2024-02-09T19:55:33.333518667Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:33.337051 env[1147]: time="2024-02-09T19:55:33.336997061Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:33.339584 env[1147]: time="2024-02-09T19:55:33.339518719Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:33.341956 env[1147]: time="2024-02-09T19:55:33.341899730Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:55:33.362267 env[1147]: time="2024-02-09T19:55:33.362208089Z" level=info msg="CreateContainer within sandbox \"0390fb8c8d83d31f32094a6cb823c93a2cb85d1efcb63730139ef4062abb9fe6\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:55:33.390780 env[1147]: time="2024-02-09T19:55:33.390707629Z" level=info msg="CreateContainer within sandbox \"0390fb8c8d83d31f32094a6cb823c93a2cb85d1efcb63730139ef4062abb9fe6\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"bc3a81c5a0ef91bc88cb9312832a24239f33e5c963832180c56c4c8cd522112a\"" Feb 9 19:55:33.391781 env[1147]: time="2024-02-09T19:55:33.391723600Z" level=info msg="StartContainer for \"bc3a81c5a0ef91bc88cb9312832a24239f33e5c963832180c56c4c8cd522112a\"" Feb 9 19:55:33.424398 systemd[1]: Started cri-containerd-bc3a81c5a0ef91bc88cb9312832a24239f33e5c963832180c56c4c8cd522112a.scope. Feb 9 19:55:33.452000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.460015 kernel: kauditd_printk_skb: 35 callbacks suppressed Feb 9 19:55:33.460182 kernel: audit: type=1400 audit(1707508533.452:739): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.452000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1664 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:33.512946 kernel: audit: type=1300 audit(1707508533.452:739): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1664 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:33.452000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263336138316335613065663931626338386362393331323833326132 Feb 9 19:55:33.544505 kernel: audit: type=1327 audit(1707508533.452:739): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263336138316335613065663931626338386362393331323833326132 Feb 9 19:55:33.453000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.566007 kernel: audit: type=1400 audit(1707508533.453:740): avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.453000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.587516 kernel: audit: type=1400 audit(1707508533.453:740): avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.453000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.609593 kernel: audit: type=1400 audit(1707508533.453:740): avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.647498 kernel: audit: type=1400 audit(1707508533.453:740): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.647698 kernel: audit: type=1400 audit(1707508533.453:740): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.453000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.453000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.453000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.675171 kernel: audit: type=1400 audit(1707508533.453:740): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.453000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.680577 env[1147]: time="2024-02-09T19:55:33.680455558Z" level=info msg="StartContainer for \"bc3a81c5a0ef91bc88cb9312832a24239f33e5c963832180c56c4c8cd522112a\" returns successfully" Feb 9 19:55:33.453000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.453000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.697481 kernel: audit: type=1400 audit(1707508533.453:740): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.453000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.453000 audit: BPF prog-id=90 op=LOAD Feb 9 19:55:33.453000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00017efa0 items=0 ppid=1664 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:33.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263336138316335613065663931626338386362393331323833326132 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=no exit=-11 a0=5 a1=c00011f770 a2=78 a3=c00017efe8 items=0 ppid=1664 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:33.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263336138316335613065663931626338386362393331323833326132 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.480000 audit: BPF prog-id=91 op=LOAD Feb 9 19:55:33.480000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=1 items=0 ppid=1664 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:33.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263336138316335613065663931626338386362393331323833326132 Feb 9 19:55:33.511000 audit: BPF prog-id=91 op=UNLOAD Feb 9 19:55:33.511000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:55:33.511000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.511000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.511000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.511000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.511000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.511000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.511000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.511000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.511000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.511000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:33.511000 audit: BPF prog-id=92 op=LOAD Feb 9 19:55:33.511000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00017f078 items=0 ppid=1664 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:33.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263336138316335613065663931626338386362393331323833326132 Feb 9 19:55:33.760158 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:55:33.760337 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:55:34.170208 kubelet[1538]: E0209 19:55:34.170024 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:34.632173 kubelet[1538]: I0209 19:55:34.631907 1538 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-gdgz5" podStartSLOduration=-9.223371982222925e+09 pod.CreationTimestamp="2024-02-09 19:54:40 +0000 UTC" firstStartedPulling="2024-02-09 19:54:44.612314749 +0000 UTC m=+18.528607849" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:55:34.631377537 +0000 UTC m=+68.547670651" watchObservedRunningTime="2024-02-09 19:55:34.631850526 +0000 UTC m=+68.548143643" Feb 9 19:55:35.110000 audit[2380]: AVC avc: denied { write } for pid=2380 comm="tee" name="fd" dev="proc" ino=19304 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:55:35.110000 audit[2380]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4c18994c a2=241 a3=1b6 items=1 ppid=2348 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.110000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:55:35.110000 audit: PATH item=0 name="/dev/fd/63" inode=20039 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:55:35.119000 audit[2390]: AVC avc: denied { write } for pid=2390 comm="tee" name="fd" dev="proc" ino=19309 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:55:35.119000 audit[2390]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9e02594d a2=241 a3=1b6 items=1 ppid=2347 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.119000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:55:35.119000 audit: PATH item=0 name="/dev/fd/63" inode=20042 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:55:35.110000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:55:35.129000 audit[2387]: AVC avc: denied { write } for pid=2387 comm="tee" name="fd" dev="proc" ino=20056 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:55:35.133000 audit[2398]: AVC avc: denied { write } for pid=2398 comm="tee" name="fd" dev="proc" ino=20062 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:55:35.135000 audit[2407]: AVC avc: denied { write } for pid=2407 comm="tee" name="fd" dev="proc" ino=20065 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:55:35.129000 audit[2387]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7406f95e a2=241 a3=1b6 items=1 ppid=2351 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.129000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:55:35.129000 audit: PATH item=0 name="/dev/fd/63" inode=19298 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:55:35.129000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:55:35.133000 audit[2398]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8f57f95c a2=241 a3=1b6 items=1 ppid=2359 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.133000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:55:35.133000 audit: PATH item=0 name="/dev/fd/63" inode=20047 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:55:35.133000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:55:35.119000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:55:35.135000 audit[2407]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6211d95c a2=241 a3=1b6 items=1 ppid=2353 pid=2407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.135000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:55:35.135000 audit: PATH item=0 name="/dev/fd/63" inode=20053 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:55:35.135000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:55:35.150000 audit[2401]: AVC avc: denied { write } for pid=2401 comm="tee" name="fd" dev="proc" ino=19322 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:55:35.150000 audit[2411]: AVC avc: denied { write } for pid=2411 comm="tee" name="fd" dev="proc" ino=20071 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:55:35.150000 audit[2401]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc2eac95d a2=241 a3=1b6 items=1 ppid=2357 pid=2401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.150000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:55:35.150000 audit: PATH item=0 name="/dev/fd/63" inode=19306 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:55:35.150000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:55:35.150000 audit[2411]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce010395c a2=241 a3=1b6 items=1 ppid=2362 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.150000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:55:35.150000 audit: PATH item=0 name="/dev/fd/63" inode=19316 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:55:35.150000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:55:35.170996 kubelet[1538]: E0209 19:55:35.170915 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:35.489499 kernel: Initializing XFRM netlink socket Feb 9 19:55:35.657549 systemd[1]: run-containerd-runc-k8s.io-bc3a81c5a0ef91bc88cb9312832a24239f33e5c963832180c56c4c8cd522112a-runc.0lEAIR.mount: Deactivated successfully. Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit: BPF prog-id=93 op=LOAD Feb 9 19:55:35.729000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd063e20a0 a2=70 a3=7fa2c92cd000 items=0 ppid=2363 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.729000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:55:35.729000 audit: BPF prog-id=93 op=UNLOAD Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit: BPF prog-id=94 op=LOAD Feb 9 19:55:35.729000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd063e20a0 a2=70 a3=6e items=0 ppid=2363 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.729000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:55:35.729000 audit: BPF prog-id=94 op=UNLOAD Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd063e2050 a2=70 a3=7ffd063e20a0 items=0 ppid=2363 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.729000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit: BPF prog-id=95 op=LOAD Feb 9 19:55:35.729000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd063e2030 a2=70 a3=7ffd063e20a0 items=0 ppid=2363 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.729000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:55:35.729000 audit: BPF prog-id=95 op=UNLOAD Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd063e2110 a2=70 a3=0 items=0 ppid=2363 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.729000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:55:35.729000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.729000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd063e2100 a2=70 a3=0 items=0 ppid=2363 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.729000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:55:35.730000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.730000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd063e2140 a2=70 a3=0 items=0 ppid=2363 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.730000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:55:35.734000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.734000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.734000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.734000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.734000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.734000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.734000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.734000 audit[2507]: AVC avc: denied { perfmon } for pid=2507 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.734000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.734000 audit[2507]: AVC avc: denied { bpf } for pid=2507 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.734000 audit: BPF prog-id=96 op=LOAD Feb 9 19:55:35.734000 audit[2507]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd063e2060 a2=70 a3=ffffffff items=0 ppid=2363 pid=2507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.734000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:55:35.762000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.762000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff5b2501a0 a2=70 a3=fff80800 items=0 ppid=2363 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.762000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:55:35.762000 audit[2510]: AVC avc: denied { bpf } for pid=2510 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:35.762000 audit[2510]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff5b250070 a2=70 a3=3 items=0 ppid=2363 pid=2510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.762000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:55:35.775000 audit: BPF prog-id=96 op=UNLOAD Feb 9 19:55:35.882000 audit[2532]: NETFILTER_CFG table=raw:79 family=2 entries=19 op=nft_register_chain pid=2532 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:55:35.882000 audit[2532]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff7b0d03a0 a2=0 a3=7fff7b0d038c items=0 ppid=2363 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.882000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:55:35.891000 audit[2533]: NETFILTER_CFG table=filter:80 family=2 entries=39 op=nft_register_chain pid=2533 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:55:35.893000 audit[2534]: NETFILTER_CFG table=nat:81 family=2 entries=16 op=nft_register_chain pid=2534 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:55:35.891000 audit[2533]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffd39816dc0 a2=0 a3=5629dd7a0000 items=0 ppid=2363 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.891000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:55:35.893000 audit[2534]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc62b1f640 a2=0 a3=557035201000 items=0 ppid=2363 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.893000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:55:35.899000 audit[2539]: NETFILTER_CFG table=mangle:82 family=2 entries=19 op=nft_register_chain pid=2539 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:55:35.899000 audit[2539]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd822e6040 a2=0 a3=7ffd822e602c items=0 ppid=2363 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:35.899000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:55:36.171601 kubelet[1538]: E0209 19:55:36.171416 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:36.512640 systemd-networkd[1033]: vxlan.calico: Link UP Feb 9 19:55:36.512658 systemd-networkd[1033]: vxlan.calico: Gained carrier Feb 9 19:55:37.172072 kubelet[1538]: E0209 19:55:37.171991 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:38.172728 kubelet[1538]: E0209 19:55:38.172655 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:38.267924 systemd-networkd[1033]: vxlan.calico: Gained IPv6LL Feb 9 19:55:39.173783 kubelet[1538]: E0209 19:55:39.173680 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:39.411120 env[1147]: time="2024-02-09T19:55:39.410398530Z" level=info msg="StopPodSandbox for \"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\"" Feb 9 19:55:39.513527 env[1147]: 2024-02-09 19:55:39.467 [INFO][2564] k8s.go 578: Cleaning up netns ContainerID="d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" Feb 9 19:55:39.513527 env[1147]: 2024-02-09 19:55:39.469 [INFO][2564] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" iface="eth0" netns="/var/run/netns/cni-d5e6ca2d-66ff-d209-af11-fa7806c23e7a" Feb 9 19:55:39.513527 env[1147]: 2024-02-09 19:55:39.470 [INFO][2564] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" iface="eth0" netns="/var/run/netns/cni-d5e6ca2d-66ff-d209-af11-fa7806c23e7a" Feb 9 19:55:39.513527 env[1147]: 2024-02-09 19:55:39.470 [INFO][2564] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" iface="eth0" netns="/var/run/netns/cni-d5e6ca2d-66ff-d209-af11-fa7806c23e7a" Feb 9 19:55:39.513527 env[1147]: 2024-02-09 19:55:39.470 [INFO][2564] k8s.go 585: Releasing IP address(es) ContainerID="d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" Feb 9 19:55:39.513527 env[1147]: 2024-02-09 19:55:39.470 [INFO][2564] utils.go 188: Calico CNI releasing IP address ContainerID="d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" Feb 9 19:55:39.513527 env[1147]: 2024-02-09 19:55:39.497 [INFO][2570] ipam_plugin.go 415: Releasing address using handleID ContainerID="d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" HandleID="k8s-pod-network.d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" Workload="10.128.0.58-k8s-csi--node--driver--gxzmq-eth0" Feb 9 19:55:39.513527 env[1147]: 2024-02-09 19:55:39.497 [INFO][2570] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:55:39.513527 env[1147]: 2024-02-09 19:55:39.498 [INFO][2570] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:55:39.513527 env[1147]: 2024-02-09 19:55:39.507 [WARNING][2570] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" HandleID="k8s-pod-network.d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" Workload="10.128.0.58-k8s-csi--node--driver--gxzmq-eth0" Feb 9 19:55:39.513527 env[1147]: 2024-02-09 19:55:39.507 [INFO][2570] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" HandleID="k8s-pod-network.d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" Workload="10.128.0.58-k8s-csi--node--driver--gxzmq-eth0" Feb 9 19:55:39.513527 env[1147]: 2024-02-09 19:55:39.509 [INFO][2570] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:55:39.513527 env[1147]: 2024-02-09 19:55:39.512 [INFO][2564] k8s.go 591: Teardown processing complete. ContainerID="d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad" Feb 9 19:55:39.519272 env[1147]: time="2024-02-09T19:55:39.513927726Z" level=info msg="TearDown network for sandbox \"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\" successfully" Feb 9 19:55:39.519272 env[1147]: time="2024-02-09T19:55:39.513977263Z" level=info msg="StopPodSandbox for \"d9143842c44d58ab6407f86c8a28980feb820771359d0b5f052a38da3cf0d8ad\" returns successfully" Feb 9 19:55:39.519272 env[1147]: time="2024-02-09T19:55:39.514850981Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gxzmq,Uid:f2becf64-cb84-41f4-ab24-14aaa81a8f0b,Namespace:calico-system,Attempt:1,}" Feb 9 19:55:39.517095 systemd[1]: run-netns-cni\x2dd5e6ca2d\x2d66ff\x2dd209\x2daf11\x2dfa7806c23e7a.mount: Deactivated successfully. Feb 9 19:55:39.684046 systemd-networkd[1033]: cali256f7ce541f: Link UP Feb 9 19:55:39.691560 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:55:39.691697 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali256f7ce541f: link becomes ready Feb 9 19:55:39.699597 systemd-networkd[1033]: cali256f7ce541f: Gained carrier Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.590 [INFO][2577] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.58-k8s-csi--node--driver--gxzmq-eth0 csi-node-driver- calico-system f2becf64-cb84-41f4-ab24-14aaa81a8f0b 1131 0 2024-02-09 19:54:40 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.58 csi-node-driver-gxzmq eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali256f7ce541f [] []}} ContainerID="10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" Namespace="calico-system" Pod="csi-node-driver-gxzmq" WorkloadEndpoint="10.128.0.58-k8s-csi--node--driver--gxzmq-" Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.591 [INFO][2577] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" Namespace="calico-system" Pod="csi-node-driver-gxzmq" WorkloadEndpoint="10.128.0.58-k8s-csi--node--driver--gxzmq-eth0" Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.629 [INFO][2588] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" HandleID="k8s-pod-network.10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" Workload="10.128.0.58-k8s-csi--node--driver--gxzmq-eth0" Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.642 [INFO][2588] ipam_plugin.go 268: Auto assigning IP ContainerID="10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" HandleID="k8s-pod-network.10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" Workload="10.128.0.58-k8s-csi--node--driver--gxzmq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d120), Attrs:map[string]string{"namespace":"calico-system", "node":"10.128.0.58", "pod":"csi-node-driver-gxzmq", "timestamp":"2024-02-09 19:55:39.629520721 +0000 UTC"}, Hostname:"10.128.0.58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.643 [INFO][2588] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.643 [INFO][2588] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.643 [INFO][2588] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.58' Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.645 [INFO][2588] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" host="10.128.0.58" Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.650 [INFO][2588] ipam.go 372: Looking up existing affinities for host host="10.128.0.58" Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.657 [INFO][2588] ipam.go 489: Trying affinity for 192.168.16.192/26 host="10.128.0.58" Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.660 [INFO][2588] ipam.go 155: Attempting to load block cidr=192.168.16.192/26 host="10.128.0.58" Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.663 [INFO][2588] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.16.192/26 host="10.128.0.58" Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.663 [INFO][2588] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.16.192/26 handle="k8s-pod-network.10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" host="10.128.0.58" Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.665 [INFO][2588] ipam.go 1682: Creating new handle: k8s-pod-network.10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67 Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.669 [INFO][2588] ipam.go 1203: Writing block in order to claim IPs block=192.168.16.192/26 handle="k8s-pod-network.10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" host="10.128.0.58" Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.675 [INFO][2588] ipam.go 1216: Successfully claimed IPs: [192.168.16.193/26] block=192.168.16.192/26 handle="k8s-pod-network.10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" host="10.128.0.58" Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.676 [INFO][2588] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.16.193/26] handle="k8s-pod-network.10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" host="10.128.0.58" Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.676 [INFO][2588] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:55:39.714064 env[1147]: 2024-02-09 19:55:39.676 [INFO][2588] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.16.193/26] IPv6=[] ContainerID="10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" HandleID="k8s-pod-network.10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" Workload="10.128.0.58-k8s-csi--node--driver--gxzmq-eth0" Feb 9 19:55:39.722988 env[1147]: 2024-02-09 19:55:39.678 [INFO][2577] k8s.go 385: Populated endpoint ContainerID="10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" Namespace="calico-system" Pod="csi-node-driver-gxzmq" WorkloadEndpoint="10.128.0.58-k8s-csi--node--driver--gxzmq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58-k8s-csi--node--driver--gxzmq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f2becf64-cb84-41f4-ab24-14aaa81a8f0b", ResourceVersion:"1131", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 54, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.58", ContainerID:"", Pod:"csi-node-driver-gxzmq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.16.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali256f7ce541f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:55:39.722988 env[1147]: 2024-02-09 19:55:39.678 [INFO][2577] k8s.go 386: Calico CNI using IPs: [192.168.16.193/32] ContainerID="10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" Namespace="calico-system" Pod="csi-node-driver-gxzmq" WorkloadEndpoint="10.128.0.58-k8s-csi--node--driver--gxzmq-eth0" Feb 9 19:55:39.722988 env[1147]: 2024-02-09 19:55:39.678 [INFO][2577] dataplane_linux.go 68: Setting the host side veth name to cali256f7ce541f ContainerID="10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" Namespace="calico-system" Pod="csi-node-driver-gxzmq" WorkloadEndpoint="10.128.0.58-k8s-csi--node--driver--gxzmq-eth0" Feb 9 19:55:39.722988 env[1147]: 2024-02-09 19:55:39.700 [INFO][2577] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" Namespace="calico-system" Pod="csi-node-driver-gxzmq" WorkloadEndpoint="10.128.0.58-k8s-csi--node--driver--gxzmq-eth0" Feb 9 19:55:39.722988 env[1147]: 2024-02-09 19:55:39.701 [INFO][2577] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" Namespace="calico-system" Pod="csi-node-driver-gxzmq" WorkloadEndpoint="10.128.0.58-k8s-csi--node--driver--gxzmq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58-k8s-csi--node--driver--gxzmq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f2becf64-cb84-41f4-ab24-14aaa81a8f0b", ResourceVersion:"1131", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 54, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.58", ContainerID:"10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67", Pod:"csi-node-driver-gxzmq", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.16.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali256f7ce541f", MAC:"aa:92:d2:b7:7f:96", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:55:39.722988 env[1147]: 2024-02-09 19:55:39.711 [INFO][2577] k8s.go 491: Wrote updated endpoint to datastore ContainerID="10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67" Namespace="calico-system" Pod="csi-node-driver-gxzmq" WorkloadEndpoint="10.128.0.58-k8s-csi--node--driver--gxzmq-eth0" Feb 9 19:55:39.751013 env[1147]: time="2024-02-09T19:55:39.750926205Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:55:39.751864 env[1147]: time="2024-02-09T19:55:39.751810692Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:55:39.752121 env[1147]: time="2024-02-09T19:55:39.752081228Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:55:39.752502 env[1147]: time="2024-02-09T19:55:39.752455071Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67 pid=2618 runtime=io.containerd.runc.v2 Feb 9 19:55:39.783761 systemd[1]: Started cri-containerd-10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67.scope. Feb 9 19:55:39.788000 audit[2637]: NETFILTER_CFG table=filter:83 family=2 entries=36 op=nft_register_chain pid=2637 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:55:39.795909 kernel: kauditd_printk_skb: 161 callbacks suppressed Feb 9 19:55:39.796033 kernel: audit: type=1325 audit(1707508539.788:771): table=filter:83 family=2 entries=36 op=nft_register_chain pid=2637 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:55:39.845465 kernel: audit: type=1300 audit(1707508539.788:771): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc60d713a0 a2=0 a3=7ffc60d7138c items=0 ppid=2363 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:39.845647 kernel: audit: type=1327 audit(1707508539.788:771): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:55:39.788000 audit[2637]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc60d713a0 a2=0 a3=7ffc60d7138c items=0 ppid=2363 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:39.788000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:55:39.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885632 kernel: audit: type=1400 audit(1707508539.811:772): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.907236 kernel: audit: type=1400 audit(1707508539.811:773): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.907543 kernel: audit: type=1400 audit(1707508539.811:774): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.950600 kernel: audit: type=1400 audit(1707508539.811:775): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.973085 kernel: audit: type=1400 audit(1707508539.811:776): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.995477 kernel: audit: type=1400 audit(1707508539.811:777): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.884000 audit: BPF prog-id=97 op=LOAD Feb 9 19:55:39.885000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2618 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:40.019581 kernel: audit: type=1400 audit(1707508539.811:778): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633939353464306534393631313737326266323531376236653561 Feb 9 19:55:39.885000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2618 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:39.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633939353464306534393631313737326266323531376236653561 Feb 9 19:55:39.885000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.885000 audit: BPF prog-id=98 op=LOAD Feb 9 19:55:39.885000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00037a8e0 items=0 ppid=2618 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:39.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633939353464306534393631313737326266323531376236653561 Feb 9 19:55:39.927000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.927000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.927000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.927000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.927000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.927000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.927000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.927000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.927000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.927000 audit: BPF prog-id=99 op=LOAD Feb 9 19:55:39.927000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00037a928 items=0 ppid=2618 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:39.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633939353464306534393631313737326266323531376236653561 Feb 9 19:55:39.927000 audit: BPF prog-id=99 op=UNLOAD Feb 9 19:55:39.928000 audit: BPF prog-id=98 op=UNLOAD Feb 9 19:55:39.928000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.928000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.928000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.928000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.928000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.928000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.928000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.928000 audit[2629]: AVC avc: denied { perfmon } for pid=2629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.928000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.928000 audit[2629]: AVC avc: denied { bpf } for pid=2629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:39.928000 audit: BPF prog-id=100 op=LOAD Feb 9 19:55:39.928000 audit[2629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037ad38 items=0 ppid=2618 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:39.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130633939353464306534393631313737326266323531376236653561 Feb 9 19:55:40.045976 env[1147]: time="2024-02-09T19:55:40.042477743Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gxzmq,Uid:f2becf64-cb84-41f4-ab24-14aaa81a8f0b,Namespace:calico-system,Attempt:1,} returns sandbox id \"10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67\"" Feb 9 19:55:40.045976 env[1147]: time="2024-02-09T19:55:40.045299124Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:55:40.174969 kubelet[1538]: E0209 19:55:40.174841 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:41.109047 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4131438482.mount: Deactivated successfully. Feb 9 19:55:41.175608 kubelet[1538]: E0209 19:55:41.175539 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:41.212761 systemd-networkd[1033]: cali256f7ce541f: Gained IPv6LL Feb 9 19:55:41.593103 env[1147]: time="2024-02-09T19:55:41.593002529Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:41.597940 env[1147]: time="2024-02-09T19:55:41.597870427Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:41.600808 env[1147]: time="2024-02-09T19:55:41.600748097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:41.603532 env[1147]: time="2024-02-09T19:55:41.603480495Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:41.604406 env[1147]: time="2024-02-09T19:55:41.604347681Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:55:41.607327 env[1147]: time="2024-02-09T19:55:41.607266770Z" level=info msg="CreateContainer within sandbox \"10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:55:41.628449 env[1147]: time="2024-02-09T19:55:41.628338425Z" level=info msg="CreateContainer within sandbox \"10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"d4b680565e0e0047aa8d0ee384cf944d98a3470f8a85db0f5895dc50481ceee0\"" Feb 9 19:55:41.629505 env[1147]: time="2024-02-09T19:55:41.629415117Z" level=info msg="StartContainer for \"d4b680565e0e0047aa8d0ee384cf944d98a3470f8a85db0f5895dc50481ceee0\"" Feb 9 19:55:41.676059 systemd[1]: Started cri-containerd-d4b680565e0e0047aa8d0ee384cf944d98a3470f8a85db0f5895dc50481ceee0.scope. Feb 9 19:55:41.700000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.700000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2618 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:41.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434623638303536356530653030343761613864306565333834636639 Feb 9 19:55:41.700000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.700000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.700000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.700000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.700000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.700000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.700000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.700000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.700000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.700000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.700000 audit: BPF prog-id=101 op=LOAD Feb 9 19:55:41.700000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00028b570 items=0 ppid=2618 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:41.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434623638303536356530653030343761613864306565333834636639 Feb 9 19:55:41.702000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.702000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.702000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.702000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.702000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.702000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.702000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.702000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.702000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.702000 audit: BPF prog-id=102 op=LOAD Feb 9 19:55:41.702000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00028b5b8 items=0 ppid=2618 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:41.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434623638303536356530653030343761613864306565333834636639 Feb 9 19:55:41.703000 audit: BPF prog-id=102 op=UNLOAD Feb 9 19:55:41.703000 audit: BPF prog-id=101 op=UNLOAD Feb 9 19:55:41.703000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.703000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.703000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.703000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.703000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.703000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.703000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.703000 audit[2668]: AVC avc: denied { perfmon } for pid=2668 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.703000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.703000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:41.703000 audit: BPF prog-id=103 op=LOAD Feb 9 19:55:41.703000 audit[2668]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00028b648 items=0 ppid=2618 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:41.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434623638303536356530653030343761613864306565333834636639 Feb 9 19:55:41.738186 env[1147]: time="2024-02-09T19:55:41.738099103Z" level=info msg="StartContainer for \"d4b680565e0e0047aa8d0ee384cf944d98a3470f8a85db0f5895dc50481ceee0\" returns successfully" Feb 9 19:55:41.740530 env[1147]: time="2024-02-09T19:55:41.740479058Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:55:42.176643 kubelet[1538]: E0209 19:55:42.176569 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:43.177460 kubelet[1538]: E0209 19:55:43.177398 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:43.228087 env[1147]: time="2024-02-09T19:55:43.228012548Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:43.231496 env[1147]: time="2024-02-09T19:55:43.231444987Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:43.233905 env[1147]: time="2024-02-09T19:55:43.233862274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:43.236204 env[1147]: time="2024-02-09T19:55:43.236162609Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:43.236961 env[1147]: time="2024-02-09T19:55:43.236906236Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:55:43.239850 env[1147]: time="2024-02-09T19:55:43.239797262Z" level=info msg="CreateContainer within sandbox \"10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:55:43.265176 env[1147]: time="2024-02-09T19:55:43.265104944Z" level=info msg="CreateContainer within sandbox \"10c9954d0e49611772bf2517b6e5a8940152ae2b6ecf4abf65b712615ebc6e67\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"e7e92cc8999929bfeb75e9330bd67177efdfec99d1775c5f98940e1994829903\"" Feb 9 19:55:43.266202 env[1147]: time="2024-02-09T19:55:43.266145674Z" level=info msg="StartContainer for \"e7e92cc8999929bfeb75e9330bd67177efdfec99d1775c5f98940e1994829903\"" Feb 9 19:55:43.303605 systemd[1]: run-containerd-runc-k8s.io-e7e92cc8999929bfeb75e9330bd67177efdfec99d1775c5f98940e1994829903-runc.m5UmX4.mount: Deactivated successfully. Feb 9 19:55:43.309173 systemd[1]: Started cri-containerd-e7e92cc8999929bfeb75e9330bd67177efdfec99d1775c5f98940e1994829903.scope. Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2618 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:43.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653932636338393939393239626665623735653933333062643637 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit: BPF prog-id=104 op=LOAD Feb 9 19:55:43.332000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000255bd0 items=0 ppid=2618 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:43.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653932636338393939393239626665623735653933333062643637 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit: BPF prog-id=105 op=LOAD Feb 9 19:55:43.332000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000255c18 items=0 ppid=2618 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:43.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653932636338393939393239626665623735653933333062643637 Feb 9 19:55:43.332000 audit: BPF prog-id=105 op=UNLOAD Feb 9 19:55:43.332000 audit: BPF prog-id=104 op=UNLOAD Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.332000 audit: BPF prog-id=106 op=LOAD Feb 9 19:55:43.332000 audit[2705]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000255ca8 items=0 ppid=2618 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:43.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537653932636338393939393239626665623735653933333062643637 Feb 9 19:55:43.358908 env[1147]: time="2024-02-09T19:55:43.358847532Z" level=info msg="StartContainer for \"e7e92cc8999929bfeb75e9330bd67177efdfec99d1775c5f98940e1994829903\" returns successfully" Feb 9 19:55:43.410451 env[1147]: time="2024-02-09T19:55:43.410384212Z" level=info msg="StopPodSandbox for \"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\"" Feb 9 19:55:43.507975 env[1147]: 2024-02-09 19:55:43.463 [INFO][2748] k8s.go 578: Cleaning up netns ContainerID="e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" Feb 9 19:55:43.507975 env[1147]: 2024-02-09 19:55:43.463 [INFO][2748] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" iface="eth0" netns="/var/run/netns/cni-c8126bef-a995-8533-7b1f-2a9749f607df" Feb 9 19:55:43.507975 env[1147]: 2024-02-09 19:55:43.463 [INFO][2748] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" iface="eth0" netns="/var/run/netns/cni-c8126bef-a995-8533-7b1f-2a9749f607df" Feb 9 19:55:43.507975 env[1147]: 2024-02-09 19:55:43.463 [INFO][2748] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" iface="eth0" netns="/var/run/netns/cni-c8126bef-a995-8533-7b1f-2a9749f607df" Feb 9 19:55:43.507975 env[1147]: 2024-02-09 19:55:43.463 [INFO][2748] k8s.go 585: Releasing IP address(es) ContainerID="e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" Feb 9 19:55:43.507975 env[1147]: 2024-02-09 19:55:43.464 [INFO][2748] utils.go 188: Calico CNI releasing IP address ContainerID="e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" Feb 9 19:55:43.507975 env[1147]: 2024-02-09 19:55:43.491 [INFO][2754] ipam_plugin.go 415: Releasing address using handleID ContainerID="e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" HandleID="k8s-pod-network.e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" Workload="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0" Feb 9 19:55:43.507975 env[1147]: 2024-02-09 19:55:43.491 [INFO][2754] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:55:43.507975 env[1147]: 2024-02-09 19:55:43.491 [INFO][2754] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:55:43.507975 env[1147]: 2024-02-09 19:55:43.501 [WARNING][2754] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" HandleID="k8s-pod-network.e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" Workload="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0" Feb 9 19:55:43.507975 env[1147]: 2024-02-09 19:55:43.501 [INFO][2754] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" HandleID="k8s-pod-network.e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" Workload="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0" Feb 9 19:55:43.507975 env[1147]: 2024-02-09 19:55:43.503 [INFO][2754] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:55:43.507975 env[1147]: 2024-02-09 19:55:43.504 [INFO][2748] k8s.go 591: Teardown processing complete. ContainerID="e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb" Feb 9 19:55:43.511758 systemd[1]: run-netns-cni\x2dc8126bef\x2da995\x2d8533\x2d7b1f\x2d2a9749f607df.mount: Deactivated successfully. Feb 9 19:55:43.513311 env[1147]: time="2024-02-09T19:55:43.513258632Z" level=info msg="TearDown network for sandbox \"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\" successfully" Feb 9 19:55:43.513479 env[1147]: time="2024-02-09T19:55:43.513426392Z" level=info msg="StopPodSandbox for \"e931a8255a2d97d289b20f16867b440ee0c999101b3a45e9e975e0d96c8905bb\" returns successfully" Feb 9 19:55:43.514364 env[1147]: time="2024-02-09T19:55:43.514322337Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-9nv6h,Uid:d89722da-db66-49af-9daa-b5c3ebda5305,Namespace:default,Attempt:1,}" Feb 9 19:55:43.668969 kubelet[1538]: I0209 19:55:43.668910 1538 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-gxzmq" podStartSLOduration=-9.22337197318595e+09 pod.CreationTimestamp="2024-02-09 19:54:40 +0000 UTC" firstStartedPulling="2024-02-09 19:55:40.044680431 +0000 UTC m=+73.960973537" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:55:43.668139551 +0000 UTC m=+77.584432658" watchObservedRunningTime="2024-02-09 19:55:43.668826083 +0000 UTC m=+77.585119197" Feb 9 19:55:43.669915 systemd-networkd[1033]: calied35313049f: Link UP Feb 9 19:55:43.685824 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:55:43.686028 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calied35313049f: link becomes ready Feb 9 19:55:43.686789 systemd-networkd[1033]: calied35313049f: Gained carrier Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.575 [INFO][2760] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0 nginx-deployment-8ffc5cf85- default d89722da-db66-49af-9daa-b5c3ebda5305 1144 0 2024-02-09 19:55:28 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.58 nginx-deployment-8ffc5cf85-9nv6h eth0 default [] [] [kns.default ksa.default.default] calied35313049f [] []}} ContainerID="e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9nv6h" WorkloadEndpoint="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-" Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.576 [INFO][2760] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9nv6h" WorkloadEndpoint="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0" Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.609 [INFO][2774] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" HandleID="k8s-pod-network.e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" Workload="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0" Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.620 [INFO][2774] ipam_plugin.go 268: Auto assigning IP ContainerID="e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" HandleID="k8s-pod-network.e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" Workload="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004a1b00), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.58", "pod":"nginx-deployment-8ffc5cf85-9nv6h", "timestamp":"2024-02-09 19:55:43.609329269 +0000 UTC"}, Hostname:"10.128.0.58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.620 [INFO][2774] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.620 [INFO][2774] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.620 [INFO][2774] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.58' Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.623 [INFO][2774] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" host="10.128.0.58" Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.628 [INFO][2774] ipam.go 372: Looking up existing affinities for host host="10.128.0.58" Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.633 [INFO][2774] ipam.go 489: Trying affinity for 192.168.16.192/26 host="10.128.0.58" Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.635 [INFO][2774] ipam.go 155: Attempting to load block cidr=192.168.16.192/26 host="10.128.0.58" Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.638 [INFO][2774] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.16.192/26 host="10.128.0.58" Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.638 [INFO][2774] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.16.192/26 handle="k8s-pod-network.e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" host="10.128.0.58" Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.640 [INFO][2774] ipam.go 1682: Creating new handle: k8s-pod-network.e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829 Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.651 [INFO][2774] ipam.go 1203: Writing block in order to claim IPs block=192.168.16.192/26 handle="k8s-pod-network.e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" host="10.128.0.58" Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.663 [INFO][2774] ipam.go 1216: Successfully claimed IPs: [192.168.16.194/26] block=192.168.16.192/26 handle="k8s-pod-network.e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" host="10.128.0.58" Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.663 [INFO][2774] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.16.194/26] handle="k8s-pod-network.e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" host="10.128.0.58" Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.663 [INFO][2774] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:55:43.696678 env[1147]: 2024-02-09 19:55:43.663 [INFO][2774] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.16.194/26] IPv6=[] ContainerID="e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" HandleID="k8s-pod-network.e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" Workload="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0" Feb 9 19:55:43.704756 env[1147]: 2024-02-09 19:55:43.665 [INFO][2760] k8s.go 385: Populated endpoint ContainerID="e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9nv6h" WorkloadEndpoint="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d89722da-db66-49af-9daa-b5c3ebda5305", ResourceVersion:"1144", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 55, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.58", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-9nv6h", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.16.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calied35313049f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:55:43.704756 env[1147]: 2024-02-09 19:55:43.665 [INFO][2760] k8s.go 386: Calico CNI using IPs: [192.168.16.194/32] ContainerID="e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9nv6h" WorkloadEndpoint="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0" Feb 9 19:55:43.704756 env[1147]: 2024-02-09 19:55:43.665 [INFO][2760] dataplane_linux.go 68: Setting the host side veth name to calied35313049f ContainerID="e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9nv6h" WorkloadEndpoint="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0" Feb 9 19:55:43.704756 env[1147]: 2024-02-09 19:55:43.687 [INFO][2760] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9nv6h" WorkloadEndpoint="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0" Feb 9 19:55:43.704756 env[1147]: 2024-02-09 19:55:43.688 [INFO][2760] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9nv6h" WorkloadEndpoint="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d89722da-db66-49af-9daa-b5c3ebda5305", ResourceVersion:"1144", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 55, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.58", ContainerID:"e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829", Pod:"nginx-deployment-8ffc5cf85-9nv6h", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.16.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calied35313049f", MAC:"96:d2:56:69:31:6f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:55:43.704756 env[1147]: 2024-02-09 19:55:43.694 [INFO][2760] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829" Namespace="default" Pod="nginx-deployment-8ffc5cf85-9nv6h" WorkloadEndpoint="10.128.0.58-k8s-nginx--deployment--8ffc5cf85--9nv6h-eth0" Feb 9 19:55:43.730388 env[1147]: time="2024-02-09T19:55:43.730274180Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:55:43.730756 env[1147]: time="2024-02-09T19:55:43.730341065Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:55:43.730756 env[1147]: time="2024-02-09T19:55:43.730360436Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:55:43.730756 env[1147]: time="2024-02-09T19:55:43.730606834Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829 pid=2803 runtime=io.containerd.runc.v2 Feb 9 19:55:43.733000 audit[2811]: NETFILTER_CFG table=filter:84 family=2 entries=40 op=nft_register_chain pid=2811 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:55:43.733000 audit[2811]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffc5cb5db80 a2=0 a3=7ffc5cb5db6c items=0 ppid=2363 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:43.733000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:55:43.754545 systemd[1]: Started cri-containerd-e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829.scope. Feb 9 19:55:43.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.781000 audit: BPF prog-id=107 op=LOAD Feb 9 19:55:43.782000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.782000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2803 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:43.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539636338323434626438376539616136656562373164643232303138 Feb 9 19:55:43.782000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.782000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2803 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:43.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539636338323434626438376539616136656562373164643232303138 Feb 9 19:55:43.782000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.782000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.782000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.782000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.782000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.782000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.782000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.782000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.782000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.782000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.782000 audit: BPF prog-id=108 op=LOAD Feb 9 19:55:43.782000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00030abd0 items=0 ppid=2803 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:43.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539636338323434626438376539616136656562373164643232303138 Feb 9 19:55:43.785000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.785000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.785000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.785000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.785000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.785000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.785000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.785000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.785000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.785000 audit: BPF prog-id=109 op=LOAD Feb 9 19:55:43.785000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00030ac18 items=0 ppid=2803 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:43.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539636338323434626438376539616136656562373164643232303138 Feb 9 19:55:43.786000 audit: BPF prog-id=109 op=UNLOAD Feb 9 19:55:43.786000 audit: BPF prog-id=108 op=UNLOAD Feb 9 19:55:43.786000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.786000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.786000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.786000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.786000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.786000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.786000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.786000 audit[2814]: AVC avc: denied { perfmon } for pid=2814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.786000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.786000 audit[2814]: AVC avc: denied { bpf } for pid=2814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:43.786000 audit: BPF prog-id=110 op=LOAD Feb 9 19:55:43.786000 audit[2814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00030b028 items=0 ppid=2803 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:43.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539636338323434626438376539616136656562373164643232303138 Feb 9 19:55:43.827520 env[1147]: time="2024-02-09T19:55:43.827440061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-9nv6h,Uid:d89722da-db66-49af-9daa-b5c3ebda5305,Namespace:default,Attempt:1,} returns sandbox id \"e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829\"" Feb 9 19:55:43.829703 env[1147]: time="2024-02-09T19:55:43.829662859Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:55:44.178421 kubelet[1538]: E0209 19:55:44.178355 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:44.305529 kubelet[1538]: I0209 19:55:44.305110 1538 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:55:44.305529 kubelet[1538]: I0209 19:55:44.305162 1538 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:55:44.861865 systemd-networkd[1033]: calied35313049f: Gained IPv6LL Feb 9 19:55:45.178850 kubelet[1538]: E0209 19:55:45.178779 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:46.179791 kubelet[1538]: E0209 19:55:46.179740 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:46.685507 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4156317427.mount: Deactivated successfully. Feb 9 19:55:47.120919 kubelet[1538]: E0209 19:55:47.120464 1538 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:47.180156 kubelet[1538]: E0209 19:55:47.180076 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:47.836450 env[1147]: time="2024-02-09T19:55:47.836340194Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:47.840223 env[1147]: time="2024-02-09T19:55:47.840171817Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:47.849179 env[1147]: time="2024-02-09T19:55:47.849126271Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:47.853519 env[1147]: time="2024-02-09T19:55:47.853472651Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:55:47.856054 env[1147]: time="2024-02-09T19:55:47.856007767Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:55:47.858789 env[1147]: time="2024-02-09T19:55:47.858744483Z" level=info msg="CreateContainer within sandbox \"e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 19:55:47.877780 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2309084474.mount: Deactivated successfully. Feb 9 19:55:47.888351 env[1147]: time="2024-02-09T19:55:47.888292108Z" level=info msg="CreateContainer within sandbox \"e9cc8244bd87e9aa6eeb71dd22018882d0bdcf0689acf7c74137db6f127f3829\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"5ea7184181bfc85254f69b40b69aba8a8748d2aed72136c61cdde94a2e3021f8\"" Feb 9 19:55:47.889225 env[1147]: time="2024-02-09T19:55:47.889153936Z" level=info msg="StartContainer for \"5ea7184181bfc85254f69b40b69aba8a8748d2aed72136c61cdde94a2e3021f8\"" Feb 9 19:55:47.916338 systemd[1]: Started cri-containerd-5ea7184181bfc85254f69b40b69aba8a8748d2aed72136c61cdde94a2e3021f8.scope. Feb 9 19:55:47.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.971253 kernel: kauditd_printk_skb: 196 callbacks suppressed Feb 9 19:55:47.971485 kernel: audit: type=1400 audit(1707508547.943:821): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.992467 kernel: audit: type=1400 audit(1707508547.943:822): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:48.036304 kernel: audit: type=1400 audit(1707508547.943:823): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:48.036502 kernel: audit: type=1400 audit(1707508547.943:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:48.059600 kernel: audit: type=1400 audit(1707508547.943:825): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:48.093414 env[1147]: time="2024-02-09T19:55:48.093340521Z" level=info msg="StartContainer for \"5ea7184181bfc85254f69b40b69aba8a8748d2aed72136c61cdde94a2e3021f8\" returns successfully" Feb 9 19:55:48.103586 kernel: audit: type=1400 audit(1707508547.943:826): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:48.103811 kernel: audit: type=1400 audit(1707508547.943:827): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:48.104478 kernel: audit: type=1400 audit(1707508547.943:828): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:48.126544 kernel: audit: type=1400 audit(1707508547.943:829): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.944000 audit: BPF prog-id=111 op=LOAD Feb 9 19:55:47.949000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:48.169521 kernel: audit: type=1400 audit(1707508547.944:830): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.949000 audit[2856]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2803 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:47.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613731383431383162666338353235346636396234306236396162 Feb 9 19:55:47.949000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.949000 audit[2856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2803 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:47.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613731383431383162666338353235346636396234306236396162 Feb 9 19:55:47.949000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.949000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.949000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.949000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.949000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.949000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.949000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.949000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.949000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.949000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.949000 audit: BPF prog-id=112 op=LOAD Feb 9 19:55:47.949000 audit[2856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000212d70 items=0 ppid=2803 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:47.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613731383431383162666338353235346636396234306236396162 Feb 9 19:55:47.970000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.970000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.970000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.970000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.970000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.970000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.970000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.970000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.970000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.970000 audit: BPF prog-id=113 op=LOAD Feb 9 19:55:47.970000 audit[2856]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000212db8 items=0 ppid=2803 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:47.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613731383431383162666338353235346636396234306236396162 Feb 9 19:55:47.971000 audit: BPF prog-id=113 op=UNLOAD Feb 9 19:55:47.971000 audit: BPF prog-id=112 op=UNLOAD Feb 9 19:55:47.971000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.971000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.971000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.971000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.971000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.971000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.971000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.971000 audit[2856]: AVC avc: denied { perfmon } for pid=2856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.971000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.971000 audit[2856]: AVC avc: denied { bpf } for pid=2856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:47.971000 audit: BPF prog-id=114 op=LOAD Feb 9 19:55:47.971000 audit[2856]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002131c8 items=0 ppid=2803 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:47.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565613731383431383162666338353235346636396234306236396162 Feb 9 19:55:48.181294 kubelet[1538]: E0209 19:55:48.181183 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:48.671513 kubelet[1538]: I0209 19:55:48.671459 1538 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-9nv6h" podStartSLOduration=-9.223372016183397e+09 pod.CreationTimestamp="2024-02-09 19:55:28 +0000 UTC" firstStartedPulling="2024-02-09 19:55:43.829297121 +0000 UTC m=+77.745590224" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:55:48.670731924 +0000 UTC m=+82.587025052" watchObservedRunningTime="2024-02-09 19:55:48.671377999 +0000 UTC m=+82.587671111" Feb 9 19:55:49.182583 kubelet[1538]: E0209 19:55:49.182473 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:50.183129 kubelet[1538]: E0209 19:55:50.183051 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:51.184349 kubelet[1538]: E0209 19:55:51.184266 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:52.184921 kubelet[1538]: E0209 19:55:52.184824 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:53.186014 kubelet[1538]: E0209 19:55:53.185942 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:54.015013 systemd[1]: run-containerd-runc-k8s.io-bc3a81c5a0ef91bc88cb9312832a24239f33e5c963832180c56c4c8cd522112a-runc.AZjlSd.mount: Deactivated successfully. Feb 9 19:55:54.186836 kubelet[1538]: E0209 19:55:54.186770 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:54.392788 kubelet[1538]: I0209 19:55:54.392612 1538 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:55:54.404099 systemd[1]: Created slice kubepods-besteffort-podff15d3e4_d095_4b94_81e4_bb4e5f547e4a.slice. Feb 9 19:55:54.410000 audit[2956]: NETFILTER_CFG table=filter:85 family=2 entries=18 op=nft_register_rule pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:54.418131 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 9 19:55:54.418232 kernel: audit: type=1325 audit(1707508554.410:839): table=filter:85 family=2 entries=18 op=nft_register_rule pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:54.410000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffee12fc5a0 a2=0 a3=7ffee12fc58c items=0 ppid=1915 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.468779 kernel: audit: type=1300 audit(1707508554.410:839): arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffee12fc5a0 a2=0 a3=7ffee12fc58c items=0 ppid=1915 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:54.484686 kernel: audit: type=1327 audit(1707508554.410:839): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:54.484868 kernel: audit: type=1325 audit(1707508554.413:840): table=nat:86 family=2 entries=78 op=nft_register_rule pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:54.413000 audit[2956]: NETFILTER_CFG table=nat:86 family=2 entries=78 op=nft_register_rule pid=2956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:54.413000 audit[2956]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffee12fc5a0 a2=0 a3=7ffee12fc58c items=0 ppid=1915 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.518633 kubelet[1538]: I0209 19:55:54.518580 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/ff15d3e4-d095-4b94-81e4-bb4e5f547e4a-data\") pod \"nfs-server-provisioner-0\" (UID: \"ff15d3e4-d095-4b94-81e4-bb4e5f547e4a\") " pod="default/nfs-server-provisioner-0" Feb 9 19:55:54.520586 kubelet[1538]: I0209 19:55:54.520554 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r2rgc\" (UniqueName: \"kubernetes.io/projected/ff15d3e4-d095-4b94-81e4-bb4e5f547e4a-kube-api-access-r2rgc\") pod \"nfs-server-provisioner-0\" (UID: \"ff15d3e4-d095-4b94-81e4-bb4e5f547e4a\") " pod="default/nfs-server-provisioner-0" Feb 9 19:55:54.534379 kernel: audit: type=1300 audit(1707508554.413:840): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffee12fc5a0 a2=0 a3=7ffee12fc58c items=0 ppid=1915 pid=2956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.534560 kernel: audit: type=1327 audit(1707508554.413:840): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:54.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:54.600000 audit[2985]: NETFILTER_CFG table=filter:87 family=2 entries=30 op=nft_register_rule pid=2985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:54.600000 audit[2985]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7fffac3a2a10 a2=0 a3=7fffac3a29fc items=0 ppid=1915 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.652711 kernel: audit: type=1325 audit(1707508554.600:841): table=filter:87 family=2 entries=30 op=nft_register_rule pid=2985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:54.653019 kernel: audit: type=1300 audit(1707508554.600:841): arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7fffac3a2a10 a2=0 a3=7fffac3a29fc items=0 ppid=1915 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.653084 kernel: audit: type=1327 audit(1707508554.600:841): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:54.600000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:54.603000 audit[2985]: NETFILTER_CFG table=nat:88 family=2 entries=78 op=nft_register_rule pid=2985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:54.603000 audit[2985]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7fffac3a2a10 a2=0 a3=7fffac3a29fc items=0 ppid=1915 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.603000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:54.688464 kernel: audit: type=1325 audit(1707508554.603:842): table=nat:88 family=2 entries=78 op=nft_register_rule pid=2985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:54.708549 env[1147]: time="2024-02-09T19:55:54.708470371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ff15d3e4-d095-4b94-81e4-bb4e5f547e4a,Namespace:default,Attempt:0,}" Feb 9 19:55:54.883282 systemd-networkd[1033]: cali60e51b789ff: Link UP Feb 9 19:55:54.898654 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:55:54.898770 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 19:55:54.900510 systemd-networkd[1033]: cali60e51b789ff: Gained carrier Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.796 [INFO][2988] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.58-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default ff15d3e4-d095-4b94-81e4-bb4e5f547e4a 1198 0 2024-02-09 19:55:54 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.128.0.58 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.58-k8s-nfs--server--provisioner--0-" Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.796 [INFO][2988] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.58-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.832 [INFO][2999] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" HandleID="k8s-pod-network.e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" Workload="10.128.0.58-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.844 [INFO][2999] ipam_plugin.go 268: Auto assigning IP ContainerID="e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" HandleID="k8s-pod-network.e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" Workload="10.128.0.58-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002c3d70), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.58", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 19:55:54.832329574 +0000 UTC"}, Hostname:"10.128.0.58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.844 [INFO][2999] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.844 [INFO][2999] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.844 [INFO][2999] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.58' Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.846 [INFO][2999] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" host="10.128.0.58" Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.852 [INFO][2999] ipam.go 372: Looking up existing affinities for host host="10.128.0.58" Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.858 [INFO][2999] ipam.go 489: Trying affinity for 192.168.16.192/26 host="10.128.0.58" Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.860 [INFO][2999] ipam.go 155: Attempting to load block cidr=192.168.16.192/26 host="10.128.0.58" Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.863 [INFO][2999] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.16.192/26 host="10.128.0.58" Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.863 [INFO][2999] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.16.192/26 handle="k8s-pod-network.e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" host="10.128.0.58" Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.865 [INFO][2999] ipam.go 1682: Creating new handle: k8s-pod-network.e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669 Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.869 [INFO][2999] ipam.go 1203: Writing block in order to claim IPs block=192.168.16.192/26 handle="k8s-pod-network.e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" host="10.128.0.58" Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.876 [INFO][2999] ipam.go 1216: Successfully claimed IPs: [192.168.16.195/26] block=192.168.16.192/26 handle="k8s-pod-network.e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" host="10.128.0.58" Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.876 [INFO][2999] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.16.195/26] handle="k8s-pod-network.e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" host="10.128.0.58" Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.876 [INFO][2999] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:55:54.913913 env[1147]: 2024-02-09 19:55:54.876 [INFO][2999] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.16.195/26] IPv6=[] ContainerID="e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" HandleID="k8s-pod-network.e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" Workload="10.128.0.58-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:55:54.915231 env[1147]: 2024-02-09 19:55:54.878 [INFO][2988] k8s.go 385: Populated endpoint ContainerID="e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.58-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ff15d3e4-d095-4b94-81e4-bb4e5f547e4a", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 55, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.58", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.16.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:55:54.915231 env[1147]: 2024-02-09 19:55:54.878 [INFO][2988] k8s.go 386: Calico CNI using IPs: [192.168.16.195/32] ContainerID="e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.58-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:55:54.915231 env[1147]: 2024-02-09 19:55:54.878 [INFO][2988] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.58-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:55:54.915231 env[1147]: 2024-02-09 19:55:54.899 [INFO][2988] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.58-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:55:54.915677 env[1147]: 2024-02-09 19:55:54.899 [INFO][2988] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.58-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"ff15d3e4-d095-4b94-81e4-bb4e5f547e4a", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 55, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.58", ContainerID:"e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.16.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"3e:b4:c6:7b:ce:3f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:55:54.915677 env[1147]: 2024-02-09 19:55:54.911 [INFO][2988] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.128.0.58-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:55:54.932665 env[1147]: time="2024-02-09T19:55:54.932573709Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:55:54.932993 env[1147]: time="2024-02-09T19:55:54.932676519Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:55:54.932993 env[1147]: time="2024-02-09T19:55:54.932718758Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:55:54.933221 env[1147]: time="2024-02-09T19:55:54.933095016Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669 pid=3026 runtime=io.containerd.runc.v2 Feb 9 19:55:54.963078 systemd[1]: Started cri-containerd-e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669.scope. Feb 9 19:55:54.988000 audit[3053]: NETFILTER_CFG table=filter:89 family=2 entries=38 op=nft_register_chain pid=3053 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:55:54.988000 audit[3053]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffff8f89c60 a2=0 a3=7ffff8f89c4c items=0 ppid=2363 pid=3053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.988000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:55:54.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.996000 audit: BPF prog-id=115 op=LOAD Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=3026 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531376133656363643135343861386366643361356262646631633437 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=3026 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531376133656363643135343861386366643361356262646631633437 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit: BPF prog-id=116 op=LOAD Feb 9 19:55:54.997000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c000212340 items=0 ppid=3026 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531376133656363643135343861386366643361356262646631633437 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit: BPF prog-id=117 op=LOAD Feb 9 19:55:54.997000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c000212388 items=0 ppid=3026 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531376133656363643135343861386366643361356262646631633437 Feb 9 19:55:54.997000 audit: BPF prog-id=117 op=UNLOAD Feb 9 19:55:54.997000 audit: BPF prog-id=116 op=UNLOAD Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { perfmon } for pid=3036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit[3036]: AVC avc: denied { bpf } for pid=3036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:55:54.997000 audit: BPF prog-id=118 op=LOAD Feb 9 19:55:54.997000 audit[3036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c000212798 items=0 ppid=3026 pid=3036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:54.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531376133656363643135343861386366643361356262646631633437 Feb 9 19:55:55.043016 env[1147]: time="2024-02-09T19:55:55.042957449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:ff15d3e4-d095-4b94-81e4-bb4e5f547e4a,Namespace:default,Attempt:0,} returns sandbox id \"e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669\"" Feb 9 19:55:55.052783 kubelet[1538]: E0209 19:55:55.052735 1538 gcpcredential.go:74] while reading 'google-dockercfg-url' metadata: http status code: 404 while fetching url http://metadata.google.internal./computeMetadata/v1/instance/attributes/google-dockercfg-url Feb 9 19:55:55.053594 env[1147]: time="2024-02-09T19:55:55.053549633Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 19:55:55.188182 kubelet[1538]: E0209 19:55:55.188125 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:56.125452 systemd-networkd[1033]: cali60e51b789ff: Gained IPv6LL Feb 9 19:55:56.188928 kubelet[1538]: E0209 19:55:56.188845 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:57.189215 kubelet[1538]: E0209 19:55:57.189147 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:57.844993 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount419931471.mount: Deactivated successfully. Feb 9 19:55:58.189752 kubelet[1538]: E0209 19:55:58.189619 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:59.190219 kubelet[1538]: E0209 19:55:59.190164 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:55:59.286495 kubelet[1538]: I0209 19:55:59.286451 1538 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:55:59.294794 systemd[1]: Created slice kubepods-besteffort-pod5ffd745d_b9fe_48bf_8546_e806656050a9.slice. Feb 9 19:55:59.357893 kubelet[1538]: I0209 19:55:59.357840 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vhh8j\" (UniqueName: \"kubernetes.io/projected/5ffd745d-b9fe-48bf-8546-e806656050a9-kube-api-access-vhh8j\") pod \"calico-apiserver-79c6d6dcf6-r5g2z\" (UID: \"5ffd745d-b9fe-48bf-8546-e806656050a9\") " pod="calico-apiserver/calico-apiserver-79c6d6dcf6-r5g2z" Feb 9 19:55:59.358116 kubelet[1538]: I0209 19:55:59.357912 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5ffd745d-b9fe-48bf-8546-e806656050a9-calico-apiserver-certs\") pod \"calico-apiserver-79c6d6dcf6-r5g2z\" (UID: \"5ffd745d-b9fe-48bf-8546-e806656050a9\") " pod="calico-apiserver/calico-apiserver-79c6d6dcf6-r5g2z" Feb 9 19:55:59.410000 audit[3098]: NETFILTER_CFG table=filter:90 family=2 entries=31 op=nft_register_rule pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.410000 audit[3098]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffe55347380 a2=0 a3=7ffe5534736c items=0 ppid=1915 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:59.413000 audit[3098]: NETFILTER_CFG table=nat:91 family=2 entries=78 op=nft_register_rule pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.425357 kernel: kauditd_printk_skb: 65 callbacks suppressed Feb 9 19:55:59.425558 kernel: audit: type=1325 audit(1707508559.413:863): table=nat:91 family=2 entries=78 op=nft_register_rule pid=3098 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.413000 audit[3098]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe55347380 a2=0 a3=7ffe5534736c items=0 ppid=1915 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.459982 kubelet[1538]: E0209 19:55:59.459300 1538 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 19:55:59.459982 kubelet[1538]: E0209 19:55:59.459456 1538 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/5ffd745d-b9fe-48bf-8546-e806656050a9-calico-apiserver-certs podName:5ffd745d-b9fe-48bf-8546-e806656050a9 nodeName:}" failed. No retries permitted until 2024-02-09 19:55:59.959388663 +0000 UTC m=+93.875681774 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/5ffd745d-b9fe-48bf-8546-e806656050a9-calico-apiserver-certs") pod "calico-apiserver-79c6d6dcf6-r5g2z" (UID: "5ffd745d-b9fe-48bf-8546-e806656050a9") : secret "calico-apiserver-certs" not found Feb 9 19:55:59.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:59.502644 kernel: audit: type=1300 audit(1707508559.413:863): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe55347380 a2=0 a3=7ffe5534736c items=0 ppid=1915 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.502805 kernel: audit: type=1327 audit(1707508559.413:863): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:59.554000 audit[3125]: NETFILTER_CFG table=filter:92 family=2 entries=32 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.572589 kernel: audit: type=1325 audit(1707508559.554:864): table=filter:92 family=2 entries=32 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.554000 audit[3125]: SYSCALL arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffd61158560 a2=0 a3=7ffd6115854c items=0 ppid=1915 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.554000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:59.625325 kernel: audit: type=1300 audit(1707508559.554:864): arch=c000003e syscall=46 success=yes exit=11068 a0=3 a1=7ffd61158560 a2=0 a3=7ffd6115854c items=0 ppid=1915 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.625524 kernel: audit: type=1327 audit(1707508559.554:864): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:59.625571 kernel: audit: type=1325 audit(1707508559.574:865): table=nat:93 family=2 entries=78 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.574000 audit[3125]: NETFILTER_CFG table=nat:93 family=2 entries=78 op=nft_register_rule pid=3125 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:55:59.574000 audit[3125]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd61158560 a2=0 a3=7ffd6115854c items=0 ppid=1915 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.675231 kernel: audit: type=1300 audit(1707508559.574:865): arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffd61158560 a2=0 a3=7ffd6115854c items=0 ppid=1915 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:55:59.675419 kernel: audit: type=1327 audit(1707508559.574:865): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:55:59.574000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:00.190685 kubelet[1538]: E0209 19:56:00.190618 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:00.202747 env[1147]: time="2024-02-09T19:56:00.202681956Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c6d6dcf6-r5g2z,Uid:5ffd745d-b9fe-48bf-8546-e806656050a9,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:56:00.543528 systemd-networkd[1033]: calidaddb4f353c: Link UP Feb 9 19:56:00.562372 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:56:00.562589 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidaddb4f353c: link becomes ready Feb 9 19:56:00.570596 systemd-networkd[1033]: calidaddb4f353c: Gained carrier Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.312 [INFO][3129] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-eth0 calico-apiserver-79c6d6dcf6- calico-apiserver 5ffd745d-b9fe-48bf-8546-e806656050a9 1261 0 2024-02-09 19:55:59 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:79c6d6dcf6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 10.128.0.58 calico-apiserver-79c6d6dcf6-r5g2z eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calidaddb4f353c [] []}} ContainerID="32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-r5g2z" WorkloadEndpoint="10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-" Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.312 [INFO][3129] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-r5g2z" WorkloadEndpoint="10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-eth0" Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.387 [INFO][3142] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" HandleID="k8s-pod-network.32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" Workload="10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-eth0" Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.426 [INFO][3142] ipam_plugin.go 268: Auto assigning IP ContainerID="32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" HandleID="k8s-pod-network.32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" Workload="10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027ccc0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"10.128.0.58", "pod":"calico-apiserver-79c6d6dcf6-r5g2z", "timestamp":"2024-02-09 19:56:00.387656803 +0000 UTC"}, Hostname:"10.128.0.58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.426 [INFO][3142] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.426 [INFO][3142] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.426 [INFO][3142] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.58' Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.434 [INFO][3142] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" host="10.128.0.58" Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.443 [INFO][3142] ipam.go 372: Looking up existing affinities for host host="10.128.0.58" Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.456 [INFO][3142] ipam.go 489: Trying affinity for 192.168.16.192/26 host="10.128.0.58" Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.458 [INFO][3142] ipam.go 155: Attempting to load block cidr=192.168.16.192/26 host="10.128.0.58" Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.475 [INFO][3142] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.16.192/26 host="10.128.0.58" Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.475 [INFO][3142] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.16.192/26 handle="k8s-pod-network.32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" host="10.128.0.58" Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.478 [INFO][3142] ipam.go 1682: Creating new handle: k8s-pod-network.32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7 Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.501 [INFO][3142] ipam.go 1203: Writing block in order to claim IPs block=192.168.16.192/26 handle="k8s-pod-network.32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" host="10.128.0.58" Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.526 [INFO][3142] ipam.go 1216: Successfully claimed IPs: [192.168.16.196/26] block=192.168.16.192/26 handle="k8s-pod-network.32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" host="10.128.0.58" Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.527 [INFO][3142] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.16.196/26] handle="k8s-pod-network.32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" host="10.128.0.58" Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.527 [INFO][3142] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:56:00.590215 env[1147]: 2024-02-09 19:56:00.527 [INFO][3142] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.16.196/26] IPv6=[] ContainerID="32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" HandleID="k8s-pod-network.32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" Workload="10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-eth0" Feb 9 19:56:00.599748 env[1147]: 2024-02-09 19:56:00.530 [INFO][3129] k8s.go 385: Populated endpoint ContainerID="32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-r5g2z" WorkloadEndpoint="10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-eth0", GenerateName:"calico-apiserver-79c6d6dcf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"5ffd745d-b9fe-48bf-8546-e806656050a9", ResourceVersion:"1261", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 55, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c6d6dcf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.58", ContainerID:"", Pod:"calico-apiserver-79c6d6dcf6-r5g2z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.16.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidaddb4f353c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:56:00.599748 env[1147]: 2024-02-09 19:56:00.530 [INFO][3129] k8s.go 386: Calico CNI using IPs: [192.168.16.196/32] ContainerID="32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-r5g2z" WorkloadEndpoint="10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-eth0" Feb 9 19:56:00.599748 env[1147]: 2024-02-09 19:56:00.530 [INFO][3129] dataplane_linux.go 68: Setting the host side veth name to calidaddb4f353c ContainerID="32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-r5g2z" WorkloadEndpoint="10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-eth0" Feb 9 19:56:00.599748 env[1147]: 2024-02-09 19:56:00.569 [INFO][3129] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-r5g2z" WorkloadEndpoint="10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-eth0" Feb 9 19:56:00.599748 env[1147]: 2024-02-09 19:56:00.571 [INFO][3129] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-r5g2z" WorkloadEndpoint="10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-eth0", GenerateName:"calico-apiserver-79c6d6dcf6-", Namespace:"calico-apiserver", SelfLink:"", UID:"5ffd745d-b9fe-48bf-8546-e806656050a9", ResourceVersion:"1261", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 55, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"79c6d6dcf6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.58", ContainerID:"32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7", Pod:"calico-apiserver-79c6d6dcf6-r5g2z", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.16.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidaddb4f353c", MAC:"ce:d2:e0:5c:e2:0e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:56:00.599748 env[1147]: 2024-02-09 19:56:00.586 [INFO][3129] k8s.go 491: Wrote updated endpoint to datastore ContainerID="32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7" Namespace="calico-apiserver" Pod="calico-apiserver-79c6d6dcf6-r5g2z" WorkloadEndpoint="10.128.0.58-k8s-calico--apiserver--79c6d6dcf6--r5g2z-eth0" Feb 9 19:56:00.648000 audit[3177]: NETFILTER_CFG table=filter:94 family=2 entries=55 op=nft_register_chain pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:56:00.667471 kernel: audit: type=1325 audit(1707508560.648:866): table=filter:94 family=2 entries=55 op=nft_register_chain pid=3177 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:56:00.667759 env[1147]: time="2024-02-09T19:56:00.649595882Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:56:00.667759 env[1147]: time="2024-02-09T19:56:00.649714050Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:56:00.667759 env[1147]: time="2024-02-09T19:56:00.649735813Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:56:00.667759 env[1147]: time="2024-02-09T19:56:00.650503985Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7 pid=3173 runtime=io.containerd.runc.v2 Feb 9 19:56:00.648000 audit[3177]: SYSCALL arch=c000003e syscall=46 success=yes exit=28104 a0=3 a1=7ffef20e8f90 a2=0 a3=7ffef20e8f7c items=0 ppid=2363 pid=3177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:00.648000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:56:00.718613 systemd[1]: Started cri-containerd-32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7.scope. Feb 9 19:56:00.746262 systemd[1]: run-containerd-runc-k8s.io-32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7-runc.6OMA7a.mount: Deactivated successfully. Feb 9 19:56:00.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.767000 audit: BPF prog-id=119 op=LOAD Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3173 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:00.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656562383933343462313662326264316339616538666461323961 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3173 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:00.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656562383933343462313662326264316339616538666461323961 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit: BPF prog-id=120 op=LOAD Feb 9 19:56:00.769000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002184e0 items=0 ppid=3173 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:00.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656562383933343462313662326264316339616538666461323961 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit: BPF prog-id=121 op=LOAD Feb 9 19:56:00.769000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000218528 items=0 ppid=3173 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:00.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656562383933343462313662326264316339616538666461323961 Feb 9 19:56:00.769000 audit: BPF prog-id=121 op=UNLOAD Feb 9 19:56:00.769000 audit: BPF prog-id=120 op=UNLOAD Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { perfmon } for pid=3185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit[3185]: AVC avc: denied { bpf } for pid=3185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:00.769000 audit: BPF prog-id=122 op=LOAD Feb 9 19:56:00.769000 audit[3185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000218938 items=0 ppid=3173 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:00.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332656562383933343462313662326264316339616538666461323961 Feb 9 19:56:00.830248 env[1147]: time="2024-02-09T19:56:00.829993000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-79c6d6dcf6-r5g2z,Uid:5ffd745d-b9fe-48bf-8546-e806656050a9,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7\"" Feb 9 19:56:01.192475 kubelet[1538]: E0209 19:56:01.192394 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:01.497059 env[1147]: time="2024-02-09T19:56:01.496852705Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:01.501309 env[1147]: time="2024-02-09T19:56:01.501197539Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:01.504543 env[1147]: time="2024-02-09T19:56:01.504483759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:01.507326 env[1147]: time="2024-02-09T19:56:01.507267309Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:01.508357 env[1147]: time="2024-02-09T19:56:01.508281644Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 19:56:01.510833 env[1147]: time="2024-02-09T19:56:01.510771663Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:56:01.512796 env[1147]: time="2024-02-09T19:56:01.512745955Z" level=info msg="CreateContainer within sandbox \"e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 19:56:01.538324 env[1147]: time="2024-02-09T19:56:01.538109834Z" level=info msg="CreateContainer within sandbox \"e17a3eccd1548a8cfd3a5bbdf1c4737994283053ee6a7a529877824455691669\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"b6f622edebb8fe901d597d20b6108d8eadeacd32ba936a71de19c34cc3f7003b\"" Feb 9 19:56:01.539614 env[1147]: time="2024-02-09T19:56:01.539574395Z" level=info msg="StartContainer for \"b6f622edebb8fe901d597d20b6108d8eadeacd32ba936a71de19c34cc3f7003b\"" Feb 9 19:56:01.572760 systemd[1]: Started cri-containerd-b6f622edebb8fe901d597d20b6108d8eadeacd32ba936a71de19c34cc3f7003b.scope. Feb 9 19:56:01.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.605000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.605000 audit: BPF prog-id=123 op=LOAD Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3026 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:01.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236663632326564656262386665393031643539376432306236313038 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3026 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:01.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236663632326564656262386665393031643539376432306236313038 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit: BPF prog-id=124 op=LOAD Feb 9 19:56:01.606000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003c40d0 items=0 ppid=3026 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:01.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236663632326564656262386665393031643539376432306236313038 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit: BPF prog-id=125 op=LOAD Feb 9 19:56:01.606000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003c4118 items=0 ppid=3026 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:01.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236663632326564656262386665393031643539376432306236313038 Feb 9 19:56:01.606000 audit: BPF prog-id=125 op=UNLOAD Feb 9 19:56:01.606000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:01.606000 audit: BPF prog-id=126 op=LOAD Feb 9 19:56:01.606000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003c4528 items=0 ppid=3026 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:01.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236663632326564656262386665393031643539376432306236313038 Feb 9 19:56:01.638795 env[1147]: time="2024-02-09T19:56:01.638703274Z" level=info msg="StartContainer for \"b6f622edebb8fe901d597d20b6108d8eadeacd32ba936a71de19c34cc3f7003b\" returns successfully" Feb 9 19:56:01.700000 audit[3248]: AVC avc: denied { search } for pid=3248 comm="rpcbind" name="crypto" dev="proc" ino=23984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c336,c574 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:56:01.700000 audit[3248]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbd284280c0 a2=0 a3=0 items=0 ppid=3228 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c336,c574 key=(null) Feb 9 19:56:01.700000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 19:56:01.751000 audit[3253]: AVC avc: denied { search } for pid=3253 comm="dbus-daemon" name="crypto" dev="proc" ino=23984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c336,c574 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:56:01.751000 audit[3253]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f6e5e49f0c0 a2=0 a3=0 items=0 ppid=3228 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c336,c574 key=(null) Feb 9 19:56:01.751000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:56:01.757000 audit[3254]: AVC avc: denied { watch } for pid=3254 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538124 scontext=system_u:system_r:svirt_lxc_net_t:s0:c336,c574 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c336,c574 tclass=dir permissive=0 Feb 9 19:56:01.757000 audit[3254]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55764f912d30 a2=2c8 a3=7ffd36bff17c items=0 ppid=3228 pid=3254 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c336,c574 key=(null) Feb 9 19:56:01.757000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:56:01.767000 audit[3255]: AVC avc: denied { read } for pid=3255 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=24021 scontext=system_u:system_r:svirt_lxc_net_t:s0:c336,c574 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 19:56:01.767000 audit[3255]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fbf6dce9320 a1=80000 a2=d a3=7ffec0cb5120 items=0 ppid=3228 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c336,c574 key=(null) Feb 9 19:56:01.767000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:56:01.771000 audit[3255]: AVC avc: denied { search } for pid=3255 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c336,c574 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:56:01.771000 audit[3255]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbf6d23d0c0 a2=0 a3=0 items=0 ppid=3228 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c336,c574 key=(null) Feb 9 19:56:01.771000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:56:01.790316 kubelet[1538]: I0209 19:56:01.790018 1538 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.223372029064829e+09 pod.CreationTimestamp="2024-02-09 19:55:54 +0000 UTC" firstStartedPulling="2024-02-09 19:55:55.046770761 +0000 UTC m=+88.963063853" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:56:01.788306358 +0000 UTC m=+95.704599472" watchObservedRunningTime="2024-02-09 19:56:01.789947399 +0000 UTC m=+95.706240510" Feb 9 19:56:01.882000 audit[3300]: NETFILTER_CFG table=filter:95 family=2 entries=20 op=nft_register_rule pid=3300 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:01.882000 audit[3300]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7fff542d1b30 a2=0 a3=7fff542d1b1c items=0 ppid=1915 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:01.882000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:01.887000 audit[3300]: NETFILTER_CFG table=nat:96 family=2 entries=162 op=nft_register_chain pid=3300 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:01.887000 audit[3300]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7fff542d1b30 a2=0 a3=7fff542d1b1c items=0 ppid=1915 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:01.887000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:01.948012 systemd-networkd[1033]: calidaddb4f353c: Gained IPv6LL Feb 9 19:56:02.193472 kubelet[1538]: E0209 19:56:02.193389 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:02.492136 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3062317780.mount: Deactivated successfully. Feb 9 19:56:03.193899 kubelet[1538]: E0209 19:56:03.193726 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:04.193980 kubelet[1538]: E0209 19:56:04.193896 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:04.277463 env[1147]: time="2024-02-09T19:56:04.277383577Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:04.281020 env[1147]: time="2024-02-09T19:56:04.280925490Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:04.283869 env[1147]: time="2024-02-09T19:56:04.283820523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:04.286930 env[1147]: time="2024-02-09T19:56:04.286877046Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:04.287993 env[1147]: time="2024-02-09T19:56:04.287939795Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:56:04.290909 env[1147]: time="2024-02-09T19:56:04.290848660Z" level=info msg="CreateContainer within sandbox \"32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:56:04.310267 env[1147]: time="2024-02-09T19:56:04.310203048Z" level=info msg="CreateContainer within sandbox \"32eeb89344b16b2bd1c9ae8fda29acf89337d32a4cd2b3f74c3cc0eea5fda2a7\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"124ca6f49a3db492c90d4a579dc75d16a19ef61ae6600051faf2d5315f7e0093\"" Feb 9 19:56:04.311115 env[1147]: time="2024-02-09T19:56:04.310939803Z" level=info msg="StartContainer for \"124ca6f49a3db492c90d4a579dc75d16a19ef61ae6600051faf2d5315f7e0093\"" Feb 9 19:56:04.354125 systemd[1]: run-containerd-runc-k8s.io-124ca6f49a3db492c90d4a579dc75d16a19ef61ae6600051faf2d5315f7e0093-runc.QOwqCN.mount: Deactivated successfully. Feb 9 19:56:04.357569 systemd[1]: Started cri-containerd-124ca6f49a3db492c90d4a579dc75d16a19ef61ae6600051faf2d5315f7e0093.scope. Feb 9 19:56:04.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.378000 audit: BPF prog-id=127 op=LOAD Feb 9 19:56:04.379000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.379000 audit[3310]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3173 pid=3310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132346361366634396133646234393263393064346135373964633735 Feb 9 19:56:04.379000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.379000 audit[3310]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3173 pid=3310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132346361366634396133646234393263393064346135373964633735 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit: BPF prog-id=128 op=LOAD Feb 9 19:56:04.380000 audit[3310]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000218fa0 items=0 ppid=3173 pid=3310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132346361366634396133646234393263393064346135373964633735 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit: BPF prog-id=129 op=LOAD Feb 9 19:56:04.380000 audit[3310]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000218fe8 items=0 ppid=3173 pid=3310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132346361366634396133646234393263393064346135373964633735 Feb 9 19:56:04.380000 audit: BPF prog-id=129 op=UNLOAD Feb 9 19:56:04.380000 audit: BPF prog-id=128 op=UNLOAD Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { perfmon } for pid=3310 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit[3310]: AVC avc: denied { bpf } for pid=3310 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:04.380000 audit: BPF prog-id=130 op=LOAD Feb 9 19:56:04.380000 audit[3310]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002193f8 items=0 ppid=3173 pid=3310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132346361366634396133646234393263393064346135373964633735 Feb 9 19:56:04.428180 env[1147]: time="2024-02-09T19:56:04.428076191Z" level=info msg="StartContainer for \"124ca6f49a3db492c90d4a579dc75d16a19ef61ae6600051faf2d5315f7e0093\" returns successfully" Feb 9 19:56:04.779823 kernel: kauditd_printk_skb: 194 callbacks suppressed Feb 9 19:56:04.780033 kernel: audit: type=1325 audit(1707508564.755:928): table=filter:97 family=2 entries=8 op=nft_register_rule pid=3364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:04.755000 audit[3364]: NETFILTER_CFG table=filter:97 family=2 entries=8 op=nft_register_rule pid=3364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:04.755000 audit[3364]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffccfc28650 a2=0 a3=7ffccfc2863c items=0 ppid=1915 pid=3364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.755000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:04.838221 kernel: audit: type=1300 audit(1707508564.755:928): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffccfc28650 a2=0 a3=7ffccfc2863c items=0 ppid=1915 pid=3364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.838409 kernel: audit: type=1327 audit(1707508564.755:928): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:04.785000 audit[3364]: NETFILTER_CFG table=nat:98 family=2 entries=198 op=nft_register_rule pid=3364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:04.785000 audit[3364]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffccfc28650 a2=0 a3=7ffccfc2863c items=0 ppid=1915 pid=3364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.890196 kernel: audit: type=1325 audit(1707508564.785:929): table=nat:98 family=2 entries=198 op=nft_register_rule pid=3364 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:04.890497 kernel: audit: type=1300 audit(1707508564.785:929): arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffccfc28650 a2=0 a3=7ffccfc2863c items=0 ppid=1915 pid=3364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:04.907463 kernel: audit: type=1327 audit(1707508564.785:929): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:04.956000 audit[3390]: NETFILTER_CFG table=filter:99 family=2 entries=8 op=nft_register_rule pid=3390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:04.956000 audit[3390]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffee1aec7b0 a2=0 a3=7ffee1aec79c items=0 ppid=1915 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:05.007911 kernel: audit: type=1325 audit(1707508564.956:930): table=filter:99 family=2 entries=8 op=nft_register_rule pid=3390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:05.008089 kernel: audit: type=1300 audit(1707508564.956:930): arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffee1aec7b0 a2=0 a3=7ffee1aec79c items=0 ppid=1915 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:05.008137 kernel: audit: type=1327 audit(1707508564.956:930): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:04.956000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:04.962000 audit[3390]: NETFILTER_CFG table=nat:100 family=2 entries=198 op=nft_register_rule pid=3390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:04.962000 audit[3390]: SYSCALL arch=c000003e syscall=46 success=yes exit=66940 a0=3 a1=7ffee1aec7b0 a2=0 a3=7ffee1aec79c items=0 ppid=1915 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:04.962000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:56:05.046177 kernel: audit: type=1325 audit(1707508564.962:931): table=nat:100 family=2 entries=198 op=nft_register_rule pid=3390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:56:05.194168 kubelet[1538]: E0209 19:56:05.194117 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:05.616000 audit[3320]: AVC avc: denied { watch } for pid=3320 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_55_59.233569470/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c278,c954 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c278,c954 tclass=file permissive=0 Feb 9 19:56:05.616000 audit[3320]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b44300 a2=fc6 a3=0 items=0 ppid=3173 pid=3320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c278,c954 key=(null) Feb 9 19:56:05.616000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:56:06.195127 kubelet[1538]: E0209 19:56:06.195058 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:07.120361 kubelet[1538]: E0209 19:56:07.120288 1538 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:07.195935 kubelet[1538]: E0209 19:56:07.195863 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:08.196748 kubelet[1538]: E0209 19:56:08.196649 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:09.197647 kubelet[1538]: E0209 19:56:09.197564 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:10.198722 kubelet[1538]: E0209 19:56:10.198651 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:11.199839 kubelet[1538]: E0209 19:56:11.199769 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:11.647020 kubelet[1538]: I0209 19:56:11.646473 1538 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-79c6d6dcf6-r5g2z" podStartSLOduration=-9.223372024208366e+09 pod.CreationTimestamp="2024-02-09 19:55:59 +0000 UTC" firstStartedPulling="2024-02-09 19:56:00.83614503 +0000 UTC m=+94.752438122" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:56:04.799609166 +0000 UTC m=+98.715902275" watchObservedRunningTime="2024-02-09 19:56:11.646408808 +0000 UTC m=+105.562701920" Feb 9 19:56:11.647020 kubelet[1538]: I0209 19:56:11.647007 1538 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:56:11.654985 systemd[1]: Created slice kubepods-besteffort-pod4646930c_9a22_40c7_88ff_50d7d4e21024.slice. Feb 9 19:56:11.746383 kubelet[1538]: I0209 19:56:11.746320 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kgblk\" (UniqueName: \"kubernetes.io/projected/4646930c-9a22-40c7-88ff-50d7d4e21024-kube-api-access-kgblk\") pod \"test-pod-1\" (UID: \"4646930c-9a22-40c7-88ff-50d7d4e21024\") " pod="default/test-pod-1" Feb 9 19:56:11.746721 kubelet[1538]: I0209 19:56:11.746493 1538 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-b20c9cdf-0094-4fb6-a89b-8fa6d6bab3a7\" (UniqueName: \"kubernetes.io/nfs/4646930c-9a22-40c7-88ff-50d7d4e21024-pvc-b20c9cdf-0094-4fb6-a89b-8fa6d6bab3a7\") pod \"test-pod-1\" (UID: \"4646930c-9a22-40c7-88ff-50d7d4e21024\") " pod="default/test-pod-1" Feb 9 19:56:11.890473 kernel: Failed to create system directory netfs Feb 9 19:56:11.890743 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 9 19:56:11.890803 kernel: audit: type=1400 audit(1707508571.883:933): avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:11.883000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:11.919387 kernel: Failed to create system directory netfs Feb 9 19:56:11.919664 kernel: audit: type=1400 audit(1707508571.883:933): avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:11.883000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:11.948058 kernel: Failed to create system directory netfs Feb 9 19:56:11.948337 kernel: audit: type=1400 audit(1707508571.883:933): avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:11.883000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:11.980074 kernel: Failed to create system directory netfs Feb 9 19:56:11.980333 kernel: audit: type=1400 audit(1707508571.883:933): avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:11.883000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:11.883000 audit[3399]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5635eff005e0 a1=153bc a2=5635ef81f2b0 a3=5 items=0 ppid=1071 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:12.056614 kernel: audit: type=1300 audit(1707508571.883:933): arch=c000003e syscall=175 success=yes exit=0 a0=5635eff005e0 a1=153bc a2=5635ef81f2b0 a3=5 items=0 ppid=1071 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:12.056897 kernel: audit: type=1327 audit(1707508571.883:933): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:56:11.883000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:56:12.087455 kernel: Failed to create system directory fscache Feb 9 19:56:12.087722 kernel: audit: type=1400 audit(1707508572.053:934): avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.087773 kernel: Failed to create system directory fscache Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.116586 kernel: audit: type=1400 audit(1707508572.053:934): avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.116864 kernel: Failed to create system directory fscache Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.146238 kernel: audit: type=1400 audit(1707508572.053:934): avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.146529 kernel: Failed to create system directory fscache Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.175518 kernel: audit: type=1400 audit(1707508572.053:934): avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.175822 kernel: Failed to create system directory fscache Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.186273 kernel: Failed to create system directory fscache Feb 9 19:56:12.186535 kernel: Failed to create system directory fscache Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.197044 kernel: Failed to create system directory fscache Feb 9 19:56:12.197199 kernel: Failed to create system directory fscache Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.200726 kubelet[1538]: E0209 19:56:12.200666 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.212999 kernel: Failed to create system directory fscache Feb 9 19:56:12.213209 kernel: Failed to create system directory fscache Feb 9 19:56:12.213262 kernel: Failed to create system directory fscache Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.223928 kernel: Failed to create system directory fscache Feb 9 19:56:12.224043 kernel: Failed to create system directory fscache Feb 9 19:56:12.053000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.053000 audit[3399]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5635f01159c0 a1=4c0fc a2=5635ef81f2b0 a3=5 items=0 ppid=1071 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:12.234705 kernel: FS-Cache: Loaded Feb 9 19:56:12.053000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.282701 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.282895 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.282951 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.293530 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.293719 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.312796 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.312968 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.313008 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.318600 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.329090 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.329325 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.339960 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.340132 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.350360 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.350580 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.360923 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.361109 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.367479 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.378425 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.378713 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.389229 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.389568 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.400729 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.400909 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.417093 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.417384 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.417449 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.427839 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.428014 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.438420 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.438666 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.448990 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.449197 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.454461 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.464704 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.470089 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.470239 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.480880 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.481028 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.486515 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.491545 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.502258 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.502508 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.512980 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.513221 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.523293 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.523515 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.534473 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.534574 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.544473 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.544641 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.555239 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.556480 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.566200 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.566379 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.576635 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.576783 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.586979 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.587206 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.597619 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.597871 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.608872 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.609098 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.619480 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.619724 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.630609 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.630795 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.636484 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.641482 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.652909 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.653106 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.664072 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.664316 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.674478 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.674625 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.685102 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.685289 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.690489 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.701312 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.701582 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.712261 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.712515 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.728374 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.728679 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.728733 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.739291 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.739444 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.750212 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.750467 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.760941 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.761120 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.771442 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.771626 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.781731 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.781886 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.792517 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.792737 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.803690 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.803909 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.813922 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.814176 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.824697 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.824971 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.835543 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.835807 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.846114 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.846288 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.856422 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.856637 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.866961 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.867174 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.878486 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.878688 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.889000 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.889240 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.900073 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.900297 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.910816 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.910973 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.921760 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.921901 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.932121 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.932284 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.942631 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.942765 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.260000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:12.953073 kernel: Failed to create system directory sunrpc Feb 9 19:56:12.973379 kernel: RPC: Registered named UNIX socket transport module. Feb 9 19:56:12.973664 kernel: RPC: Registered udp transport module. Feb 9 19:56:12.973708 kernel: RPC: Registered tcp transport module. Feb 9 19:56:12.978450 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 19:56:12.260000 audit[3399]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5635f0161ad0 a1=1588c4 a2=5635ef81f2b0 a3=5 items=6 ppid=1071 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:12.260000 audit: CWD cwd="/" Feb 9 19:56:12.260000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:56:12.260000 audit: PATH item=1 name=(null) inode=25380 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:56:12.260000 audit: PATH item=2 name=(null) inode=25380 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:56:12.260000 audit: PATH item=3 name=(null) inode=25381 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:56:12.260000 audit: PATH item=4 name=(null) inode=25380 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:56:12.260000 audit: PATH item=5 name=(null) inode=25382 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:56:12.260000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.036913 kernel: Failed to create system directory nfs Feb 9 19:56:13.037166 kernel: Failed to create system directory nfs Feb 9 19:56:13.037295 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.047782 kernel: Failed to create system directory nfs Feb 9 19:56:13.048142 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.057566 kernel: Failed to create system directory nfs Feb 9 19:56:13.057722 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.067763 kernel: Failed to create system directory nfs Feb 9 19:56:13.068368 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.078020 kernel: Failed to create system directory nfs Feb 9 19:56:13.078271 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.088024 kernel: Failed to create system directory nfs Feb 9 19:56:13.088264 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.098077 kernel: Failed to create system directory nfs Feb 9 19:56:13.098259 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.108186 kernel: Failed to create system directory nfs Feb 9 19:56:13.108335 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.118349 kernel: Failed to create system directory nfs Feb 9 19:56:13.118500 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.128149 kernel: Failed to create system directory nfs Feb 9 19:56:13.128284 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.137921 kernel: Failed to create system directory nfs Feb 9 19:56:13.138075 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.147737 kernel: Failed to create system directory nfs Feb 9 19:56:13.147873 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.157792 kernel: Failed to create system directory nfs Feb 9 19:56:13.157952 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.167407 kernel: Failed to create system directory nfs Feb 9 19:56:13.167565 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.177300 kernel: Failed to create system directory nfs Feb 9 19:56:13.177468 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.187316 kernel: Failed to create system directory nfs Feb 9 19:56:13.187520 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.198806 kernel: Failed to create system directory nfs Feb 9 19:56:13.198966 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.202103 kubelet[1538]: E0209 19:56:13.202031 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:13.203718 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.213507 kernel: Failed to create system directory nfs Feb 9 19:56:13.213633 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.223604 kernel: Failed to create system directory nfs Feb 9 19:56:13.223801 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.233382 kernel: Failed to create system directory nfs Feb 9 19:56:13.233524 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.243241 kernel: Failed to create system directory nfs Feb 9 19:56:13.243393 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.248141 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.253180 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.263131 kernel: Failed to create system directory nfs Feb 9 19:56:13.263242 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.273026 kernel: Failed to create system directory nfs Feb 9 19:56:13.273279 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.283106 kernel: Failed to create system directory nfs Feb 9 19:56:13.283305 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.292926 kernel: Failed to create system directory nfs Feb 9 19:56:13.293043 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.302954 kernel: Failed to create system directory nfs Feb 9 19:56:13.303150 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.313323 kernel: Failed to create system directory nfs Feb 9 19:56:13.313522 kernel: Failed to create system directory nfs Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.017000 audit[3399]: AVC avc: denied { confidentiality } for pid=3399 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.323046 kernel: Failed to create system directory nfs Feb 9 19:56:13.343493 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 19:56:13.017000 audit[3399]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5635f0304680 a1=e29dc a2=5635ef81f2b0 a3=5 items=0 ppid=1071 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:13.017000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.403163 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.403338 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.403378 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.413377 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.413561 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.424314 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.424475 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.434321 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.434483 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.444341 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.444427 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.454357 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.464971 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.465135 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.465193 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.470317 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.480359 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.480529 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.486479 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.496087 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.496522 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.506495 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.506612 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.517076 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.517220 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.527019 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.527189 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.531865 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.537129 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.547177 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.547322 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.557071 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.557236 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.567793 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.568018 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.577958 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.578155 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.588064 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.588222 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.598096 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.598280 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.603261 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.613527 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.613721 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.623704 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.623845 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.633616 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.633797 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.643832 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.644057 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.653873 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.654039 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.663880 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.664132 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.673862 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.674065 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.683900 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.684128 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.694142 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.694344 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.704145 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.704279 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.714633 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.714828 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.724560 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.724717 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.739759 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.739970 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.740016 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.749920 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.750095 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.760670 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.760925 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.765878 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.775945 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.776138 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.786187 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.786342 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.796148 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.796349 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.806365 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.806537 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.816384 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.816620 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.826396 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.826590 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.836772 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.836969 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.847052 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.847257 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.856994 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.857176 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:13.867125 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.867301 kernel: Failed to create system directory nfs4 Feb 9 19:56:13.379000 audit[3404]: AVC avc: denied { confidentiality } for pid=3404 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.059117 kernel: NFS: Registering the id_resolver key type Feb 9 19:56:14.059516 kernel: Key type id_resolver registered Feb 9 19:56:14.059606 kernel: Key type id_legacy registered Feb 9 19:56:13.379000 audit[3404]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7ff0bd3d0010 a1=1d3cc4 a2=5615494ef2b0 a3=5 items=0 ppid=1071 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:13.379000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.089259 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.089489 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.089537 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.094744 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.105155 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.105341 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.110455 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.121775 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.122014 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.132307 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.132478 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.142816 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.143073 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.153346 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.153518 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.164649 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.164867 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.175990 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.176180 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.186159 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.186304 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.191595 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.202300 kubelet[1538]: E0209 19:56:14.202195 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:14.203205 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.203317 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.213645 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.213834 kernel: Failed to create system directory rpcgss Feb 9 19:56:14.075000 audit[3406]: AVC avc: denied { confidentiality } for pid=3406 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:56:14.075000 audit[3406]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fc1ffaaa010 a1=4f524 a2=55c1f9f162b0 a3=5 items=0 ppid=1071 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:14.075000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 19:56:14.260185 nfsidmap[3413]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Feb 9 19:56:14.272221 nfsidmap[3414]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'c.flatcar-212911.internal' Feb 9 19:56:14.289000 audit[1234]: AVC avc: denied { watch_reads } for pid=1234 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2749 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:56:14.289000 audit[1234]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561eb3d14a20 a2=10 a3=5391a2bb9e3a01f1 items=0 ppid=1 pid=1234 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:14.289000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:56:14.289000 audit[1234]: AVC avc: denied { watch_reads } for pid=1234 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2749 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:56:14.289000 audit[1234]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561eb3d14a20 a2=10 a3=5391a2bb9e3a01f1 items=0 ppid=1 pid=1234 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:14.289000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:56:14.289000 audit[1234]: AVC avc: denied { watch_reads } for pid=1234 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2749 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:56:14.289000 audit[1234]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=561eb3d14a20 a2=10 a3=5391a2bb9e3a01f1 items=0 ppid=1 pid=1234 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:14.289000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:56:14.290000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2749 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:56:14.290000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2749 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:56:14.290000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2749 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:56:14.361551 env[1147]: time="2024-02-09T19:56:14.361303431Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4646930c-9a22-40c7-88ff-50d7d4e21024,Namespace:default,Attempt:0,}" Feb 9 19:56:14.551268 systemd-networkd[1033]: cali5ec59c6bf6e: Link UP Feb 9 19:56:14.559652 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:56:14.570020 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 19:56:14.573100 systemd-networkd[1033]: cali5ec59c6bf6e: Gained carrier Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.445 [INFO][3416] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.128.0.58-k8s-test--pod--1-eth0 default 4646930c-9a22-40c7-88ff-50d7d4e21024 1337 0 2024-02-09 19:55:55 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.128.0.58 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.58-k8s-test--pod--1-" Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.446 [INFO][3416] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.58-k8s-test--pod--1-eth0" Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.493 [INFO][3428] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" HandleID="k8s-pod-network.78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" Workload="10.128.0.58-k8s-test--pod--1-eth0" Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.508 [INFO][3428] ipam_plugin.go 268: Auto assigning IP ContainerID="78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" HandleID="k8s-pod-network.78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" Workload="10.128.0.58-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027daf0), Attrs:map[string]string{"namespace":"default", "node":"10.128.0.58", "pod":"test-pod-1", "timestamp":"2024-02-09 19:56:14.493774739 +0000 UTC"}, Hostname:"10.128.0.58", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.508 [INFO][3428] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.509 [INFO][3428] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.509 [INFO][3428] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.128.0.58' Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.511 [INFO][3428] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" host="10.128.0.58" Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.517 [INFO][3428] ipam.go 372: Looking up existing affinities for host host="10.128.0.58" Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.524 [INFO][3428] ipam.go 489: Trying affinity for 192.168.16.192/26 host="10.128.0.58" Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.526 [INFO][3428] ipam.go 155: Attempting to load block cidr=192.168.16.192/26 host="10.128.0.58" Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.530 [INFO][3428] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.16.192/26 host="10.128.0.58" Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.530 [INFO][3428] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.16.192/26 handle="k8s-pod-network.78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" host="10.128.0.58" Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.532 [INFO][3428] ipam.go 1682: Creating new handle: k8s-pod-network.78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.537 [INFO][3428] ipam.go 1203: Writing block in order to claim IPs block=192.168.16.192/26 handle="k8s-pod-network.78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" host="10.128.0.58" Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.543 [INFO][3428] ipam.go 1216: Successfully claimed IPs: [192.168.16.197/26] block=192.168.16.192/26 handle="k8s-pod-network.78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" host="10.128.0.58" Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.544 [INFO][3428] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.16.197/26] handle="k8s-pod-network.78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" host="10.128.0.58" Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.544 [INFO][3428] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.544 [INFO][3428] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.16.197/26] IPv6=[] ContainerID="78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" HandleID="k8s-pod-network.78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" Workload="10.128.0.58-k8s-test--pod--1-eth0" Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.546 [INFO][3416] k8s.go 385: Populated endpoint ContainerID="78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.58-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4646930c-9a22-40c7-88ff-50d7d4e21024", ResourceVersion:"1337", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 55, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.58", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.16.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:56:14.590633 env[1147]: 2024-02-09 19:56:14.546 [INFO][3416] k8s.go 386: Calico CNI using IPs: [192.168.16.197/32] ContainerID="78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.58-k8s-test--pod--1-eth0" Feb 9 19:56:14.592377 env[1147]: 2024-02-09 19:56:14.546 [INFO][3416] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.58-k8s-test--pod--1-eth0" Feb 9 19:56:14.592377 env[1147]: 2024-02-09 19:56:14.572 [INFO][3416] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.58-k8s-test--pod--1-eth0" Feb 9 19:56:14.592377 env[1147]: 2024-02-09 19:56:14.574 [INFO][3416] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.58-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.128.0.58-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4646930c-9a22-40c7-88ff-50d7d4e21024", ResourceVersion:"1337", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 55, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.128.0.58", ContainerID:"78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.16.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"fa:c0:53:63:d2:85", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:56:14.592377 env[1147]: 2024-02-09 19:56:14.582 [INFO][3416] k8s.go 491: Wrote updated endpoint to datastore ContainerID="78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.128.0.58-k8s-test--pod--1-eth0" Feb 9 19:56:14.621939 env[1147]: time="2024-02-09T19:56:14.620249645Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:56:14.622383 env[1147]: time="2024-02-09T19:56:14.622314949Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:56:14.622649 env[1147]: time="2024-02-09T19:56:14.622592282Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:56:14.623104 env[1147]: time="2024-02-09T19:56:14.623037147Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b pid=3456 runtime=io.containerd.runc.v2 Feb 9 19:56:14.635000 audit[3464]: NETFILTER_CFG table=filter:101 family=2 entries=42 op=nft_register_chain pid=3464 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:56:14.635000 audit[3464]: SYSCALL arch=c000003e syscall=46 success=yes exit=20268 a0=3 a1=7ffc1334d5d0 a2=0 a3=7ffc1334d5bc items=0 ppid=2363 pid=3464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:14.635000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:56:14.662923 systemd[1]: Started cri-containerd-78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b.scope. Feb 9 19:56:14.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.693000 audit: BPF prog-id=131 op=LOAD Feb 9 19:56:14.695000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.695000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:14.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738353636623333313165313439633833653638393134386233666461 Feb 9 19:56:14.696000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.696000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:14.696000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738353636623333313165313439633833653638393134386233666461 Feb 9 19:56:14.697000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.697000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.697000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.697000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.697000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.697000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.697000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.697000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.697000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.697000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.697000 audit: BPF prog-id=132 op=LOAD Feb 9 19:56:14.697000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003aac20 items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:14.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738353636623333313165313439633833653638393134386233666461 Feb 9 19:56:14.698000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.698000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.698000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.698000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.698000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.698000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.698000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.698000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.698000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.698000 audit: BPF prog-id=133 op=LOAD Feb 9 19:56:14.698000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003aac68 items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:14.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738353636623333313165313439633833653638393134386233666461 Feb 9 19:56:14.699000 audit: BPF prog-id=133 op=UNLOAD Feb 9 19:56:14.699000 audit: BPF prog-id=132 op=UNLOAD Feb 9 19:56:14.699000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.699000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.699000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.699000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.699000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.699000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.699000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.699000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.699000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.699000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:14.699000 audit: BPF prog-id=134 op=LOAD Feb 9 19:56:14.699000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ab078 items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:14.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738353636623333313165313439633833653638393134386233666461 Feb 9 19:56:14.745211 env[1147]: time="2024-02-09T19:56:14.745150083Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4646930c-9a22-40c7-88ff-50d7d4e21024,Namespace:default,Attempt:0,} returns sandbox id \"78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b\"" Feb 9 19:56:14.748279 env[1147]: time="2024-02-09T19:56:14.748231068Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:56:15.083904 env[1147]: time="2024-02-09T19:56:15.083834471Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:15.087411 env[1147]: time="2024-02-09T19:56:15.087350482Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:15.090885 env[1147]: time="2024-02-09T19:56:15.090832843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:15.094157 env[1147]: time="2024-02-09T19:56:15.094099163Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:56:15.095040 env[1147]: time="2024-02-09T19:56:15.094981882Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:56:15.098187 env[1147]: time="2024-02-09T19:56:15.098054921Z" level=info msg="CreateContainer within sandbox \"78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 19:56:15.120153 env[1147]: time="2024-02-09T19:56:15.120059622Z" level=info msg="CreateContainer within sandbox \"78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"c48b5c2dab633849861b279efdcab32e8b9f7588e32a8d681a230b35aa16f486\"" Feb 9 19:56:15.121147 env[1147]: time="2024-02-09T19:56:15.121095450Z" level=info msg="StartContainer for \"c48b5c2dab633849861b279efdcab32e8b9f7588e32a8d681a230b35aa16f486\"" Feb 9 19:56:15.146283 systemd[1]: Started cri-containerd-c48b5c2dab633849861b279efdcab32e8b9f7588e32a8d681a230b35aa16f486.scope. Feb 9 19:56:15.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.167000 audit: BPF prog-id=135 op=LOAD Feb 9 19:56:15.167000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.167000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3456 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:15.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334386235633264616236333338343938363162323739656664636162 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3456 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:15.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334386235633264616236333338343938363162323739656664636162 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit: BPF prog-id=136 op=LOAD Feb 9 19:56:15.168000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000344b10 items=0 ppid=3456 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:15.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334386235633264616236333338343938363162323739656664636162 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.168000 audit: BPF prog-id=137 op=LOAD Feb 9 19:56:15.168000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000344b58 items=0 ppid=3456 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:15.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334386235633264616236333338343938363162323739656664636162 Feb 9 19:56:15.168000 audit: BPF prog-id=137 op=UNLOAD Feb 9 19:56:15.168000 audit: BPF prog-id=136 op=UNLOAD Feb 9 19:56:15.169000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.169000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.169000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.169000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.169000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.169000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.169000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.169000 audit[3500]: AVC avc: denied { perfmon } for pid=3500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.169000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.169000 audit[3500]: AVC avc: denied { bpf } for pid=3500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:56:15.169000 audit: BPF prog-id=138 op=LOAD Feb 9 19:56:15.169000 audit[3500]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000344f68 items=0 ppid=3456 pid=3500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:56:15.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334386235633264616236333338343938363162323739656664636162 Feb 9 19:56:15.196391 env[1147]: time="2024-02-09T19:56:15.196318084Z" level=info msg="StartContainer for \"c48b5c2dab633849861b279efdcab32e8b9f7588e32a8d681a230b35aa16f486\" returns successfully" Feb 9 19:56:15.202567 kubelet[1538]: E0209 19:56:15.202513 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:15.283260 systemd[1]: run-containerd-runc-k8s.io-78566b3311e149c83e689148b3fda3fc1d6881b73d6a175cf744bc56ca990a5b-runc.uHOxwz.mount: Deactivated successfully. Feb 9 19:56:15.829062 kubelet[1538]: I0209 19:56:15.829002 1538 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=-9.223372016025837e+09 pod.CreationTimestamp="2024-02-09 19:55:55 +0000 UTC" firstStartedPulling="2024-02-09 19:56:14.747733325 +0000 UTC m=+108.664026427" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:56:15.82880661 +0000 UTC m=+109.745099717" watchObservedRunningTime="2024-02-09 19:56:15.828939648 +0000 UTC m=+109.745232760" Feb 9 19:56:16.027966 systemd-networkd[1033]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 19:56:16.202818 kubelet[1538]: E0209 19:56:16.202739 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:17.203204 kubelet[1538]: E0209 19:56:17.203078 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:18.203477 kubelet[1538]: E0209 19:56:18.203375 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:19.203893 kubelet[1538]: E0209 19:56:19.203807 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:20.204324 kubelet[1538]: E0209 19:56:20.204263 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:21.204509 kubelet[1538]: E0209 19:56:21.204427 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:56:22.205309 kubelet[1538]: E0209 19:56:22.205248 1538 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"