Feb 8 23:22:02.954341 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Feb 8 21:14:17 -00 2024 Feb 8 23:22:02.954361 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 8 23:22:02.954372 kernel: BIOS-provided physical RAM map: Feb 8 23:22:02.954379 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 8 23:22:02.954386 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 8 23:22:02.954392 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 8 23:22:02.954400 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Feb 8 23:22:02.954407 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Feb 8 23:22:02.954438 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 8 23:22:02.954446 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 8 23:22:02.954452 kernel: NX (Execute Disable) protection: active Feb 8 23:22:02.954459 kernel: SMBIOS 2.8 present. Feb 8 23:22:02.954465 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Feb 8 23:22:02.954472 kernel: Hypervisor detected: KVM Feb 8 23:22:02.954480 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 8 23:22:02.954490 kernel: kvm-clock: cpu 0, msr 6efaa001, primary cpu clock Feb 8 23:22:02.954496 kernel: kvm-clock: using sched offset of 5798775289 cycles Feb 8 23:22:02.954513 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 8 23:22:02.954521 kernel: tsc: Detected 1996.249 MHz processor Feb 8 23:22:02.954528 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 8 23:22:02.954536 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 8 23:22:02.954543 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Feb 8 23:22:02.954550 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 8 23:22:02.954559 kernel: ACPI: Early table checksum verification disabled Feb 8 23:22:02.954566 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Feb 8 23:22:02.954574 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 8 23:22:02.954581 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 8 23:22:02.954588 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 8 23:22:02.954595 kernel: ACPI: FACS 0x000000007FFE0000 000040 Feb 8 23:22:02.954602 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 8 23:22:02.954609 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 8 23:22:02.954616 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Feb 8 23:22:02.954625 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Feb 8 23:22:02.954632 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Feb 8 23:22:02.954639 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Feb 8 23:22:02.954646 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Feb 8 23:22:02.954653 kernel: No NUMA configuration found Feb 8 23:22:02.954660 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Feb 8 23:22:02.954667 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Feb 8 23:22:02.954675 kernel: Zone ranges: Feb 8 23:22:02.954686 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 8 23:22:02.954693 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Feb 8 23:22:02.954701 kernel: Normal empty Feb 8 23:22:02.954708 kernel: Movable zone start for each node Feb 8 23:22:02.954715 kernel: Early memory node ranges Feb 8 23:22:02.954723 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 8 23:22:02.954732 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Feb 8 23:22:02.954740 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Feb 8 23:22:02.954747 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 8 23:22:02.954755 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 8 23:22:02.954762 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Feb 8 23:22:02.954769 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 8 23:22:02.954777 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 8 23:22:02.954784 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 8 23:22:02.954792 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 8 23:22:02.954800 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 8 23:22:02.954808 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 8 23:22:02.954815 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 8 23:22:02.954823 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 8 23:22:02.954830 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 8 23:22:02.954838 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 8 23:22:02.954845 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Feb 8 23:22:02.954852 kernel: Booting paravirtualized kernel on KVM Feb 8 23:22:02.954860 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 8 23:22:02.954868 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 8 23:22:02.954877 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 8 23:22:02.954884 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 8 23:22:02.954891 kernel: pcpu-alloc: [0] 0 1 Feb 8 23:22:02.954899 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Feb 8 23:22:02.954906 kernel: kvm-guest: PV spinlocks disabled, no host support Feb 8 23:22:02.954914 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Feb 8 23:22:02.954921 kernel: Policy zone: DMA32 Feb 8 23:22:02.954930 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 8 23:22:02.954939 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 8 23:22:02.954947 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 8 23:22:02.954955 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 8 23:22:02.954962 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 8 23:22:02.954970 kernel: Memory: 1975340K/2096620K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121020K reserved, 0K cma-reserved) Feb 8 23:22:02.954978 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 8 23:22:02.954985 kernel: ftrace: allocating 34475 entries in 135 pages Feb 8 23:22:02.954992 kernel: ftrace: allocated 135 pages with 4 groups Feb 8 23:22:02.955001 kernel: rcu: Hierarchical RCU implementation. Feb 8 23:22:02.955009 kernel: rcu: RCU event tracing is enabled. Feb 8 23:22:02.955017 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 8 23:22:02.955025 kernel: Rude variant of Tasks RCU enabled. Feb 8 23:22:02.955032 kernel: Tracing variant of Tasks RCU enabled. Feb 8 23:22:02.955040 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 8 23:22:02.955048 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 8 23:22:02.955055 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 8 23:22:02.955062 kernel: Console: colour VGA+ 80x25 Feb 8 23:22:02.955071 kernel: printk: console [tty0] enabled Feb 8 23:22:02.955079 kernel: printk: console [ttyS0] enabled Feb 8 23:22:02.955087 kernel: ACPI: Core revision 20210730 Feb 8 23:22:02.955094 kernel: APIC: Switch to symmetric I/O mode setup Feb 8 23:22:02.955101 kernel: x2apic enabled Feb 8 23:22:02.955109 kernel: Switched APIC routing to physical x2apic. Feb 8 23:22:02.955116 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 8 23:22:02.955124 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 8 23:22:02.955644 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Feb 8 23:22:02.955661 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Feb 8 23:22:02.955672 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Feb 8 23:22:02.955679 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 8 23:22:02.955687 kernel: Spectre V2 : Mitigation: Retpolines Feb 8 23:22:02.955695 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 8 23:22:02.955702 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 8 23:22:02.955710 kernel: Speculative Store Bypass: Vulnerable Feb 8 23:22:02.955717 kernel: x86/fpu: x87 FPU will use FXSAVE Feb 8 23:22:02.955725 kernel: Freeing SMP alternatives memory: 32K Feb 8 23:22:02.955732 kernel: pid_max: default: 32768 minimum: 301 Feb 8 23:22:02.955741 kernel: LSM: Security Framework initializing Feb 8 23:22:02.955748 kernel: SELinux: Initializing. Feb 8 23:22:02.955756 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 8 23:22:02.955764 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 8 23:22:02.955771 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Feb 8 23:22:02.955779 kernel: Performance Events: AMD PMU driver. Feb 8 23:22:02.955786 kernel: ... version: 0 Feb 8 23:22:02.955794 kernel: ... bit width: 48 Feb 8 23:22:02.955801 kernel: ... generic registers: 4 Feb 8 23:22:02.955816 kernel: ... value mask: 0000ffffffffffff Feb 8 23:22:02.955824 kernel: ... max period: 00007fffffffffff Feb 8 23:22:02.955833 kernel: ... fixed-purpose events: 0 Feb 8 23:22:02.955841 kernel: ... event mask: 000000000000000f Feb 8 23:22:02.955848 kernel: signal: max sigframe size: 1440 Feb 8 23:22:02.955856 kernel: rcu: Hierarchical SRCU implementation. Feb 8 23:22:02.955864 kernel: smp: Bringing up secondary CPUs ... Feb 8 23:22:02.955872 kernel: x86: Booting SMP configuration: Feb 8 23:22:02.955882 kernel: .... node #0, CPUs: #1 Feb 8 23:22:02.955889 kernel: kvm-clock: cpu 1, msr 6efaa041, secondary cpu clock Feb 8 23:22:02.955897 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Feb 8 23:22:02.955905 kernel: smp: Brought up 1 node, 2 CPUs Feb 8 23:22:02.955913 kernel: smpboot: Max logical packages: 2 Feb 8 23:22:02.955921 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Feb 8 23:22:02.955928 kernel: devtmpfs: initialized Feb 8 23:22:02.955936 kernel: x86/mm: Memory block size: 128MB Feb 8 23:22:02.955944 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 8 23:22:02.955954 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 8 23:22:02.955962 kernel: pinctrl core: initialized pinctrl subsystem Feb 8 23:22:02.955969 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 8 23:22:02.955977 kernel: audit: initializing netlink subsys (disabled) Feb 8 23:22:02.955985 kernel: audit: type=2000 audit(1707434522.012:1): state=initialized audit_enabled=0 res=1 Feb 8 23:22:02.955993 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 8 23:22:02.956001 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 8 23:22:02.956009 kernel: cpuidle: using governor menu Feb 8 23:22:02.956016 kernel: ACPI: bus type PCI registered Feb 8 23:22:02.956026 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 8 23:22:02.956034 kernel: dca service started, version 1.12.1 Feb 8 23:22:02.956041 kernel: PCI: Using configuration type 1 for base access Feb 8 23:22:02.956049 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 8 23:22:02.956057 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 8 23:22:02.956065 kernel: ACPI: Added _OSI(Module Device) Feb 8 23:22:02.956073 kernel: ACPI: Added _OSI(Processor Device) Feb 8 23:22:02.956081 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 8 23:22:02.956088 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 8 23:22:02.956099 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 8 23:22:02.956106 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 8 23:22:02.956114 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 8 23:22:02.956122 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 8 23:22:02.956130 kernel: ACPI: Interpreter enabled Feb 8 23:22:02.956137 kernel: ACPI: PM: (supports S0 S3 S5) Feb 8 23:22:02.956145 kernel: ACPI: Using IOAPIC for interrupt routing Feb 8 23:22:02.956153 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 8 23:22:02.956161 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 8 23:22:02.956172 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 8 23:22:02.956297 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 8 23:22:02.956383 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 8 23:22:02.956396 kernel: acpiphp: Slot [3] registered Feb 8 23:22:02.956404 kernel: acpiphp: Slot [4] registered Feb 8 23:22:02.956411 kernel: acpiphp: Slot [5] registered Feb 8 23:22:02.956437 kernel: acpiphp: Slot [6] registered Feb 8 23:22:02.956447 kernel: acpiphp: Slot [7] registered Feb 8 23:22:02.956455 kernel: acpiphp: Slot [8] registered Feb 8 23:22:02.956463 kernel: acpiphp: Slot [9] registered Feb 8 23:22:02.956471 kernel: acpiphp: Slot [10] registered Feb 8 23:22:02.956479 kernel: acpiphp: Slot [11] registered Feb 8 23:22:02.956486 kernel: acpiphp: Slot [12] registered Feb 8 23:22:02.956494 kernel: acpiphp: Slot [13] registered Feb 8 23:22:02.956502 kernel: acpiphp: Slot [14] registered Feb 8 23:22:02.956509 kernel: acpiphp: Slot [15] registered Feb 8 23:22:02.956517 kernel: acpiphp: Slot [16] registered Feb 8 23:22:02.956527 kernel: acpiphp: Slot [17] registered Feb 8 23:22:02.956535 kernel: acpiphp: Slot [18] registered Feb 8 23:22:02.956542 kernel: acpiphp: Slot [19] registered Feb 8 23:22:02.956550 kernel: acpiphp: Slot [20] registered Feb 8 23:22:02.956558 kernel: acpiphp: Slot [21] registered Feb 8 23:22:02.956565 kernel: acpiphp: Slot [22] registered Feb 8 23:22:02.956573 kernel: acpiphp: Slot [23] registered Feb 8 23:22:02.956581 kernel: acpiphp: Slot [24] registered Feb 8 23:22:02.956588 kernel: acpiphp: Slot [25] registered Feb 8 23:22:02.956598 kernel: acpiphp: Slot [26] registered Feb 8 23:22:02.956605 kernel: acpiphp: Slot [27] registered Feb 8 23:22:02.956613 kernel: acpiphp: Slot [28] registered Feb 8 23:22:02.956621 kernel: acpiphp: Slot [29] registered Feb 8 23:22:02.956628 kernel: acpiphp: Slot [30] registered Feb 8 23:22:02.956636 kernel: acpiphp: Slot [31] registered Feb 8 23:22:02.956644 kernel: PCI host bridge to bus 0000:00 Feb 8 23:22:02.956746 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 8 23:22:02.956822 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 8 23:22:02.956900 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 8 23:22:02.956972 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 8 23:22:02.957046 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 8 23:22:02.957117 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 8 23:22:02.957209 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 8 23:22:02.957299 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 8 23:22:02.957407 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 8 23:22:02.965590 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Feb 8 23:22:02.965683 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 8 23:22:02.965767 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 8 23:22:02.965850 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 8 23:22:02.965931 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 8 23:22:02.966020 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 8 23:22:02.966109 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 8 23:22:02.966191 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 8 23:22:02.966279 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 8 23:22:02.966362 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 8 23:22:02.966472 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 8 23:22:02.966651 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Feb 8 23:22:02.966747 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Feb 8 23:22:02.966835 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 8 23:22:02.966957 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 8 23:22:02.967050 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Feb 8 23:22:02.967139 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Feb 8 23:22:02.967227 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 8 23:22:02.967317 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Feb 8 23:22:02.967412 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 8 23:22:02.967519 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 8 23:22:02.967600 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Feb 8 23:22:02.967681 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 8 23:22:02.967768 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Feb 8 23:22:02.967851 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Feb 8 23:22:02.967934 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 8 23:22:02.968026 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Feb 8 23:22:02.968110 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Feb 8 23:22:02.968194 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 8 23:22:02.968205 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 8 23:22:02.968214 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 8 23:22:02.968222 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 8 23:22:02.968230 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 8 23:22:02.968238 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 8 23:22:02.968249 kernel: iommu: Default domain type: Translated Feb 8 23:22:02.968257 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 8 23:22:02.968337 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 8 23:22:02.968434 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 8 23:22:02.968519 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 8 23:22:02.968531 kernel: vgaarb: loaded Feb 8 23:22:02.968540 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 8 23:22:02.968548 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 8 23:22:02.968556 kernel: PTP clock support registered Feb 8 23:22:02.968568 kernel: PCI: Using ACPI for IRQ routing Feb 8 23:22:02.968576 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 8 23:22:02.968584 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 8 23:22:02.968592 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Feb 8 23:22:02.968600 kernel: clocksource: Switched to clocksource kvm-clock Feb 8 23:22:02.968608 kernel: VFS: Disk quotas dquot_6.6.0 Feb 8 23:22:02.968616 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 8 23:22:02.968624 kernel: pnp: PnP ACPI init Feb 8 23:22:02.968706 kernel: pnp 00:03: [dma 2] Feb 8 23:22:02.968722 kernel: pnp: PnP ACPI: found 5 devices Feb 8 23:22:02.968730 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 8 23:22:02.968738 kernel: NET: Registered PF_INET protocol family Feb 8 23:22:02.968746 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 8 23:22:02.968754 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 8 23:22:02.968762 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 8 23:22:02.968770 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 8 23:22:02.968778 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 8 23:22:02.968788 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 8 23:22:02.968796 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 8 23:22:02.968804 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 8 23:22:02.968812 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 8 23:22:02.968820 kernel: NET: Registered PF_XDP protocol family Feb 8 23:22:02.968894 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 8 23:22:02.968970 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 8 23:22:02.969041 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 8 23:22:02.969111 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 8 23:22:02.969185 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 8 23:22:02.969268 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 8 23:22:02.969352 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 8 23:22:02.969450 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 8 23:22:02.969463 kernel: PCI: CLS 0 bytes, default 64 Feb 8 23:22:02.969471 kernel: Initialise system trusted keyrings Feb 8 23:22:02.969479 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 8 23:22:02.969491 kernel: Key type asymmetric registered Feb 8 23:22:02.969499 kernel: Asymmetric key parser 'x509' registered Feb 8 23:22:02.969507 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 8 23:22:02.969515 kernel: io scheduler mq-deadline registered Feb 8 23:22:02.969523 kernel: io scheduler kyber registered Feb 8 23:22:02.969531 kernel: io scheduler bfq registered Feb 8 23:22:02.969539 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 8 23:22:02.969547 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 8 23:22:02.969555 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 8 23:22:02.969563 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 8 23:22:02.969573 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 8 23:22:02.969581 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 8 23:22:02.969589 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 8 23:22:02.969597 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 8 23:22:02.969605 kernel: random: crng init done Feb 8 23:22:02.969613 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 8 23:22:02.969620 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 8 23:22:02.969629 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 8 23:22:02.969710 kernel: rtc_cmos 00:04: RTC can wake from S4 Feb 8 23:22:02.969789 kernel: rtc_cmos 00:04: registered as rtc0 Feb 8 23:22:02.969863 kernel: rtc_cmos 00:04: setting system clock to 2024-02-08T23:22:02 UTC (1707434522) Feb 8 23:22:02.969934 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Feb 8 23:22:02.969946 kernel: NET: Registered PF_INET6 protocol family Feb 8 23:22:02.969954 kernel: Segment Routing with IPv6 Feb 8 23:22:02.969962 kernel: In-situ OAM (IOAM) with IPv6 Feb 8 23:22:02.969970 kernel: NET: Registered PF_PACKET protocol family Feb 8 23:22:02.969978 kernel: Key type dns_resolver registered Feb 8 23:22:02.969988 kernel: IPI shorthand broadcast: enabled Feb 8 23:22:02.969996 kernel: sched_clock: Marking stable (713680776, 119161229)->(861278297, -28436292) Feb 8 23:22:02.970004 kernel: registered taskstats version 1 Feb 8 23:22:02.970012 kernel: Loading compiled-in X.509 certificates Feb 8 23:22:02.970020 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: e9d857ae0e8100c174221878afd1046acbb054a6' Feb 8 23:22:02.970028 kernel: Key type .fscrypt registered Feb 8 23:22:02.970036 kernel: Key type fscrypt-provisioning registered Feb 8 23:22:02.970044 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 8 23:22:02.970053 kernel: ima: Allocated hash algorithm: sha1 Feb 8 23:22:02.970061 kernel: ima: No architecture policies found Feb 8 23:22:02.970069 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 8 23:22:02.970077 kernel: Write protecting the kernel read-only data: 28672k Feb 8 23:22:02.970085 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 8 23:22:02.970093 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 8 23:22:02.970101 kernel: Run /init as init process Feb 8 23:22:02.970109 kernel: with arguments: Feb 8 23:22:02.970117 kernel: /init Feb 8 23:22:02.970126 kernel: with environment: Feb 8 23:22:02.970133 kernel: HOME=/ Feb 8 23:22:02.970141 kernel: TERM=linux Feb 8 23:22:02.970149 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 8 23:22:02.970160 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 8 23:22:02.970170 systemd[1]: Detected virtualization kvm. Feb 8 23:22:02.970179 systemd[1]: Detected architecture x86-64. Feb 8 23:22:02.970188 systemd[1]: Running in initrd. Feb 8 23:22:02.970198 systemd[1]: No hostname configured, using default hostname. Feb 8 23:22:02.970207 systemd[1]: Hostname set to . Feb 8 23:22:02.970216 systemd[1]: Initializing machine ID from VM UUID. Feb 8 23:22:02.970224 systemd[1]: Queued start job for default target initrd.target. Feb 8 23:22:02.970233 systemd[1]: Started systemd-ask-password-console.path. Feb 8 23:22:02.970241 systemd[1]: Reached target cryptsetup.target. Feb 8 23:22:02.970249 systemd[1]: Reached target paths.target. Feb 8 23:22:02.970258 systemd[1]: Reached target slices.target. Feb 8 23:22:02.970268 systemd[1]: Reached target swap.target. Feb 8 23:22:02.970276 systemd[1]: Reached target timers.target. Feb 8 23:22:02.970285 systemd[1]: Listening on iscsid.socket. Feb 8 23:22:02.970293 systemd[1]: Listening on iscsiuio.socket. Feb 8 23:22:02.970302 systemd[1]: Listening on systemd-journald-audit.socket. Feb 8 23:22:02.970310 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 8 23:22:02.970319 systemd[1]: Listening on systemd-journald.socket. Feb 8 23:22:02.970329 systemd[1]: Listening on systemd-networkd.socket. Feb 8 23:22:02.970338 systemd[1]: Listening on systemd-udevd-control.socket. Feb 8 23:22:02.970347 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 8 23:22:02.970356 systemd[1]: Reached target sockets.target. Feb 8 23:22:02.970364 systemd[1]: Starting kmod-static-nodes.service... Feb 8 23:22:02.970381 systemd[1]: Finished network-cleanup.service. Feb 8 23:22:02.970391 systemd[1]: Starting systemd-fsck-usr.service... Feb 8 23:22:02.970401 systemd[1]: Starting systemd-journald.service... Feb 8 23:22:02.970409 systemd[1]: Starting systemd-modules-load.service... Feb 8 23:22:02.981448 systemd[1]: Starting systemd-resolved.service... Feb 8 23:22:02.981462 systemd[1]: Starting systemd-vconsole-setup.service... Feb 8 23:22:02.981471 systemd[1]: Finished kmod-static-nodes.service. Feb 8 23:22:02.981484 systemd-journald[185]: Journal started Feb 8 23:22:02.981539 systemd-journald[185]: Runtime Journal (/run/log/journal/3de482808bee4f09a0bb0b419c84cc05) is 4.9M, max 39.5M, 34.5M free. Feb 8 23:22:03.010686 kernel: audit: type=1130 audit(1707434523.005:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.010720 systemd[1]: Started systemd-journald.service. Feb 8 23:22:03.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.009618 systemd-modules-load[186]: Inserted module 'overlay' Feb 8 23:22:03.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.012677 systemd[1]: Finished systemd-fsck-usr.service. Feb 8 23:22:03.021177 kernel: audit: type=1130 audit(1707434523.011:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.022851 systemd[1]: Finished systemd-vconsole-setup.service. Feb 8 23:22:03.026485 kernel: audit: type=1130 audit(1707434523.022:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.027935 systemd[1]: Starting dracut-cmdline-ask.service... Feb 8 23:22:03.031476 kernel: audit: type=1130 audit(1707434523.026:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.032109 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 8 23:22:03.038819 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 8 23:22:03.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.046246 kernel: audit: type=1130 audit(1707434523.039:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.054159 systemd-resolved[187]: Positive Trust Anchors: Feb 8 23:22:03.054176 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 8 23:22:03.054214 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 8 23:22:03.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.057073 systemd-resolved[187]: Defaulting to hostname 'linux'. Feb 8 23:22:03.062473 kernel: audit: type=1130 audit(1707434523.058:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.058013 systemd[1]: Started systemd-resolved.service. Feb 8 23:22:03.058584 systemd[1]: Reached target nss-lookup.target. Feb 8 23:22:03.064095 systemd[1]: Finished dracut-cmdline-ask.service. Feb 8 23:22:03.068430 kernel: audit: type=1130 audit(1707434523.064:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.065333 systemd[1]: Starting dracut-cmdline.service... Feb 8 23:22:03.072637 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 8 23:22:03.072660 kernel: Bridge firewalling registered Feb 8 23:22:03.073108 systemd-modules-load[186]: Inserted module 'br_netfilter' Feb 8 23:22:03.093591 dracut-cmdline[201]: dracut-dracut-053 Feb 8 23:22:03.095399 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=ae7db544026ede4699ee2036449b75950d3fb7929b25a6731d0ad396f1aa37c9 Feb 8 23:22:03.097437 kernel: SCSI subsystem initialized Feb 8 23:22:03.111966 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 8 23:22:03.112001 kernel: device-mapper: uevent: version 1.0.3 Feb 8 23:22:03.113674 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 8 23:22:03.118264 systemd-modules-load[186]: Inserted module 'dm_multipath' Feb 8 23:22:03.119244 systemd[1]: Finished systemd-modules-load.service. Feb 8 23:22:03.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.121371 systemd[1]: Starting systemd-sysctl.service... Feb 8 23:22:03.126921 kernel: audit: type=1130 audit(1707434523.119:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.130480 systemd[1]: Finished systemd-sysctl.service. Feb 8 23:22:03.134698 kernel: audit: type=1130 audit(1707434523.130:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.162471 kernel: Loading iSCSI transport class v2.0-870. Feb 8 23:22:03.176684 kernel: iscsi: registered transport (tcp) Feb 8 23:22:03.201558 kernel: iscsi: registered transport (qla4xxx) Feb 8 23:22:03.201633 kernel: QLogic iSCSI HBA Driver Feb 8 23:22:03.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.254937 systemd[1]: Finished dracut-cmdline.service. Feb 8 23:22:03.258352 systemd[1]: Starting dracut-pre-udev.service... Feb 8 23:22:03.336553 kernel: raid6: sse2x4 gen() 10015 MB/s Feb 8 23:22:03.354548 kernel: raid6: sse2x4 xor() 5035 MB/s Feb 8 23:22:03.372518 kernel: raid6: sse2x2 gen() 8868 MB/s Feb 8 23:22:03.390538 kernel: raid6: sse2x2 xor() 6618 MB/s Feb 8 23:22:03.408523 kernel: raid6: sse2x1 gen() 7835 MB/s Feb 8 23:22:03.426300 kernel: raid6: sse2x1 xor() 5624 MB/s Feb 8 23:22:03.426367 kernel: raid6: using algorithm sse2x4 gen() 10015 MB/s Feb 8 23:22:03.426399 kernel: raid6: .... xor() 5035 MB/s, rmw enabled Feb 8 23:22:03.427281 kernel: raid6: using ssse3x2 recovery algorithm Feb 8 23:22:03.442533 kernel: xor: measuring software checksum speed Feb 8 23:22:03.445187 kernel: prefetch64-sse : 18424 MB/sec Feb 8 23:22:03.445244 kernel: generic_sse : 16818 MB/sec Feb 8 23:22:03.445271 kernel: xor: using function: prefetch64-sse (18424 MB/sec) Feb 8 23:22:03.562486 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 8 23:22:03.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.581000 audit: BPF prog-id=7 op=LOAD Feb 8 23:22:03.581000 audit: BPF prog-id=8 op=LOAD Feb 8 23:22:03.579565 systemd[1]: Finished dracut-pre-udev.service. Feb 8 23:22:03.582923 systemd[1]: Starting systemd-udevd.service... Feb 8 23:22:03.616160 systemd-udevd[385]: Using default interface naming scheme 'v252'. Feb 8 23:22:03.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.628100 systemd[1]: Started systemd-udevd.service. Feb 8 23:22:03.630400 systemd[1]: Starting dracut-pre-trigger.service... Feb 8 23:22:03.657941 dracut-pre-trigger[390]: rd.md=0: removing MD RAID activation Feb 8 23:22:03.720657 systemd[1]: Finished dracut-pre-trigger.service. Feb 8 23:22:03.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.724350 systemd[1]: Starting systemd-udev-trigger.service... Feb 8 23:22:03.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:03.793857 systemd[1]: Finished systemd-udev-trigger.service. Feb 8 23:22:03.850491 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Feb 8 23:22:03.878483 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 8 23:22:03.878568 kernel: GPT:17805311 != 41943039 Feb 8 23:22:03.878582 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 8 23:22:03.878595 kernel: GPT:17805311 != 41943039 Feb 8 23:22:03.878717 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 8 23:22:03.881674 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 8 23:22:03.884451 kernel: libata version 3.00 loaded. Feb 8 23:22:03.889785 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 8 23:22:03.895451 kernel: scsi host0: ata_piix Feb 8 23:22:03.896978 kernel: scsi host1: ata_piix Feb 8 23:22:03.897266 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Feb 8 23:22:03.897296 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Feb 8 23:22:03.910468 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (432) Feb 8 23:22:03.920574 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 8 23:22:03.973993 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 8 23:22:03.978652 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 8 23:22:03.982486 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 8 23:22:03.983607 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 8 23:22:03.985606 systemd[1]: Starting disk-uuid.service... Feb 8 23:22:03.996409 disk-uuid[460]: Primary Header is updated. Feb 8 23:22:03.996409 disk-uuid[460]: Secondary Entries is updated. Feb 8 23:22:03.996409 disk-uuid[460]: Secondary Header is updated. Feb 8 23:22:04.005448 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 8 23:22:04.010441 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 8 23:22:05.022476 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 8 23:22:05.022855 disk-uuid[461]: The operation has completed successfully. Feb 8 23:22:05.105163 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 8 23:22:05.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:05.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:05.105337 systemd[1]: Finished disk-uuid.service. Feb 8 23:22:05.118013 systemd[1]: Starting verity-setup.service... Feb 8 23:22:05.144507 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Feb 8 23:22:05.283766 systemd[1]: Found device dev-mapper-usr.device. Feb 8 23:22:05.286828 systemd[1]: Finished verity-setup.service. Feb 8 23:22:05.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:05.291132 systemd[1]: Mounting sysusr-usr.mount... Feb 8 23:22:05.423738 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 8 23:22:05.422789 systemd[1]: Mounted sysusr-usr.mount. Feb 8 23:22:05.424695 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 8 23:22:05.425464 systemd[1]: Starting ignition-setup.service... Feb 8 23:22:05.430352 systemd[1]: Starting parse-ip-for-networkd.service... Feb 8 23:22:05.442508 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 8 23:22:05.442546 kernel: BTRFS info (device vda6): using free space tree Feb 8 23:22:05.442558 kernel: BTRFS info (device vda6): has skinny extents Feb 8 23:22:05.465113 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 8 23:22:05.477461 systemd[1]: Finished ignition-setup.service. Feb 8 23:22:05.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:05.480716 systemd[1]: Starting ignition-fetch-offline.service... Feb 8 23:22:05.582033 systemd[1]: Finished parse-ip-for-networkd.service. Feb 8 23:22:05.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:05.585000 audit: BPF prog-id=9 op=LOAD Feb 8 23:22:05.588245 systemd[1]: Starting systemd-networkd.service... Feb 8 23:22:05.635738 systemd-networkd[631]: lo: Link UP Feb 8 23:22:05.636549 systemd-networkd[631]: lo: Gained carrier Feb 8 23:22:05.637789 systemd-networkd[631]: Enumeration completed Feb 8 23:22:05.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:05.638376 systemd[1]: Started systemd-networkd.service. Feb 8 23:22:05.638974 systemd[1]: Reached target network.target. Feb 8 23:22:05.640521 systemd[1]: Starting iscsiuio.service... Feb 8 23:22:05.643023 systemd-networkd[631]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 8 23:22:05.646015 systemd-networkd[631]: eth0: Link UP Feb 8 23:22:05.646019 systemd-networkd[631]: eth0: Gained carrier Feb 8 23:22:05.651184 systemd[1]: Started iscsiuio.service. Feb 8 23:22:05.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:05.652774 systemd[1]: Starting iscsid.service... Feb 8 23:22:05.657136 iscsid[640]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 8 23:22:05.657136 iscsid[640]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 8 23:22:05.657136 iscsid[640]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 8 23:22:05.657136 iscsid[640]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 8 23:22:05.657136 iscsid[640]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 8 23:22:05.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:05.664217 iscsid[640]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 8 23:22:05.660789 systemd[1]: Started iscsid.service. Feb 8 23:22:05.663717 systemd[1]: Starting dracut-initqueue.service... Feb 8 23:22:05.671507 systemd-networkd[631]: eth0: DHCPv4 address 172.24.4.245/24, gateway 172.24.4.1 acquired from 172.24.4.1 Feb 8 23:22:05.677249 systemd[1]: Finished dracut-initqueue.service. Feb 8 23:22:05.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:05.678511 systemd[1]: Reached target remote-fs-pre.target. Feb 8 23:22:05.679337 systemd[1]: Reached target remote-cryptsetup.target. Feb 8 23:22:05.680769 systemd[1]: Reached target remote-fs.target. Feb 8 23:22:05.683294 systemd[1]: Starting dracut-pre-mount.service... Feb 8 23:22:05.693137 systemd[1]: Finished dracut-pre-mount.service. Feb 8 23:22:05.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:05.814841 ignition[551]: Ignition 2.14.0 Feb 8 23:22:05.814880 ignition[551]: Stage: fetch-offline Feb 8 23:22:05.815033 ignition[551]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:05.815144 ignition[551]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 8 23:22:05.820818 systemd[1]: Finished ignition-fetch-offline.service. Feb 8 23:22:05.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:05.817547 ignition[551]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 8 23:22:05.822351 systemd-resolved[187]: Detected conflict on linux IN A 172.24.4.245 Feb 8 23:22:05.817810 ignition[551]: parsed url from cmdline: "" Feb 8 23:22:05.822376 systemd-resolved[187]: Hostname conflict, changing published hostname from 'linux' to 'linux7'. Feb 8 23:22:05.817820 ignition[551]: no config URL provided Feb 8 23:22:05.824491 systemd[1]: Starting ignition-fetch.service... Feb 8 23:22:05.817833 ignition[551]: reading system config file "/usr/lib/ignition/user.ign" Feb 8 23:22:05.817853 ignition[551]: no config at "/usr/lib/ignition/user.ign" Feb 8 23:22:05.817874 ignition[551]: failed to fetch config: resource requires networking Feb 8 23:22:05.818125 ignition[551]: Ignition finished successfully Feb 8 23:22:05.843312 ignition[654]: Ignition 2.14.0 Feb 8 23:22:05.843374 ignition[654]: Stage: fetch Feb 8 23:22:05.843830 ignition[654]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:05.843917 ignition[654]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 8 23:22:05.846764 ignition[654]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 8 23:22:05.846994 ignition[654]: parsed url from cmdline: "" Feb 8 23:22:05.847005 ignition[654]: no config URL provided Feb 8 23:22:05.847018 ignition[654]: reading system config file "/usr/lib/ignition/user.ign" Feb 8 23:22:05.847038 ignition[654]: no config at "/usr/lib/ignition/user.ign" Feb 8 23:22:05.849744 ignition[654]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Feb 8 23:22:05.849799 ignition[654]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Feb 8 23:22:05.849855 ignition[654]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Feb 8 23:22:06.150229 ignition[654]: GET result: OK Feb 8 23:22:06.150414 ignition[654]: parsing config with SHA512: e50b10f69521024a4431dff22b1d2840e7b2eebb9ab08842788a96bf45835f9b80054d85610b5ceec50aef66275823057b8614e0b4cf97b5cd989162afea0cf7 Feb 8 23:22:06.435163 unknown[654]: fetched base config from "system" Feb 8 23:22:06.435194 unknown[654]: fetched base config from "system" Feb 8 23:22:06.436398 ignition[654]: fetch: fetch complete Feb 8 23:22:06.435209 unknown[654]: fetched user config from "openstack" Feb 8 23:22:06.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:06.436411 ignition[654]: fetch: fetch passed Feb 8 23:22:06.439700 systemd[1]: Finished ignition-fetch.service. Feb 8 23:22:06.436528 ignition[654]: Ignition finished successfully Feb 8 23:22:06.442919 systemd[1]: Starting ignition-kargs.service... Feb 8 23:22:06.468472 ignition[660]: Ignition 2.14.0 Feb 8 23:22:06.468498 ignition[660]: Stage: kargs Feb 8 23:22:06.468750 ignition[660]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:06.468792 ignition[660]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 8 23:22:06.471080 ignition[660]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 8 23:22:06.473828 ignition[660]: kargs: kargs passed Feb 8 23:22:06.473918 ignition[660]: Ignition finished successfully Feb 8 23:22:06.486729 systemd[1]: Finished ignition-kargs.service. Feb 8 23:22:06.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:06.489925 systemd[1]: Starting ignition-disks.service... Feb 8 23:22:06.506192 ignition[665]: Ignition 2.14.0 Feb 8 23:22:06.506220 ignition[665]: Stage: disks Feb 8 23:22:06.506589 ignition[665]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:06.506634 ignition[665]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 8 23:22:06.508831 ignition[665]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 8 23:22:06.511518 ignition[665]: disks: disks passed Feb 8 23:22:06.511608 ignition[665]: Ignition finished successfully Feb 8 23:22:06.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:06.513233 systemd[1]: Finished ignition-disks.service. Feb 8 23:22:06.515012 systemd[1]: Reached target initrd-root-device.target. Feb 8 23:22:06.517147 systemd[1]: Reached target local-fs-pre.target. Feb 8 23:22:06.519369 systemd[1]: Reached target local-fs.target. Feb 8 23:22:06.521644 systemd[1]: Reached target sysinit.target. Feb 8 23:22:06.523846 systemd[1]: Reached target basic.target. Feb 8 23:22:06.527920 systemd[1]: Starting systemd-fsck-root.service... Feb 8 23:22:06.812523 systemd-fsck[672]: ROOT: clean, 602/1628000 files, 124051/1617920 blocks Feb 8 23:22:06.953975 systemd[1]: Finished systemd-fsck-root.service. Feb 8 23:22:06.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:06.957042 systemd[1]: Mounting sysroot.mount... Feb 8 23:22:06.986522 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 8 23:22:06.988354 systemd[1]: Mounted sysroot.mount. Feb 8 23:22:06.990893 systemd[1]: Reached target initrd-root-fs.target. Feb 8 23:22:06.995759 systemd[1]: Mounting sysroot-usr.mount... Feb 8 23:22:06.997770 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 8 23:22:06.999227 systemd[1]: Starting flatcar-openstack-hostname.service... Feb 8 23:22:07.004048 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 8 23:22:07.004127 systemd[1]: Reached target ignition-diskful.target. Feb 8 23:22:07.011908 systemd[1]: Mounted sysroot-usr.mount. Feb 8 23:22:07.023504 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 8 23:22:07.031963 systemd[1]: Starting initrd-setup-root.service... Feb 8 23:22:07.055478 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (679) Feb 8 23:22:07.056857 initrd-setup-root[684]: cut: /sysroot/etc/passwd: No such file or directory Feb 8 23:22:07.071023 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 8 23:22:07.071118 kernel: BTRFS info (device vda6): using free space tree Feb 8 23:22:07.071157 kernel: BTRFS info (device vda6): has skinny extents Feb 8 23:22:07.079487 initrd-setup-root[708]: cut: /sysroot/etc/group: No such file or directory Feb 8 23:22:07.092925 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 8 23:22:07.100156 initrd-setup-root[718]: cut: /sysroot/etc/shadow: No such file or directory Feb 8 23:22:07.108703 initrd-setup-root[726]: cut: /sysroot/etc/gshadow: No such file or directory Feb 8 23:22:07.178657 systemd[1]: Finished initrd-setup-root.service. Feb 8 23:22:07.198708 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 8 23:22:07.198757 kernel: audit: type=1130 audit(1707434527.178:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:07.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:07.180063 systemd[1]: Starting ignition-mount.service... Feb 8 23:22:07.199802 systemd[1]: Starting sysroot-boot.service... Feb 8 23:22:07.203194 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 8 23:22:07.203295 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 8 23:22:07.216311 ignition[746]: INFO : Ignition 2.14.0 Feb 8 23:22:07.216311 ignition[746]: INFO : Stage: mount Feb 8 23:22:07.217641 ignition[746]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:07.217641 ignition[746]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 8 23:22:07.217641 ignition[746]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 8 23:22:07.220781 ignition[746]: INFO : mount: mount passed Feb 8 23:22:07.220781 ignition[746]: INFO : Ignition finished successfully Feb 8 23:22:07.232032 kernel: audit: type=1130 audit(1707434527.220:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:07.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:07.220213 systemd[1]: Finished ignition-mount.service. Feb 8 23:22:07.240531 systemd[1]: Finished sysroot-boot.service. Feb 8 23:22:07.245009 kernel: audit: type=1130 audit(1707434527.240:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:07.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:07.263514 coreos-metadata[678]: Feb 08 23:22:07.263 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Feb 8 23:22:07.286385 coreos-metadata[678]: Feb 08 23:22:07.286 INFO Fetch successful Feb 8 23:22:07.286976 coreos-metadata[678]: Feb 08 23:22:07.286 INFO wrote hostname ci-3510-3-2-b-5b6cf47aa3.novalocal to /sysroot/etc/hostname Feb 8 23:22:07.290971 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Feb 8 23:22:07.291148 systemd[1]: Finished flatcar-openstack-hostname.service. Feb 8 23:22:07.301393 kernel: audit: type=1130 audit(1707434527.292:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:07.301481 kernel: audit: type=1131 audit(1707434527.292:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:07.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:07.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:07.294064 systemd[1]: Starting ignition-files.service... Feb 8 23:22:07.304207 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 8 23:22:07.310015 systemd-networkd[631]: eth0: Gained IPv6LL Feb 8 23:22:07.319465 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (756) Feb 8 23:22:07.324787 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 8 23:22:07.324813 kernel: BTRFS info (device vda6): using free space tree Feb 8 23:22:07.324825 kernel: BTRFS info (device vda6): has skinny extents Feb 8 23:22:07.333732 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 8 23:22:07.350014 ignition[775]: INFO : Ignition 2.14.0 Feb 8 23:22:07.350014 ignition[775]: INFO : Stage: files Feb 8 23:22:07.352702 ignition[775]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:07.352702 ignition[775]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 8 23:22:07.352702 ignition[775]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 8 23:22:07.360060 ignition[775]: DEBUG : files: compiled without relabeling support, skipping Feb 8 23:22:07.360060 ignition[775]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 8 23:22:07.360060 ignition[775]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 8 23:22:07.367599 ignition[775]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 8 23:22:07.367599 ignition[775]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 8 23:22:07.367599 ignition[775]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 8 23:22:07.365387 unknown[775]: wrote ssh authorized keys file for user: core Feb 8 23:22:07.375732 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 8 23:22:07.375732 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 8 23:22:07.809346 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 8 23:22:08.688527 ignition[775]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 8 23:22:08.688527 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 8 23:22:08.688527 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 8 23:22:08.697618 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 8 23:22:09.040235 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 8 23:22:09.512698 ignition[775]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 8 23:22:09.512698 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 8 23:22:09.518515 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 8 23:22:09.518515 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 8 23:22:09.652190 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 8 23:22:10.579521 ignition[775]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 8 23:22:10.579521 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 8 23:22:10.585475 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 8 23:22:10.585475 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 8 23:22:10.688770 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 8 23:22:12.692123 ignition[775]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 8 23:22:12.692123 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 8 23:22:12.692123 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 8 23:22:12.700025 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 8 23:22:12.700025 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 8 23:22:12.700025 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 8 23:22:13.028363 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 8 23:22:13.028363 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 8 23:22:13.028363 ignition[775]: INFO : files: op(a): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 8 23:22:13.037814 ignition[775]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(a): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(c): [started] processing unit "coreos-metadata.service" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(c): op(d): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(c): op(d): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(c): [finished] processing unit "coreos-metadata.service" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(e): [started] processing unit "prepare-cni-plugins.service" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(e): op(f): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(e): op(f): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(e): [finished] processing unit "prepare-cni-plugins.service" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(10): [started] processing unit "prepare-critools.service" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(10): op(11): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(10): op(11): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(10): [finished] processing unit "prepare-critools.service" Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(12): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(12): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 8 23:22:13.041184 ignition[775]: INFO : files: op(13): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 8 23:22:13.101807 kernel: audit: type=1130 audit(1707434533.076:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.102002 ignition[775]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 8 23:22:13.102002 ignition[775]: INFO : files: op(14): [started] setting preset to enabled for "prepare-critools.service" Feb 8 23:22:13.102002 ignition[775]: INFO : files: op(14): [finished] setting preset to enabled for "prepare-critools.service" Feb 8 23:22:13.102002 ignition[775]: INFO : files: createResultFile: createFiles: op(15): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 8 23:22:13.102002 ignition[775]: INFO : files: createResultFile: createFiles: op(15): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 8 23:22:13.102002 ignition[775]: INFO : files: files passed Feb 8 23:22:13.102002 ignition[775]: INFO : Ignition finished successfully Feb 8 23:22:13.072020 systemd[1]: Finished ignition-files.service. Feb 8 23:22:13.129721 kernel: audit: type=1130 audit(1707434533.118:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.129745 kernel: audit: type=1131 audit(1707434533.118:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.078552 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 8 23:22:13.135166 kernel: audit: type=1130 audit(1707434533.130:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.135228 initrd-setup-root-after-ignition[800]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 8 23:22:13.089759 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 8 23:22:13.091562 systemd[1]: Starting ignition-quench.service... Feb 8 23:22:13.115528 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 8 23:22:13.115738 systemd[1]: Finished ignition-quench.service. Feb 8 23:22:13.126219 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 8 23:22:13.131282 systemd[1]: Reached target ignition-complete.target. Feb 8 23:22:13.137739 systemd[1]: Starting initrd-parse-etc.service... Feb 8 23:22:13.163589 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 8 23:22:13.164618 systemd[1]: Finished initrd-parse-etc.service. Feb 8 23:22:13.182763 kernel: audit: type=1130 audit(1707434533.165:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.182818 kernel: audit: type=1131 audit(1707434533.165:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.165674 systemd[1]: Reached target initrd-fs.target. Feb 8 23:22:13.183140 systemd[1]: Reached target initrd.target. Feb 8 23:22:13.184801 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 8 23:22:13.185652 systemd[1]: Starting dracut-pre-pivot.service... Feb 8 23:22:13.202249 systemd[1]: Finished dracut-pre-pivot.service. Feb 8 23:22:13.212051 kernel: audit: type=1130 audit(1707434533.202:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.203767 systemd[1]: Starting initrd-cleanup.service... Feb 8 23:22:13.220177 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 8 23:22:13.220285 systemd[1]: Finished initrd-cleanup.service. Feb 8 23:22:13.228013 kernel: audit: type=1130 audit(1707434533.220:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.228030 kernel: audit: type=1131 audit(1707434533.220:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.221977 systemd[1]: Stopped target nss-lookup.target. Feb 8 23:22:13.228408 systemd[1]: Stopped target remote-cryptsetup.target. Feb 8 23:22:13.229332 systemd[1]: Stopped target timers.target. Feb 8 23:22:13.230236 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 8 23:22:13.238452 kernel: audit: type=1131 audit(1707434533.234:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.230279 systemd[1]: Stopped dracut-pre-pivot.service. Feb 8 23:22:13.234747 systemd[1]: Stopped target initrd.target. Feb 8 23:22:13.238902 systemd[1]: Stopped target basic.target. Feb 8 23:22:13.239798 systemd[1]: Stopped target ignition-complete.target. Feb 8 23:22:13.240692 systemd[1]: Stopped target ignition-diskful.target. Feb 8 23:22:13.241584 systemd[1]: Stopped target initrd-root-device.target. Feb 8 23:22:13.242513 systemd[1]: Stopped target remote-fs.target. Feb 8 23:22:13.243449 systemd[1]: Stopped target remote-fs-pre.target. Feb 8 23:22:13.244346 systemd[1]: Stopped target sysinit.target. Feb 8 23:22:13.245209 systemd[1]: Stopped target local-fs.target. Feb 8 23:22:13.246087 systemd[1]: Stopped target local-fs-pre.target. Feb 8 23:22:13.246994 systemd[1]: Stopped target swap.target. Feb 8 23:22:13.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.247832 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 8 23:22:13.247876 systemd[1]: Stopped dracut-pre-mount.service. Feb 8 23:22:13.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.248726 systemd[1]: Stopped target cryptsetup.target. Feb 8 23:22:13.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.249511 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 8 23:22:13.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.249550 systemd[1]: Stopped dracut-initqueue.service. Feb 8 23:22:13.250468 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 8 23:22:13.250525 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 8 23:22:13.251383 systemd[1]: ignition-files.service: Deactivated successfully. Feb 8 23:22:13.251439 systemd[1]: Stopped ignition-files.service. Feb 8 23:22:13.252947 systemd[1]: Stopping ignition-mount.service... Feb 8 23:22:13.259915 systemd[1]: Stopping sysroot-boot.service... Feb 8 23:22:13.267503 ignition[813]: INFO : Ignition 2.14.0 Feb 8 23:22:13.267503 ignition[813]: INFO : Stage: umount Feb 8 23:22:13.267503 ignition[813]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 8 23:22:13.267503 ignition[813]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 8 23:22:13.267503 ignition[813]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 8 23:22:13.267503 ignition[813]: INFO : umount: umount passed Feb 8 23:22:13.267503 ignition[813]: INFO : Ignition finished successfully Feb 8 23:22:13.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.266961 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 8 23:22:13.267046 systemd[1]: Stopped systemd-udev-trigger.service. Feb 8 23:22:13.268640 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 8 23:22:13.268699 systemd[1]: Stopped dracut-pre-trigger.service. Feb 8 23:22:13.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.269482 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 8 23:22:13.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.269566 systemd[1]: Stopped ignition-mount.service. Feb 8 23:22:13.270055 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 8 23:22:13.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.270096 systemd[1]: Stopped ignition-disks.service. Feb 8 23:22:13.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.270574 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 8 23:22:13.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.270640 systemd[1]: Stopped ignition-kargs.service. Feb 8 23:22:13.271181 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 8 23:22:13.271241 systemd[1]: Stopped ignition-fetch.service. Feb 8 23:22:13.271728 systemd[1]: Stopped target network.target. Feb 8 23:22:13.272113 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 8 23:22:13.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.272151 systemd[1]: Stopped ignition-fetch-offline.service. Feb 8 23:22:13.272649 systemd[1]: Stopped target paths.target. Feb 8 23:22:13.273049 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 8 23:22:13.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.303000 audit: BPF prog-id=6 op=UNLOAD Feb 8 23:22:13.276533 systemd[1]: Stopped systemd-ask-password-console.path. Feb 8 23:22:13.276975 systemd[1]: Stopped target slices.target. Feb 8 23:22:13.277457 systemd[1]: Stopped target sockets.target. Feb 8 23:22:13.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.277912 systemd[1]: iscsid.socket: Deactivated successfully. Feb 8 23:22:13.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.277946 systemd[1]: Closed iscsid.socket. Feb 8 23:22:13.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.278390 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 8 23:22:13.278435 systemd[1]: Closed iscsiuio.socket. Feb 8 23:22:13.278941 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 8 23:22:13.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.278979 systemd[1]: Stopped ignition-setup.service. Feb 8 23:22:13.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.279896 systemd[1]: Stopping systemd-networkd.service... Feb 8 23:22:13.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.281277 systemd[1]: Stopping systemd-resolved.service... Feb 8 23:22:13.283706 systemd-networkd[631]: eth0: DHCPv6 lease lost Feb 8 23:22:13.319000 audit: BPF prog-id=9 op=UNLOAD Feb 8 23:22:13.284940 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 8 23:22:13.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.285404 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 8 23:22:13.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.285520 systemd[1]: Stopped systemd-networkd.service. Feb 8 23:22:13.288062 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 8 23:22:13.288157 systemd[1]: Stopped sysroot-boot.service. Feb 8 23:22:13.288880 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 8 23:22:13.288912 systemd[1]: Closed systemd-networkd.socket. Feb 8 23:22:13.289714 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 8 23:22:13.289760 systemd[1]: Stopped initrd-setup-root.service. Feb 8 23:22:13.290940 systemd[1]: Stopping network-cleanup.service... Feb 8 23:22:13.293633 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 8 23:22:13.293710 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 8 23:22:13.294618 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 8 23:22:13.294678 systemd[1]: Stopped systemd-sysctl.service. Feb 8 23:22:13.295840 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 8 23:22:13.295881 systemd[1]: Stopped systemd-modules-load.service. Feb 8 23:22:13.296797 systemd[1]: Stopping systemd-udevd.service... Feb 8 23:22:13.298705 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 8 23:22:13.299174 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 8 23:22:13.299269 systemd[1]: Stopped systemd-resolved.service. Feb 8 23:22:13.303086 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 8 23:22:13.303249 systemd[1]: Stopped systemd-udevd.service. Feb 8 23:22:13.304200 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 8 23:22:13.304240 systemd[1]: Closed systemd-udevd-control.socket. Feb 8 23:22:13.304849 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 8 23:22:13.304878 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 8 23:22:13.305750 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 8 23:22:13.305787 systemd[1]: Stopped dracut-pre-udev.service. Feb 8 23:22:13.307139 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 8 23:22:13.307212 systemd[1]: Stopped dracut-cmdline.service. Feb 8 23:22:13.307869 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 8 23:22:13.307904 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 8 23:22:13.309573 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 8 23:22:13.310169 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 8 23:22:13.310211 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 8 23:22:13.317720 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 8 23:22:13.317760 systemd[1]: Stopped kmod-static-nodes.service. Feb 8 23:22:13.318392 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 8 23:22:13.318447 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 8 23:22:13.320134 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 8 23:22:13.320732 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 8 23:22:13.320834 systemd[1]: Stopped network-cleanup.service. Feb 8 23:22:13.321669 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 8 23:22:13.321747 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 8 23:22:13.322586 systemd[1]: Reached target initrd-switch-root.target. Feb 8 23:22:13.324078 systemd[1]: Starting initrd-switch-root.service... Feb 8 23:22:13.343106 systemd[1]: Switching root. Feb 8 23:22:13.365525 iscsid[640]: iscsid shutting down. Feb 8 23:22:13.366137 systemd-journald[185]: Journal stopped Feb 8 23:22:17.343194 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Feb 8 23:22:17.343240 kernel: SELinux: Class mctp_socket not defined in policy. Feb 8 23:22:17.343258 kernel: SELinux: Class anon_inode not defined in policy. Feb 8 23:22:17.343273 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 8 23:22:17.343285 kernel: SELinux: policy capability network_peer_controls=1 Feb 8 23:22:17.343298 kernel: SELinux: policy capability open_perms=1 Feb 8 23:22:17.343310 kernel: SELinux: policy capability extended_socket_class=1 Feb 8 23:22:17.343331 kernel: SELinux: policy capability always_check_network=0 Feb 8 23:22:17.343344 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 8 23:22:17.343355 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 8 23:22:17.343366 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 8 23:22:17.343377 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 8 23:22:17.343391 systemd[1]: Successfully loaded SELinux policy in 93.472ms. Feb 8 23:22:17.343463 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 17.579ms. Feb 8 23:22:17.343490 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 8 23:22:17.343508 systemd[1]: Detected virtualization kvm. Feb 8 23:22:17.343519 systemd[1]: Detected architecture x86-64. Feb 8 23:22:17.343534 systemd[1]: Detected first boot. Feb 8 23:22:17.343549 systemd[1]: Hostname set to . Feb 8 23:22:17.343561 systemd[1]: Initializing machine ID from VM UUID. Feb 8 23:22:17.343575 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 8 23:22:17.343587 systemd[1]: Populated /etc with preset unit settings. Feb 8 23:22:17.343604 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 8 23:22:17.343617 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 8 23:22:17.343630 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 8 23:22:17.343644 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 8 23:22:17.343655 systemd[1]: Stopped iscsiuio.service. Feb 8 23:22:17.343669 systemd[1]: iscsid.service: Deactivated successfully. Feb 8 23:22:17.343690 systemd[1]: Stopped iscsid.service. Feb 8 23:22:17.343702 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 8 23:22:17.343714 systemd[1]: Stopped initrd-switch-root.service. Feb 8 23:22:17.343726 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 8 23:22:17.343739 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 8 23:22:17.343751 systemd[1]: Created slice system-addon\x2drun.slice. Feb 8 23:22:17.343763 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 8 23:22:17.343775 systemd[1]: Created slice system-getty.slice. Feb 8 23:22:17.343790 systemd[1]: Created slice system-modprobe.slice. Feb 8 23:22:17.343802 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 8 23:22:17.343814 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 8 23:22:17.343826 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 8 23:22:17.343839 systemd[1]: Created slice user.slice. Feb 8 23:22:17.343851 systemd[1]: Started systemd-ask-password-console.path. Feb 8 23:22:17.343865 systemd[1]: Started systemd-ask-password-wall.path. Feb 8 23:22:17.343877 systemd[1]: Set up automount boot.automount. Feb 8 23:22:17.343889 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 8 23:22:17.343901 systemd[1]: Stopped target initrd-switch-root.target. Feb 8 23:22:17.343913 systemd[1]: Stopped target initrd-fs.target. Feb 8 23:22:17.343925 systemd[1]: Stopped target initrd-root-fs.target. Feb 8 23:22:17.343937 systemd[1]: Reached target integritysetup.target. Feb 8 23:22:17.343957 systemd[1]: Reached target remote-cryptsetup.target. Feb 8 23:22:17.343969 systemd[1]: Reached target remote-fs.target. Feb 8 23:22:17.343983 systemd[1]: Reached target slices.target. Feb 8 23:22:17.343995 systemd[1]: Reached target swap.target. Feb 8 23:22:17.344007 systemd[1]: Reached target torcx.target. Feb 8 23:22:17.344018 systemd[1]: Reached target veritysetup.target. Feb 8 23:22:17.344031 systemd[1]: Listening on systemd-coredump.socket. Feb 8 23:22:17.344042 systemd[1]: Listening on systemd-initctl.socket. Feb 8 23:22:17.344054 systemd[1]: Listening on systemd-networkd.socket. Feb 8 23:22:17.344066 systemd[1]: Listening on systemd-udevd-control.socket. Feb 8 23:22:17.344078 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 8 23:22:17.344090 systemd[1]: Listening on systemd-userdbd.socket. Feb 8 23:22:17.344104 systemd[1]: Mounting dev-hugepages.mount... Feb 8 23:22:17.344117 systemd[1]: Mounting dev-mqueue.mount... Feb 8 23:22:17.344129 systemd[1]: Mounting media.mount... Feb 8 23:22:17.344141 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 8 23:22:17.344152 systemd[1]: Mounting sys-kernel-debug.mount... Feb 8 23:22:17.344164 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 8 23:22:17.344176 systemd[1]: Mounting tmp.mount... Feb 8 23:22:17.344187 systemd[1]: Starting flatcar-tmpfiles.service... Feb 8 23:22:17.344199 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 8 23:22:17.344221 systemd[1]: Starting kmod-static-nodes.service... Feb 8 23:22:17.344233 systemd[1]: Starting modprobe@configfs.service... Feb 8 23:22:17.344245 systemd[1]: Starting modprobe@dm_mod.service... Feb 8 23:22:17.344257 systemd[1]: Starting modprobe@drm.service... Feb 8 23:22:17.344269 systemd[1]: Starting modprobe@efi_pstore.service... Feb 8 23:22:17.344281 systemd[1]: Starting modprobe@fuse.service... Feb 8 23:22:17.344293 systemd[1]: Starting modprobe@loop.service... Feb 8 23:22:17.344305 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 8 23:22:17.344317 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 8 23:22:17.344331 systemd[1]: Stopped systemd-fsck-root.service. Feb 8 23:22:17.344342 kernel: loop: module loaded Feb 8 23:22:17.344354 kernel: fuse: init (API version 7.34) Feb 8 23:22:17.344367 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 8 23:22:17.344379 systemd[1]: Stopped systemd-fsck-usr.service. Feb 8 23:22:17.344390 systemd[1]: Stopped systemd-journald.service. Feb 8 23:22:17.344401 systemd[1]: Starting systemd-journald.service... Feb 8 23:22:17.344412 systemd[1]: Starting systemd-modules-load.service... Feb 8 23:22:17.344454 systemd[1]: Starting systemd-network-generator.service... Feb 8 23:22:17.344469 systemd[1]: Starting systemd-remount-fs.service... Feb 8 23:22:17.344480 systemd[1]: Starting systemd-udev-trigger.service... Feb 8 23:22:17.344491 systemd[1]: verity-setup.service: Deactivated successfully. Feb 8 23:22:17.344502 systemd[1]: Stopped verity-setup.service. Feb 8 23:22:17.344513 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 8 23:22:17.344524 systemd[1]: Mounted dev-hugepages.mount. Feb 8 23:22:17.344535 systemd[1]: Mounted dev-mqueue.mount. Feb 8 23:22:17.344546 systemd[1]: Mounted media.mount. Feb 8 23:22:17.344557 systemd[1]: Mounted sys-kernel-debug.mount. Feb 8 23:22:17.344571 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 8 23:22:17.344584 systemd-journald[927]: Journal started Feb 8 23:22:17.344624 systemd-journald[927]: Runtime Journal (/run/log/journal/3de482808bee4f09a0bb0b419c84cc05) is 4.9M, max 39.5M, 34.5M free. Feb 8 23:22:17.344664 systemd[1]: Mounted tmp.mount. Feb 8 23:22:13.650000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 8 23:22:13.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 8 23:22:13.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 8 23:22:13.762000 audit: BPF prog-id=10 op=LOAD Feb 8 23:22:13.762000 audit: BPF prog-id=10 op=UNLOAD Feb 8 23:22:13.762000 audit: BPF prog-id=11 op=LOAD Feb 8 23:22:13.762000 audit: BPF prog-id=11 op=UNLOAD Feb 8 23:22:13.927000 audit[845]: AVC avc: denied { associate } for pid=845 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 8 23:22:13.927000 audit[845]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=828 pid=845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:13.927000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 8 23:22:13.929000 audit[845]: AVC avc: denied { associate } for pid=845 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 8 23:22:13.929000 audit[845]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179a9 a2=1ed a3=0 items=2 ppid=828 pid=845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:13.929000 audit: CWD cwd="/" Feb 8 23:22:13.929000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:13.929000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:13.929000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 8 23:22:17.133000 audit: BPF prog-id=12 op=LOAD Feb 8 23:22:17.133000 audit: BPF prog-id=3 op=UNLOAD Feb 8 23:22:17.133000 audit: BPF prog-id=13 op=LOAD Feb 8 23:22:17.133000 audit: BPF prog-id=14 op=LOAD Feb 8 23:22:17.133000 audit: BPF prog-id=4 op=UNLOAD Feb 8 23:22:17.133000 audit: BPF prog-id=5 op=UNLOAD Feb 8 23:22:17.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.142000 audit: BPF prog-id=12 op=UNLOAD Feb 8 23:22:17.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.297000 audit: BPF prog-id=15 op=LOAD Feb 8 23:22:17.298000 audit: BPF prog-id=16 op=LOAD Feb 8 23:22:17.298000 audit: BPF prog-id=17 op=LOAD Feb 8 23:22:17.298000 audit: BPF prog-id=13 op=UNLOAD Feb 8 23:22:17.298000 audit: BPF prog-id=14 op=UNLOAD Feb 8 23:22:17.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.341000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 8 23:22:17.341000 audit[927]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffd719b360 a2=4000 a3=7fffd719b3fc items=0 ppid=1 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:17.341000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 8 23:22:17.131070 systemd[1]: Queued start job for default target multi-user.target. Feb 8 23:22:13.924035 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 8 23:22:17.131083 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 8 23:22:13.924850 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 8 23:22:17.135595 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 8 23:22:13.924874 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 8 23:22:13.924925 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 8 23:22:13.924937 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 8 23:22:13.924971 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 8 23:22:13.924987 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 8 23:22:13.925203 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 8 23:22:13.925244 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 8 23:22:13.925260 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 8 23:22:13.926220 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 8 23:22:13.926262 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 8 23:22:13.926285 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 8 23:22:13.926304 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 8 23:22:17.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:13.926324 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 8 23:22:17.347468 systemd[1]: Started systemd-journald.service. Feb 8 23:22:13.926341 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:13Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 8 23:22:16.703900 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:16Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:22:16.704271 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:16Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:22:16.704387 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:16Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:22:16.704620 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:16Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 8 23:22:16.704823 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:16Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 8 23:22:16.704923 /usr/lib/systemd/system-generators/torcx-generator[845]: time="2024-02-08T23:22:16Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 8 23:22:17.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.348595 systemd[1]: Finished kmod-static-nodes.service. Feb 8 23:22:17.349273 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 8 23:22:17.351561 systemd[1]: Finished modprobe@configfs.service. Feb 8 23:22:17.352210 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 8 23:22:17.353567 systemd[1]: Finished modprobe@dm_mod.service. Feb 8 23:22:17.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.354211 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 8 23:22:17.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.356567 systemd[1]: Finished modprobe@drm.service. Feb 8 23:22:17.357268 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 8 23:22:17.357562 systemd[1]: Finished modprobe@efi_pstore.service. Feb 8 23:22:17.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.358207 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 8 23:22:17.358578 systemd[1]: Finished modprobe@fuse.service. Feb 8 23:22:17.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.359202 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 8 23:22:17.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.359546 systemd[1]: Finished modprobe@loop.service. Feb 8 23:22:17.360248 systemd[1]: Finished systemd-modules-load.service. Feb 8 23:22:17.360985 systemd[1]: Finished systemd-network-generator.service. Feb 8 23:22:17.361709 systemd[1]: Finished systemd-remount-fs.service. Feb 8 23:22:17.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.362709 systemd[1]: Reached target network-pre.target. Feb 8 23:22:17.365188 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 8 23:22:17.369518 systemd[1]: Mounting sys-kernel-config.mount... Feb 8 23:22:17.369992 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 8 23:22:17.373510 systemd[1]: Starting systemd-hwdb-update.service... Feb 8 23:22:17.375432 systemd[1]: Starting systemd-journal-flush.service... Feb 8 23:22:17.375964 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 8 23:22:17.377002 systemd[1]: Starting systemd-random-seed.service... Feb 8 23:22:17.377957 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 8 23:22:17.380564 systemd[1]: Starting systemd-sysctl.service... Feb 8 23:22:17.383544 systemd[1]: Finished flatcar-tmpfiles.service. Feb 8 23:22:17.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.385067 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 8 23:22:17.385630 systemd[1]: Mounted sys-kernel-config.mount. Feb 8 23:22:17.389295 systemd[1]: Starting systemd-sysusers.service... Feb 8 23:22:17.395170 systemd-journald[927]: Time spent on flushing to /var/log/journal/3de482808bee4f09a0bb0b419c84cc05 is 28.845ms for 1116 entries. Feb 8 23:22:17.395170 systemd-journald[927]: System Journal (/var/log/journal/3de482808bee4f09a0bb0b419c84cc05) is 8.0M, max 584.8M, 576.8M free. Feb 8 23:22:17.447550 systemd-journald[927]: Received client request to flush runtime journal. Feb 8 23:22:17.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.400065 systemd[1]: Finished systemd-random-seed.service. Feb 8 23:22:17.400698 systemd[1]: Reached target first-boot-complete.target. Feb 8 23:22:17.414451 systemd[1]: Finished systemd-sysctl.service. Feb 8 23:22:17.436001 systemd[1]: Finished systemd-sysusers.service. Feb 8 23:22:17.437842 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 8 23:22:17.448643 systemd[1]: Finished systemd-journal-flush.service. Feb 8 23:22:17.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.459763 systemd[1]: Finished systemd-udev-trigger.service. Feb 8 23:22:17.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.462106 systemd[1]: Starting systemd-udev-settle.service... Feb 8 23:22:17.470828 udevadm[958]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 8 23:22:17.487040 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 8 23:22:17.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.972741 systemd[1]: Finished systemd-hwdb-update.service. Feb 8 23:22:17.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:17.975000 audit: BPF prog-id=18 op=LOAD Feb 8 23:22:17.975000 audit: BPF prog-id=19 op=LOAD Feb 8 23:22:17.976000 audit: BPF prog-id=7 op=UNLOAD Feb 8 23:22:17.976000 audit: BPF prog-id=8 op=UNLOAD Feb 8 23:22:17.978771 systemd[1]: Starting systemd-udevd.service... Feb 8 23:22:18.021383 systemd-udevd[959]: Using default interface naming scheme 'v252'. Feb 8 23:22:18.070190 systemd[1]: Started systemd-udevd.service. Feb 8 23:22:18.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:18.077000 audit: BPF prog-id=20 op=LOAD Feb 8 23:22:18.080748 systemd[1]: Starting systemd-networkd.service... Feb 8 23:22:18.114319 kernel: kauditd_printk_skb: 103 callbacks suppressed Feb 8 23:22:18.115018 kernel: audit: type=1334 audit(1707434538.101:143): prog-id=21 op=LOAD Feb 8 23:22:18.117095 kernel: audit: type=1334 audit(1707434538.108:144): prog-id=22 op=LOAD Feb 8 23:22:18.101000 audit: BPF prog-id=21 op=LOAD Feb 8 23:22:18.108000 audit: BPF prog-id=22 op=LOAD Feb 8 23:22:18.115508 systemd[1]: Starting systemd-userdbd.service... Feb 8 23:22:18.124385 kernel: audit: type=1334 audit(1707434538.109:145): prog-id=23 op=LOAD Feb 8 23:22:18.109000 audit: BPF prog-id=23 op=LOAD Feb 8 23:22:18.144778 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 8 23:22:18.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:18.160100 systemd[1]: Started systemd-userdbd.service. Feb 8 23:22:18.166530 kernel: audit: type=1130 audit(1707434538.161:146): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:18.226474 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 8 23:22:18.262077 kernel: ACPI: button: Power Button [PWRF] Feb 8 23:22:18.262351 systemd-networkd[975]: lo: Link UP Feb 8 23:22:18.262359 systemd-networkd[975]: lo: Gained carrier Feb 8 23:22:18.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:18.263939 systemd-networkd[975]: Enumeration completed Feb 8 23:22:18.264082 systemd[1]: Started systemd-networkd.service. Feb 8 23:22:18.265187 systemd-networkd[975]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 8 23:22:18.267301 systemd-networkd[975]: eth0: Link UP Feb 8 23:22:18.267370 systemd-networkd[975]: eth0: Gained carrier Feb 8 23:22:18.269587 kernel: audit: type=1130 audit(1707434538.264:147): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:18.281612 systemd-networkd[975]: eth0: DHCPv4 address 172.24.4.245/24, gateway 172.24.4.1 acquired from 172.24.4.1 Feb 8 23:22:18.250000 audit[960]: AVC avc: denied { confidentiality } for pid=960 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 8 23:22:18.292534 kernel: audit: type=1400 audit(1707434538.250:148): avc: denied { confidentiality } for pid=960 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 8 23:22:18.250000 audit[960]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c113f6eff0 a1=32194 a2=7f6bfa759bc5 a3=5 items=108 ppid=959 pid=960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:18.304481 kernel: audit: type=1300 audit(1707434538.250:148): arch=c000003e syscall=175 success=yes exit=0 a0=55c113f6eff0 a1=32194 a2=7f6bfa759bc5 a3=5 items=108 ppid=959 pid=960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:18.304573 kernel: audit: type=1307 audit(1707434538.250:148): cwd="/" Feb 8 23:22:18.304603 kernel: audit: type=1302 audit(1707434538.250:148): item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.304624 kernel: audit: type=1302 audit(1707434538.250:148): item=1 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: CWD cwd="/" Feb 8 23:22:18.250000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=1 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=2 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=3 name=(null) inode=14516 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=4 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=5 name=(null) inode=14517 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=6 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=7 name=(null) inode=14518 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=8 name=(null) inode=14518 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=9 name=(null) inode=14519 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=10 name=(null) inode=14518 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=11 name=(null) inode=14520 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=12 name=(null) inode=14518 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=13 name=(null) inode=14521 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=14 name=(null) inode=14518 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=15 name=(null) inode=14522 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=16 name=(null) inode=14518 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=17 name=(null) inode=14523 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=18 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=19 name=(null) inode=14524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=20 name=(null) inode=14524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=21 name=(null) inode=14525 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=22 name=(null) inode=14524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=23 name=(null) inode=14526 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=24 name=(null) inode=14524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=25 name=(null) inode=14527 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=26 name=(null) inode=14524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=27 name=(null) inode=14528 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=28 name=(null) inode=14524 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=29 name=(null) inode=14529 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=30 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=31 name=(null) inode=14530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=32 name=(null) inode=14530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=33 name=(null) inode=14531 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=34 name=(null) inode=14530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=35 name=(null) inode=14532 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=36 name=(null) inode=14530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=37 name=(null) inode=14533 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=38 name=(null) inode=14530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=39 name=(null) inode=14534 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=40 name=(null) inode=14530 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=41 name=(null) inode=14535 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=42 name=(null) inode=14515 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=43 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=44 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=45 name=(null) inode=14537 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=46 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=47 name=(null) inode=14538 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=48 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=49 name=(null) inode=14539 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=50 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=51 name=(null) inode=14540 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=52 name=(null) inode=14536 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=53 name=(null) inode=14541 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=55 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=56 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=57 name=(null) inode=14543 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=58 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=59 name=(null) inode=14544 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=60 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=61 name=(null) inode=14545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=62 name=(null) inode=14545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=63 name=(null) inode=14546 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=64 name=(null) inode=14545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=65 name=(null) inode=14547 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=66 name=(null) inode=14545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=67 name=(null) inode=14548 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=68 name=(null) inode=14545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=69 name=(null) inode=14549 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=70 name=(null) inode=14545 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=71 name=(null) inode=14550 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=72 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=73 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=74 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=75 name=(null) inode=14552 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=76 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=77 name=(null) inode=14553 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=78 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=79 name=(null) inode=14554 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=80 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=81 name=(null) inode=14555 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=82 name=(null) inode=14551 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=83 name=(null) inode=14556 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=84 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=85 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=86 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=87 name=(null) inode=14558 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=88 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=89 name=(null) inode=14559 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=90 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=91 name=(null) inode=14560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=92 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=93 name=(null) inode=14561 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=94 name=(null) inode=14557 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=95 name=(null) inode=14562 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=96 name=(null) inode=14542 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=97 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=98 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=99 name=(null) inode=14564 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=100 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=101 name=(null) inode=14565 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=102 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=103 name=(null) inode=14566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=104 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=105 name=(null) inode=14567 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=106 name=(null) inode=14563 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PATH item=107 name=(null) inode=14568 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:22:18.250000 audit: PROCTITLE proctitle="(udev-worker)" Feb 8 23:22:18.304452 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 8 23:22:18.326435 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 8 23:22:18.326727 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 8 23:22:18.370443 kernel: mousedev: PS/2 mouse device common for all mice Feb 8 23:22:18.390906 systemd[1]: Finished systemd-udev-settle.service. Feb 8 23:22:18.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:18.392880 systemd[1]: Starting lvm2-activation-early.service... Feb 8 23:22:18.426571 lvm[988]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 8 23:22:18.462537 systemd[1]: Finished lvm2-activation-early.service. Feb 8 23:22:18.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:18.463133 systemd[1]: Reached target cryptsetup.target. Feb 8 23:22:18.464754 systemd[1]: Starting lvm2-activation.service... Feb 8 23:22:18.474785 lvm[989]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 8 23:22:18.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:18.507717 systemd[1]: Finished lvm2-activation.service. Feb 8 23:22:18.508348 systemd[1]: Reached target local-fs-pre.target. Feb 8 23:22:18.508811 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 8 23:22:18.508835 systemd[1]: Reached target local-fs.target. Feb 8 23:22:18.509249 systemd[1]: Reached target machines.target. Feb 8 23:22:18.510984 systemd[1]: Starting ldconfig.service... Feb 8 23:22:18.512589 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 8 23:22:18.512654 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 8 23:22:18.513771 systemd[1]: Starting systemd-boot-update.service... Feb 8 23:22:18.515595 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 8 23:22:18.518192 systemd[1]: Starting systemd-machine-id-commit.service... Feb 8 23:22:18.519572 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 8 23:22:18.519628 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 8 23:22:18.521484 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 8 23:22:18.552382 systemd[1]: boot.automount: Got automount request for /boot, triggered by 991 (bootctl) Feb 8 23:22:18.553942 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 8 23:22:18.597542 systemd-tmpfiles[994]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 8 23:22:18.635016 systemd-tmpfiles[994]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 8 23:22:18.640812 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 8 23:22:18.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:18.641580 systemd-tmpfiles[994]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 8 23:22:18.916276 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 8 23:22:18.919674 systemd[1]: Finished systemd-machine-id-commit.service. Feb 8 23:22:18.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:19.075053 systemd-fsck[1001]: fsck.fat 4.2 (2021-01-31) Feb 8 23:22:19.075053 systemd-fsck[1001]: /dev/vda1: 789 files, 115332/258078 clusters Feb 8 23:22:19.080136 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 8 23:22:19.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:19.085287 systemd[1]: Mounting boot.mount... Feb 8 23:22:19.115018 systemd[1]: Mounted boot.mount. Feb 8 23:22:19.167387 systemd[1]: Finished systemd-boot-update.service. Feb 8 23:22:19.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:19.260157 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 8 23:22:19.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:19.262634 systemd[1]: Starting audit-rules.service... Feb 8 23:22:19.264811 systemd[1]: Starting clean-ca-certificates.service... Feb 8 23:22:19.267897 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 8 23:22:19.269000 audit: BPF prog-id=24 op=LOAD Feb 8 23:22:19.273622 systemd[1]: Starting systemd-resolved.service... Feb 8 23:22:19.279000 audit: BPF prog-id=25 op=LOAD Feb 8 23:22:19.281006 systemd[1]: Starting systemd-timesyncd.service... Feb 8 23:22:19.283530 systemd[1]: Starting systemd-update-utmp.service... Feb 8 23:22:19.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:19.290835 systemd[1]: Finished clean-ca-certificates.service. Feb 8 23:22:19.291532 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 8 23:22:19.316000 audit[1010]: SYSTEM_BOOT pid=1010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 8 23:22:19.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:19.322908 systemd[1]: Finished systemd-update-utmp.service. Feb 8 23:22:19.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:19.348756 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 8 23:22:19.390000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 8 23:22:19.390000 audit[1024]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffed2c7d380 a2=420 a3=0 items=0 ppid=1004 pid=1024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:19.390000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 8 23:22:19.391130 augenrules[1024]: No rules Feb 8 23:22:19.392479 systemd[1]: Finished audit-rules.service. Feb 8 23:22:19.393826 systemd[1]: Started systemd-timesyncd.service. Feb 8 23:22:19.395134 systemd[1]: Reached target time-set.target. Feb 8 23:22:19.411332 systemd-resolved[1007]: Positive Trust Anchors: Feb 8 23:22:19.411353 systemd-resolved[1007]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 8 23:22:19.411390 systemd-resolved[1007]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 8 23:22:19.427935 systemd-timesyncd[1009]: Contacted time server 5.39.80.51:123 (0.flatcar.pool.ntp.org). Feb 8 23:22:19.429553 systemd-timesyncd[1009]: Initial clock synchronization to Thu 2024-02-08 23:22:19.571395 UTC. Feb 8 23:22:19.433089 systemd-resolved[1007]: Using system hostname 'ci-3510-3-2-b-5b6cf47aa3.novalocal'. Feb 8 23:22:19.435318 systemd[1]: Started systemd-resolved.service. Feb 8 23:22:19.436256 systemd[1]: Reached target network.target. Feb 8 23:22:19.436843 systemd[1]: Reached target nss-lookup.target. Feb 8 23:22:19.598697 systemd-networkd[975]: eth0: Gained IPv6LL Feb 8 23:22:19.661486 ldconfig[990]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 8 23:22:19.685001 systemd[1]: Finished ldconfig.service. Feb 8 23:22:19.689950 systemd[1]: Starting systemd-update-done.service... Feb 8 23:22:19.707000 systemd[1]: Finished systemd-update-done.service. Feb 8 23:22:19.708685 systemd[1]: Reached target sysinit.target. Feb 8 23:22:19.710221 systemd[1]: Started motdgen.path. Feb 8 23:22:19.711785 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 8 23:22:19.713635 systemd[1]: Started logrotate.timer. Feb 8 23:22:19.715066 systemd[1]: Started mdadm.timer. Feb 8 23:22:19.716311 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 8 23:22:19.717720 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 8 23:22:19.717834 systemd[1]: Reached target paths.target. Feb 8 23:22:19.719109 systemd[1]: Reached target timers.target. Feb 8 23:22:19.722106 systemd[1]: Listening on dbus.socket. Feb 8 23:22:19.726102 systemd[1]: Starting docker.socket... Feb 8 23:22:19.734012 systemd[1]: Listening on sshd.socket. Feb 8 23:22:19.735671 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 8 23:22:19.736811 systemd[1]: Listening on docker.socket. Feb 8 23:22:19.738157 systemd[1]: Reached target sockets.target. Feb 8 23:22:19.739364 systemd[1]: Reached target basic.target. Feb 8 23:22:19.740679 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 8 23:22:19.740767 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 8 23:22:19.743185 systemd[1]: Starting containerd.service... Feb 8 23:22:19.746619 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 8 23:22:19.753538 systemd[1]: Starting dbus.service... Feb 8 23:22:19.757230 systemd[1]: Starting enable-oem-cloudinit.service... Feb 8 23:22:19.761669 systemd[1]: Starting extend-filesystems.service... Feb 8 23:22:19.763498 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 8 23:22:19.769856 systemd[1]: Starting motdgen.service... Feb 8 23:22:19.777080 systemd[1]: Starting prepare-cni-plugins.service... Feb 8 23:22:19.780872 jq[1038]: false Feb 8 23:22:19.782725 systemd[1]: Starting prepare-critools.service... Feb 8 23:22:19.788544 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 8 23:22:19.792967 systemd[1]: Starting sshd-keygen.service... Feb 8 23:22:19.802035 systemd[1]: Starting systemd-logind.service... Feb 8 23:22:19.802659 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 8 23:22:19.802743 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 8 23:22:19.803226 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 8 23:22:19.803985 systemd[1]: Starting update-engine.service... Feb 8 23:22:19.805474 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 8 23:22:19.811239 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 8 23:22:19.811457 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 8 23:22:19.813262 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 8 23:22:19.814053 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 8 23:22:19.835565 jq[1052]: true Feb 8 23:22:19.841062 extend-filesystems[1039]: Found vda Feb 8 23:22:19.845144 tar[1055]: ./ Feb 8 23:22:19.845144 tar[1055]: ./loopback Feb 8 23:22:19.845364 tar[1056]: crictl Feb 8 23:22:19.852819 extend-filesystems[1039]: Found vda1 Feb 8 23:22:19.853563 extend-filesystems[1039]: Found vda2 Feb 8 23:22:19.854098 extend-filesystems[1039]: Found vda3 Feb 8 23:22:19.856957 systemd[1]: motdgen.service: Deactivated successfully. Feb 8 23:22:19.857147 systemd[1]: Finished motdgen.service. Feb 8 23:22:19.857959 extend-filesystems[1039]: Found usr Feb 8 23:22:19.869054 extend-filesystems[1039]: Found vda4 Feb 8 23:22:19.869054 extend-filesystems[1039]: Found vda6 Feb 8 23:22:19.869054 extend-filesystems[1039]: Found vda7 Feb 8 23:22:19.877028 jq[1065]: true Feb 8 23:22:19.879687 extend-filesystems[1039]: Found vda9 Feb 8 23:22:19.879687 extend-filesystems[1039]: Checking size of /dev/vda9 Feb 8 23:22:19.885837 dbus-daemon[1036]: [system] SELinux support is enabled Feb 8 23:22:19.886019 systemd[1]: Started dbus.service. Feb 8 23:22:19.891201 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 8 23:22:19.891237 systemd[1]: Reached target system-config.target. Feb 8 23:22:19.891722 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 8 23:22:19.891739 systemd[1]: Reached target user-config.target. Feb 8 23:22:19.961580 extend-filesystems[1039]: Resized partition /dev/vda9 Feb 8 23:22:19.963285 extend-filesystems[1090]: resize2fs 1.46.5 (30-Dec-2021) Feb 8 23:22:19.993980 tar[1055]: ./bandwidth Feb 8 23:22:19.997641 systemd-logind[1050]: Watching system buttons on /dev/input/event1 (Power Button) Feb 8 23:22:20.003000 systemd-logind[1050]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 8 23:22:20.003463 systemd-logind[1050]: New seat seat0. Feb 8 23:22:20.005640 systemd[1]: Started systemd-logind.service. Feb 8 23:22:20.008062 bash[1086]: Updated "/home/core/.ssh/authorized_keys" Feb 8 23:22:20.008958 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 8 23:22:20.012494 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Feb 8 23:22:20.022169 update_engine[1051]: I0208 23:22:20.020406 1051 main.cc:92] Flatcar Update Engine starting Feb 8 23:22:20.027947 systemd[1]: Started update-engine.service. Feb 8 23:22:20.028238 update_engine[1051]: I0208 23:22:20.027988 1051 update_check_scheduler.cc:74] Next update check in 5m10s Feb 8 23:22:20.033462 systemd[1]: Started locksmithd.service. Feb 8 23:22:20.043729 env[1057]: time="2024-02-08T23:22:20.043673487Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 8 23:22:20.105627 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Feb 8 23:22:20.184071 coreos-metadata[1034]: Feb 08 23:22:20.109 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Feb 8 23:22:20.184071 coreos-metadata[1034]: Feb 08 23:22:20.132 INFO Fetch successful Feb 8 23:22:20.184071 coreos-metadata[1034]: Feb 08 23:22:20.132 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 8 23:22:20.184071 coreos-metadata[1034]: Feb 08 23:22:20.147 INFO Fetch successful Feb 8 23:22:20.185160 env[1057]: time="2024-02-08T23:22:20.133277849Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 8 23:22:20.185767 extend-filesystems[1090]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 8 23:22:20.185767 extend-filesystems[1090]: old_desc_blocks = 1, new_desc_blocks = 3 Feb 8 23:22:20.185767 extend-filesystems[1090]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Feb 8 23:22:20.188341 extend-filesystems[1039]: Resized filesystem in /dev/vda9 Feb 8 23:22:20.189547 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 8 23:22:20.189931 systemd[1]: Finished extend-filesystems.service. Feb 8 23:22:20.192756 unknown[1034]: wrote ssh authorized keys file for user: core Feb 8 23:22:20.195426 env[1057]: time="2024-02-08T23:22:20.195358781Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:22:20.197647 env[1057]: time="2024-02-08T23:22:20.197592068Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 8 23:22:20.197808 env[1057]: time="2024-02-08T23:22:20.197788411Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:22:20.198192 env[1057]: time="2024-02-08T23:22:20.198167107Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 8 23:22:20.198324 env[1057]: time="2024-02-08T23:22:20.198307675Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 8 23:22:20.198419 env[1057]: time="2024-02-08T23:22:20.198401482Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 8 23:22:20.198503 env[1057]: time="2024-02-08T23:22:20.198488007Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 8 23:22:20.198647 env[1057]: time="2024-02-08T23:22:20.198629687Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:22:20.199002 env[1057]: time="2024-02-08T23:22:20.198982478Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 8 23:22:20.199195 env[1057]: time="2024-02-08T23:22:20.199172469Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 8 23:22:20.199267 env[1057]: time="2024-02-08T23:22:20.199252477Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 8 23:22:20.199380 env[1057]: time="2024-02-08T23:22:20.199360889Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 8 23:22:20.199466 env[1057]: time="2024-02-08T23:22:20.199449738Z" level=info msg="metadata content store policy set" policy=shared Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.224617622Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.224680161Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.224699701Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.224758027Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.224779382Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.224848121Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.224871027Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.224888661Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.224907671Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.224924652Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.224942469Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.224958919Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.225091175Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 8 23:22:20.237551 env[1057]: time="2024-02-08T23:22:20.225189460Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 8 23:22:20.236589 systemd[1]: Started containerd.service. Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.225610633Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.225647154Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.225667204Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.225743857Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.225763408Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.225781316Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.225863416Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.225881406Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.225900641Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.225914847Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.225929901Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.225947004Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.226108846Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.226134719Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 8 23:22:20.238141 env[1057]: time="2024-02-08T23:22:20.226150732Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 8 23:22:20.238564 env[1057]: time="2024-02-08T23:22:20.226166121Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 8 23:22:20.238564 env[1057]: time="2024-02-08T23:22:20.226185631Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 8 23:22:20.238564 env[1057]: time="2024-02-08T23:22:20.226201357Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 8 23:22:20.238564 env[1057]: time="2024-02-08T23:22:20.226226202Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 8 23:22:20.238564 env[1057]: time="2024-02-08T23:22:20.226274033Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 8 23:22:20.238714 env[1057]: time="2024-02-08T23:22:20.226944165Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 8 23:22:20.238714 env[1057]: time="2024-02-08T23:22:20.227030619Z" level=info msg="Connect containerd service" Feb 8 23:22:20.238714 env[1057]: time="2024-02-08T23:22:20.227078074Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 8 23:22:20.238714 env[1057]: time="2024-02-08T23:22:20.236022296Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 8 23:22:20.238714 env[1057]: time="2024-02-08T23:22:20.236336740Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 8 23:22:20.238714 env[1057]: time="2024-02-08T23:22:20.236380206Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 8 23:22:20.238714 env[1057]: time="2024-02-08T23:22:20.236460317Z" level=info msg="containerd successfully booted in 0.193817s" Feb 8 23:22:20.245868 env[1057]: time="2024-02-08T23:22:20.242964097Z" level=info msg="Start subscribing containerd event" Feb 8 23:22:20.245868 env[1057]: time="2024-02-08T23:22:20.243122309Z" level=info msg="Start recovering state" Feb 8 23:22:20.245868 env[1057]: time="2024-02-08T23:22:20.243283682Z" level=info msg="Start event monitor" Feb 8 23:22:20.245868 env[1057]: time="2024-02-08T23:22:20.243316481Z" level=info msg="Start snapshots syncer" Feb 8 23:22:20.245868 env[1057]: time="2024-02-08T23:22:20.243349036Z" level=info msg="Start cni network conf syncer for default" Feb 8 23:22:20.245868 env[1057]: time="2024-02-08T23:22:20.243365996Z" level=info msg="Start streaming server" Feb 8 23:22:20.253104 update-ssh-keys[1098]: Updated "/home/core/.ssh/authorized_keys" Feb 8 23:22:20.253494 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 8 23:22:20.263787 tar[1055]: ./ptp Feb 8 23:22:20.344767 tar[1055]: ./vlan Feb 8 23:22:20.420816 tar[1055]: ./host-device Feb 8 23:22:20.486864 tar[1055]: ./tuning Feb 8 23:22:20.552636 tar[1055]: ./vrf Feb 8 23:22:20.624900 tar[1055]: ./sbr Feb 8 23:22:20.685973 tar[1055]: ./tap Feb 8 23:22:20.752543 tar[1055]: ./dhcp Feb 8 23:22:20.942266 tar[1055]: ./static Feb 8 23:22:20.973104 systemd[1]: Finished prepare-critools.service. Feb 8 23:22:20.990846 tar[1055]: ./firewall Feb 8 23:22:20.998942 sshd_keygen[1066]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 8 23:22:21.021758 systemd[1]: Finished sshd-keygen.service. Feb 8 23:22:21.023908 systemd[1]: Starting issuegen.service... Feb 8 23:22:21.030093 systemd[1]: issuegen.service: Deactivated successfully. Feb 8 23:22:21.030253 systemd[1]: Finished issuegen.service. Feb 8 23:22:21.032135 systemd[1]: Starting systemd-user-sessions.service... Feb 8 23:22:21.039483 systemd[1]: Finished systemd-user-sessions.service. Feb 8 23:22:21.041403 systemd[1]: Started getty@tty1.service. Feb 8 23:22:21.043010 systemd[1]: Started serial-getty@ttyS0.service. Feb 8 23:22:21.043810 systemd[1]: Reached target getty.target. Feb 8 23:22:21.053710 tar[1055]: ./macvlan Feb 8 23:22:21.070168 locksmithd[1093]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 8 23:22:21.097974 tar[1055]: ./dummy Feb 8 23:22:21.139309 tar[1055]: ./bridge Feb 8 23:22:21.184308 tar[1055]: ./ipvlan Feb 8 23:22:21.225584 tar[1055]: ./portmap Feb 8 23:22:21.264415 tar[1055]: ./host-local Feb 8 23:22:21.315947 systemd[1]: Finished prepare-cni-plugins.service. Feb 8 23:22:21.317930 systemd[1]: Reached target multi-user.target. Feb 8 23:22:21.321970 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 8 23:22:21.333700 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 8 23:22:21.334034 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 8 23:22:21.337226 systemd[1]: Startup finished in 966ms (kernel) + 10.764s (initrd) + 7.806s (userspace) = 19.537s. Feb 8 23:22:22.010260 systemd[1]: Created slice system-sshd.slice. Feb 8 23:22:22.013331 systemd[1]: Started sshd@0-172.24.4.245:22-172.24.4.1:50022.service. Feb 8 23:22:23.032358 sshd[1122]: Accepted publickey for core from 172.24.4.1 port 50022 ssh2: RSA SHA256:hSCdy28aHh0WFAXHFi8tWlQhiCOOiQrn91fhtzGNenI Feb 8 23:22:23.037277 sshd[1122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:22:23.069413 systemd-logind[1050]: New session 1 of user core. Feb 8 23:22:23.073255 systemd[1]: Created slice user-500.slice. Feb 8 23:22:23.075886 systemd[1]: Starting user-runtime-dir@500.service... Feb 8 23:22:23.098638 systemd[1]: Finished user-runtime-dir@500.service. Feb 8 23:22:23.102403 systemd[1]: Starting user@500.service... Feb 8 23:22:23.110396 (systemd)[1125]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:22:23.243651 systemd[1125]: Queued start job for default target default.target. Feb 8 23:22:23.244316 systemd[1125]: Reached target paths.target. Feb 8 23:22:23.244356 systemd[1125]: Reached target sockets.target. Feb 8 23:22:23.244474 systemd[1125]: Reached target timers.target. Feb 8 23:22:23.244494 systemd[1125]: Reached target basic.target. Feb 8 23:22:23.244624 systemd[1]: Started user@500.service. Feb 8 23:22:23.245772 systemd[1]: Started session-1.scope. Feb 8 23:22:23.246179 systemd[1125]: Reached target default.target. Feb 8 23:22:23.246331 systemd[1125]: Startup finished in 122ms. Feb 8 23:22:23.781686 systemd[1]: Started sshd@1-172.24.4.245:22-172.24.4.1:50026.service. Feb 8 23:22:25.527707 sshd[1134]: Accepted publickey for core from 172.24.4.1 port 50026 ssh2: RSA SHA256:hSCdy28aHh0WFAXHFi8tWlQhiCOOiQrn91fhtzGNenI Feb 8 23:22:25.530774 sshd[1134]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:22:25.543886 systemd[1]: Started session-2.scope. Feb 8 23:22:25.547300 systemd-logind[1050]: New session 2 of user core. Feb 8 23:22:26.171418 sshd[1134]: pam_unix(sshd:session): session closed for user core Feb 8 23:22:26.178518 systemd[1]: Started sshd@2-172.24.4.245:22-172.24.4.1:49532.service. Feb 8 23:22:26.185028 systemd[1]: sshd@1-172.24.4.245:22-172.24.4.1:50026.service: Deactivated successfully. Feb 8 23:22:26.186874 systemd[1]: session-2.scope: Deactivated successfully. Feb 8 23:22:26.189132 systemd-logind[1050]: Session 2 logged out. Waiting for processes to exit. Feb 8 23:22:26.191871 systemd-logind[1050]: Removed session 2. Feb 8 23:22:27.504450 sshd[1139]: Accepted publickey for core from 172.24.4.1 port 49532 ssh2: RSA SHA256:hSCdy28aHh0WFAXHFi8tWlQhiCOOiQrn91fhtzGNenI Feb 8 23:22:27.507256 sshd[1139]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:22:27.516822 systemd-logind[1050]: New session 3 of user core. Feb 8 23:22:27.517870 systemd[1]: Started session-3.scope. Feb 8 23:22:28.146736 sshd[1139]: pam_unix(sshd:session): session closed for user core Feb 8 23:22:28.155779 systemd[1]: sshd@2-172.24.4.245:22-172.24.4.1:49532.service: Deactivated successfully. Feb 8 23:22:28.157631 systemd[1]: session-3.scope: Deactivated successfully. Feb 8 23:22:28.160064 systemd-logind[1050]: Session 3 logged out. Waiting for processes to exit. Feb 8 23:22:28.163750 systemd[1]: Started sshd@3-172.24.4.245:22-172.24.4.1:49544.service. Feb 8 23:22:28.168381 systemd-logind[1050]: Removed session 3. Feb 8 23:22:29.469952 sshd[1146]: Accepted publickey for core from 172.24.4.1 port 49544 ssh2: RSA SHA256:hSCdy28aHh0WFAXHFi8tWlQhiCOOiQrn91fhtzGNenI Feb 8 23:22:29.473414 sshd[1146]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:22:29.484091 systemd[1]: Started session-4.scope. Feb 8 23:22:29.485507 systemd-logind[1050]: New session 4 of user core. Feb 8 23:22:30.113208 sshd[1146]: pam_unix(sshd:session): session closed for user core Feb 8 23:22:30.120032 systemd[1]: Started sshd@4-172.24.4.245:22-172.24.4.1:49560.service. Feb 8 23:22:30.124272 systemd[1]: sshd@3-172.24.4.245:22-172.24.4.1:49544.service: Deactivated successfully. Feb 8 23:22:30.125744 systemd[1]: session-4.scope: Deactivated successfully. Feb 8 23:22:30.128196 systemd-logind[1050]: Session 4 logged out. Waiting for processes to exit. Feb 8 23:22:30.130335 systemd-logind[1050]: Removed session 4. Feb 8 23:22:31.379816 sshd[1151]: Accepted publickey for core from 172.24.4.1 port 49560 ssh2: RSA SHA256:hSCdy28aHh0WFAXHFi8tWlQhiCOOiQrn91fhtzGNenI Feb 8 23:22:31.383941 sshd[1151]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:22:31.394922 systemd-logind[1050]: New session 5 of user core. Feb 8 23:22:31.395946 systemd[1]: Started session-5.scope. Feb 8 23:22:31.848941 sudo[1155]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 8 23:22:31.849484 sudo[1155]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:22:31.864762 dbus-daemon[1036]: Э\u000b\u0008\x95U: received setenforce notice (enforcing=-926360176) Feb 8 23:22:31.867809 sudo[1155]: pam_unix(sudo:session): session closed for user root Feb 8 23:22:32.091931 sshd[1151]: pam_unix(sshd:session): session closed for user core Feb 8 23:22:32.100238 systemd[1]: Started sshd@5-172.24.4.245:22-172.24.4.1:49564.service. Feb 8 23:22:32.101648 systemd[1]: sshd@4-172.24.4.245:22-172.24.4.1:49560.service: Deactivated successfully. Feb 8 23:22:32.103197 systemd[1]: session-5.scope: Deactivated successfully. Feb 8 23:22:32.109158 systemd-logind[1050]: Session 5 logged out. Waiting for processes to exit. Feb 8 23:22:32.111903 systemd-logind[1050]: Removed session 5. Feb 8 23:22:33.692275 sshd[1158]: Accepted publickey for core from 172.24.4.1 port 49564 ssh2: RSA SHA256:hSCdy28aHh0WFAXHFi8tWlQhiCOOiQrn91fhtzGNenI Feb 8 23:22:33.694836 sshd[1158]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:22:33.704578 systemd-logind[1050]: New session 6 of user core. Feb 8 23:22:33.705323 systemd[1]: Started session-6.scope. Feb 8 23:22:34.157550 sudo[1163]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 8 23:22:34.158680 sudo[1163]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:22:34.165338 sudo[1163]: pam_unix(sudo:session): session closed for user root Feb 8 23:22:34.175261 sudo[1162]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 8 23:22:34.175795 sudo[1162]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:22:34.197347 systemd[1]: Stopping audit-rules.service... Feb 8 23:22:34.197000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 8 23:22:34.201166 kernel: kauditd_printk_skb: 124 callbacks suppressed Feb 8 23:22:34.201314 kernel: audit: type=1305 audit(1707434554.197:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 8 23:22:34.197000 audit[1166]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeefafe8d0 a2=420 a3=0 items=0 ppid=1 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:34.207763 auditctl[1166]: No rules Feb 8 23:22:34.217498 kernel: audit: type=1300 audit(1707434554.197:164): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffeefafe8d0 a2=420 a3=0 items=0 ppid=1 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:34.197000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 8 23:22:34.217723 systemd[1]: audit-rules.service: Deactivated successfully. Feb 8 23:22:34.218085 systemd[1]: Stopped audit-rules.service. Feb 8 23:22:34.221537 kernel: audit: type=1327 audit(1707434554.197:164): proctitle=2F7362696E2F617564697463746C002D44 Feb 8 23:22:34.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:34.226601 systemd[1]: Starting audit-rules.service... Feb 8 23:22:34.230476 kernel: audit: type=1131 audit(1707434554.216:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:34.264951 augenrules[1183]: No rules Feb 8 23:22:34.266700 systemd[1]: Finished audit-rules.service. Feb 8 23:22:34.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:34.268276 sudo[1162]: pam_unix(sudo:session): session closed for user root Feb 8 23:22:34.266000 audit[1162]: USER_END pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:22:34.288106 kernel: audit: type=1130 audit(1707434554.265:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:34.288269 kernel: audit: type=1106 audit(1707434554.266:167): pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:22:34.288331 kernel: audit: type=1104 audit(1707434554.267:168): pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:22:34.267000 audit[1162]: CRED_DISP pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:22:34.425265 sshd[1158]: pam_unix(sshd:session): session closed for user core Feb 8 23:22:34.443536 kernel: audit: type=1106 audit(1707434554.430:169): pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 8 23:22:34.430000 audit[1158]: USER_END pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 8 23:22:34.434563 systemd[1]: Started sshd@6-172.24.4.245:22-172.24.4.1:49578.service. Feb 8 23:22:34.435702 systemd[1]: sshd@5-172.24.4.245:22-172.24.4.1:49564.service: Deactivated successfully. Feb 8 23:22:34.445386 systemd[1]: session-6.scope: Deactivated successfully. Feb 8 23:22:34.430000 audit[1158]: CRED_DISP pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 8 23:22:34.456894 kernel: audit: type=1104 audit(1707434554.430:170): pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 8 23:22:34.457032 kernel: audit: type=1130 audit(1707434554.430:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.245:22-172.24.4.1:49578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:34.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.245:22-172.24.4.1:49578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:34.466195 systemd-logind[1050]: Session 6 logged out. Waiting for processes to exit. Feb 8 23:22:34.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.245:22-172.24.4.1:49564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:34.468354 systemd-logind[1050]: Removed session 6. Feb 8 23:22:35.877000 audit[1188]: USER_ACCT pid=1188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 8 23:22:35.878729 sshd[1188]: Accepted publickey for core from 172.24.4.1 port 49578 ssh2: RSA SHA256:hSCdy28aHh0WFAXHFi8tWlQhiCOOiQrn91fhtzGNenI Feb 8 23:22:35.880000 audit[1188]: CRED_ACQ pid=1188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 8 23:22:35.880000 audit[1188]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1ea4c6e0 a2=3 a3=0 items=0 ppid=1 pid=1188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:35.880000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 8 23:22:35.882025 sshd[1188]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 8 23:22:35.892043 systemd-logind[1050]: New session 7 of user core. Feb 8 23:22:35.892807 systemd[1]: Started session-7.scope. Feb 8 23:22:35.903000 audit[1188]: USER_START pid=1188 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 8 23:22:35.906000 audit[1191]: CRED_ACQ pid=1191 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 8 23:22:36.398000 audit[1192]: USER_ACCT pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:22:36.399535 sudo[1192]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 8 23:22:36.400000 audit[1192]: CRED_REFR pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:22:36.401086 sudo[1192]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 8 23:22:36.404000 audit[1192]: USER_START pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:22:37.049348 systemd[1]: Reloading. Feb 8 23:22:37.194206 /usr/lib/systemd/system-generators/torcx-generator[1221]: time="2024-02-08T23:22:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 8 23:22:37.194237 /usr/lib/systemd/system-generators/torcx-generator[1221]: time="2024-02-08T23:22:37Z" level=info msg="torcx already run" Feb 8 23:22:37.280375 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 8 23:22:37.280395 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 8 23:22:37.305536 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 8 23:22:37.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.371000 audit: BPF prog-id=31 op=LOAD Feb 8 23:22:37.371000 audit: BPF prog-id=20 op=UNLOAD Feb 8 23:22:37.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.373000 audit: BPF prog-id=32 op=LOAD Feb 8 23:22:37.373000 audit: BPF prog-id=25 op=UNLOAD Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit: BPF prog-id=33 op=LOAD Feb 8 23:22:37.374000 audit: BPF prog-id=15 op=UNLOAD Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit: BPF prog-id=34 op=LOAD Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.374000 audit: BPF prog-id=35 op=LOAD Feb 8 23:22:37.374000 audit: BPF prog-id=16 op=UNLOAD Feb 8 23:22:37.374000 audit: BPF prog-id=17 op=UNLOAD Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit: BPF prog-id=36 op=LOAD Feb 8 23:22:37.377000 audit: BPF prog-id=26 op=UNLOAD Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit: BPF prog-id=37 op=LOAD Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.377000 audit: BPF prog-id=38 op=LOAD Feb 8 23:22:37.377000 audit: BPF prog-id=27 op=UNLOAD Feb 8 23:22:37.377000 audit: BPF prog-id=28 op=UNLOAD Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit: BPF prog-id=39 op=LOAD Feb 8 23:22:37.378000 audit: BPF prog-id=21 op=UNLOAD Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit: BPF prog-id=40 op=LOAD Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.378000 audit: BPF prog-id=41 op=LOAD Feb 8 23:22:37.378000 audit: BPF prog-id=22 op=UNLOAD Feb 8 23:22:37.378000 audit: BPF prog-id=23 op=UNLOAD Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit: BPF prog-id=42 op=LOAD Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit: BPF prog-id=43 op=LOAD Feb 8 23:22:37.379000 audit: BPF prog-id=18 op=UNLOAD Feb 8 23:22:37.379000 audit: BPF prog-id=19 op=UNLOAD Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.380000 audit: BPF prog-id=44 op=LOAD Feb 8 23:22:37.380000 audit: BPF prog-id=24 op=UNLOAD Feb 8 23:22:37.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:37.382000 audit: BPF prog-id=45 op=LOAD Feb 8 23:22:37.382000 audit: BPF prog-id=29 op=UNLOAD Feb 8 23:22:37.396542 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 8 23:22:37.403148 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 8 23:22:37.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:37.403923 systemd[1]: Reached target network-online.target. Feb 8 23:22:37.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:37.405433 systemd[1]: Started kubelet.service. Feb 8 23:22:37.416936 systemd[1]: Starting coreos-metadata.service... Feb 8 23:22:37.459607 coreos-metadata[1275]: Feb 08 23:22:37.459 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Feb 8 23:22:37.468235 kubelet[1268]: E0208 23:22:37.468144 1268 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 8 23:22:37.470068 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 8 23:22:37.470200 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 8 23:22:37.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 8 23:22:37.675536 coreos-metadata[1275]: Feb 08 23:22:37.675 INFO Fetch successful Feb 8 23:22:37.675536 coreos-metadata[1275]: Feb 08 23:22:37.675 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Feb 8 23:22:37.694744 coreos-metadata[1275]: Feb 08 23:22:37.694 INFO Fetch successful Feb 8 23:22:37.694744 coreos-metadata[1275]: Feb 08 23:22:37.694 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Feb 8 23:22:37.713723 coreos-metadata[1275]: Feb 08 23:22:37.713 INFO Fetch successful Feb 8 23:22:37.713723 coreos-metadata[1275]: Feb 08 23:22:37.713 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Feb 8 23:22:37.730128 coreos-metadata[1275]: Feb 08 23:22:37.730 INFO Fetch successful Feb 8 23:22:37.730128 coreos-metadata[1275]: Feb 08 23:22:37.730 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Feb 8 23:22:37.748977 coreos-metadata[1275]: Feb 08 23:22:37.748 INFO Fetch successful Feb 8 23:22:37.767262 systemd[1]: Finished coreos-metadata.service. Feb 8 23:22:37.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:38.437634 systemd[1]: Stopped kubelet.service. Feb 8 23:22:38.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:38.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:38.485640 systemd[1]: Reloading. Feb 8 23:22:38.634921 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-08T23:22:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 8 23:22:38.634956 /usr/lib/systemd/system-generators/torcx-generator[1335]: time="2024-02-08T23:22:38Z" level=info msg="torcx already run" Feb 8 23:22:38.705401 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 8 23:22:38.705631 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 8 23:22:38.732971 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 8 23:22:38.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.807000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.807000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.809000 audit: BPF prog-id=46 op=LOAD Feb 8 23:22:38.809000 audit: BPF prog-id=31 op=UNLOAD Feb 8 23:22:38.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.814000 audit: BPF prog-id=47 op=LOAD Feb 8 23:22:38.814000 audit: BPF prog-id=32 op=UNLOAD Feb 8 23:22:38.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.817000 audit: BPF prog-id=48 op=LOAD Feb 8 23:22:38.817000 audit: BPF prog-id=33 op=UNLOAD Feb 8 23:22:38.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.817000 audit: BPF prog-id=49 op=LOAD Feb 8 23:22:38.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.818000 audit: BPF prog-id=50 op=LOAD Feb 8 23:22:38.818000 audit: BPF prog-id=34 op=UNLOAD Feb 8 23:22:38.818000 audit: BPF prog-id=35 op=UNLOAD Feb 8 23:22:38.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.829000 audit: BPF prog-id=51 op=LOAD Feb 8 23:22:38.829000 audit: BPF prog-id=36 op=UNLOAD Feb 8 23:22:38.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.830000 audit: BPF prog-id=52 op=LOAD Feb 8 23:22:38.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.831000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.831000 audit: BPF prog-id=53 op=LOAD Feb 8 23:22:38.831000 audit: BPF prog-id=37 op=UNLOAD Feb 8 23:22:38.831000 audit: BPF prog-id=38 op=UNLOAD Feb 8 23:22:38.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.833000 audit: BPF prog-id=54 op=LOAD Feb 8 23:22:38.833000 audit: BPF prog-id=39 op=UNLOAD Feb 8 23:22:38.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.834000 audit: BPF prog-id=55 op=LOAD Feb 8 23:22:38.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.834000 audit: BPF prog-id=56 op=LOAD Feb 8 23:22:38.835000 audit: BPF prog-id=40 op=UNLOAD Feb 8 23:22:38.835000 audit: BPF prog-id=41 op=UNLOAD Feb 8 23:22:38.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.836000 audit: BPF prog-id=57 op=LOAD Feb 8 23:22:38.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.837000 audit: BPF prog-id=58 op=LOAD Feb 8 23:22:38.837000 audit: BPF prog-id=42 op=UNLOAD Feb 8 23:22:38.837000 audit: BPF prog-id=43 op=UNLOAD Feb 8 23:22:38.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.840000 audit: BPF prog-id=59 op=LOAD Feb 8 23:22:38.840000 audit: BPF prog-id=44 op=UNLOAD Feb 8 23:22:38.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:38.848000 audit: BPF prog-id=60 op=LOAD Feb 8 23:22:38.848000 audit: BPF prog-id=45 op=UNLOAD Feb 8 23:22:38.886798 systemd[1]: Started kubelet.service. Feb 8 23:22:38.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:38.941944 kubelet[1378]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 8 23:22:38.941944 kubelet[1378]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 8 23:22:38.941944 kubelet[1378]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 8 23:22:38.942393 kubelet[1378]: I0208 23:22:38.941983 1378 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 8 23:22:39.633447 kubelet[1378]: I0208 23:22:39.633375 1378 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 8 23:22:39.633587 kubelet[1378]: I0208 23:22:39.633476 1378 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 8 23:22:39.634025 kubelet[1378]: I0208 23:22:39.633987 1378 server.go:895] "Client rotation is on, will bootstrap in background" Feb 8 23:22:39.638552 kubelet[1378]: I0208 23:22:39.638533 1378 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 8 23:22:39.663244 kubelet[1378]: I0208 23:22:39.663222 1378 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 8 23:22:39.663599 kubelet[1378]: I0208 23:22:39.663585 1378 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 8 23:22:39.663840 kubelet[1378]: I0208 23:22:39.663823 1378 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 8 23:22:39.663970 kubelet[1378]: I0208 23:22:39.663959 1378 topology_manager.go:138] "Creating topology manager with none policy" Feb 8 23:22:39.664031 kubelet[1378]: I0208 23:22:39.664022 1378 container_manager_linux.go:301] "Creating device plugin manager" Feb 8 23:22:39.664178 kubelet[1378]: I0208 23:22:39.664166 1378 state_mem.go:36] "Initialized new in-memory state store" Feb 8 23:22:39.664323 kubelet[1378]: I0208 23:22:39.664312 1378 kubelet.go:393] "Attempting to sync node with API server" Feb 8 23:22:39.664512 kubelet[1378]: I0208 23:22:39.664500 1378 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 8 23:22:39.664595 kubelet[1378]: I0208 23:22:39.664585 1378 kubelet.go:309] "Adding apiserver pod source" Feb 8 23:22:39.664663 kubelet[1378]: I0208 23:22:39.664654 1378 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 8 23:22:39.665011 kubelet[1378]: E0208 23:22:39.664997 1378 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:39.665140 kubelet[1378]: E0208 23:22:39.665128 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:39.666169 kubelet[1378]: I0208 23:22:39.666148 1378 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 8 23:22:39.666550 kubelet[1378]: W0208 23:22:39.666538 1378 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 8 23:22:39.667306 kubelet[1378]: I0208 23:22:39.667292 1378 server.go:1232] "Started kubelet" Feb 8 23:22:39.667653 kubelet[1378]: I0208 23:22:39.667564 1378 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 8 23:22:39.667756 kubelet[1378]: I0208 23:22:39.667744 1378 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 8 23:22:39.668134 kubelet[1378]: I0208 23:22:39.668120 1378 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 8 23:22:39.669410 kubelet[1378]: I0208 23:22:39.669368 1378 server.go:462] "Adding debug handlers to kubelet server" Feb 8 23:22:39.668000 audit[1378]: AVC avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:39.672555 kubelet[1378]: I0208 23:22:39.670536 1378 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 8 23:22:39.672555 kubelet[1378]: I0208 23:22:39.670579 1378 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 8 23:22:39.672555 kubelet[1378]: I0208 23:22:39.670667 1378 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 8 23:22:39.673143 kernel: kauditd_printk_skb: 362 callbacks suppressed Feb 8 23:22:39.673195 kernel: audit: type=1400 audit(1707434559.668:532): avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:39.677158 kubelet[1378]: I0208 23:22:39.677145 1378 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 8 23:22:39.677322 kubelet[1378]: I0208 23:22:39.677309 1378 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 8 23:22:39.677443 kubelet[1378]: I0208 23:22:39.677431 1378 reconciler_new.go:29] "Reconciler: start to sync state" Feb 8 23:22:39.679774 kubelet[1378]: E0208 23:22:39.679760 1378 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 8 23:22:39.679867 kubelet[1378]: E0208 23:22:39.679858 1378 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 8 23:22:39.668000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:22:39.687031 kernel: audit: type=1401 audit(1707434559.668:532): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:22:39.668000 audit[1378]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00020d2c0 a1=c00020a960 a2=c00020d290 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.699746 kernel: audit: type=1300 audit(1707434559.668:532): arch=c000003e syscall=188 success=no exit=-22 a0=c00020d2c0 a1=c00020a960 a2=c00020d290 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.668000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:22:39.709286 kubelet[1378]: I0208 23:22:39.709271 1378 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 8 23:22:39.709398 kubelet[1378]: I0208 23:22:39.709389 1378 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 8 23:22:39.709482 kubelet[1378]: I0208 23:22:39.709474 1378 state_mem.go:36] "Initialized new in-memory state store" Feb 8 23:22:39.712484 kubelet[1378]: W0208 23:22:39.712468 1378 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.24.4.245" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 8 23:22:39.712598 kubelet[1378]: E0208 23:22:39.712587 1378 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.245" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 8 23:22:39.712741 kubelet[1378]: E0208 23:22:39.712728 1378 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.245\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 8 23:22:39.712915 kubelet[1378]: W0208 23:22:39.712901 1378 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 8 23:22:39.712992 kubelet[1378]: E0208 23:22:39.712983 1378 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 8 23:22:39.713196 kubelet[1378]: E0208 23:22:39.713119 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af86318143", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 667274051, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 667274051, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:39.713565 kubelet[1378]: W0208 23:22:39.713549 1378 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 8 23:22:39.713648 kubelet[1378]: E0208 23:22:39.713638 1378 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 8 23:22:39.715446 kernel: audit: type=1327 audit(1707434559.668:532): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:22:39.716812 kubelet[1378]: E0208 23:22:39.716760 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af86f14fef", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 679844335, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 679844335, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:39.669000 audit[1378]: AVC avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:39.669000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:22:39.723956 kernel: audit: type=1400 audit(1707434559.669:533): avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:39.724004 kernel: audit: type=1401 audit(1707434559.669:533): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:22:39.724485 kubelet[1378]: E0208 23:22:39.724381 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af88a98efc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.245 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708696316, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708696316, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:39.669000 audit[1378]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d91380 a1=c00020a978 a2=c00020d350 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.669000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:22:39.730745 kubelet[1378]: E0208 23:22:39.730684 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af88a9a83b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.245 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708702779, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708702779, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:39.735454 kernel: audit: type=1300 audit(1707434559.669:533): arch=c000003e syscall=188 success=no exit=-22 a0=c000d91380 a1=c00020a978 a2=c00020d350 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.735523 kernel: audit: type=1327 audit(1707434559.669:533): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:22:39.735617 kubelet[1378]: I0208 23:22:39.735603 1378 policy_none.go:49] "None policy: Start" Feb 8 23:22:39.736197 kubelet[1378]: E0208 23:22:39.736139 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af88a9b2b1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.245 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708705457, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708705457, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:39.736864 kubelet[1378]: I0208 23:22:39.736838 1378 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 8 23:22:39.736969 kubelet[1378]: I0208 23:22:39.736958 1378 state_mem.go:35] "Initializing new in-memory state store" Feb 8 23:22:39.744804 systemd[1]: Created slice kubepods.slice. Feb 8 23:22:39.750008 systemd[1]: Created slice kubepods-burstable.slice. Feb 8 23:22:39.754760 systemd[1]: Created slice kubepods-besteffort.slice. Feb 8 23:22:39.754000 audit[1392]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:39.754000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffceb570330 a2=0 a3=7ffceb57031c items=0 ppid=1378 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.763203 kernel: audit: type=1325 audit(1707434559.754:534): table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:39.763273 kernel: audit: type=1300 audit(1707434559.754:534): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffceb570330 a2=0 a3=7ffceb57031c items=0 ppid=1378 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 8 23:22:39.756000 audit[1395]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:39.756000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffd4e6653c0 a2=0 a3=7ffd4e6653ac items=0 ppid=1378 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.756000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 8 23:22:39.769299 kubelet[1378]: I0208 23:22:39.769269 1378 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 8 23:22:39.769375 kubelet[1378]: I0208 23:22:39.769337 1378 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 8 23:22:39.768000 audit[1378]: AVC avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:39.768000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 8 23:22:39.768000 audit[1378]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e3b1a0 a1=c000f465b8 a2=c000e3b170 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.768000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 8 23:22:39.769621 kubelet[1378]: I0208 23:22:39.769547 1378 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 8 23:22:39.771028 kubelet[1378]: E0208 23:22:39.771006 1378 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.245\" not found" Feb 8 23:22:39.774031 kubelet[1378]: E0208 23:22:39.773960 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af8c706c9b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 772060827, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 772060827, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:39.758000 audit[1397]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:39.758000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4bca9a30 a2=0 a3=7ffd4bca9a1c items=0 ppid=1378 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:22:39.777789 kubelet[1378]: I0208 23:22:39.777762 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.245" Feb 8 23:22:39.778000 audit[1402]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:39.779580 kubelet[1378]: E0208 23:22:39.779498 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.245" Feb 8 23:22:39.778000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc55231a70 a2=0 a3=7ffc55231a5c items=0 ppid=1378 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.778000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:22:39.780376 kubelet[1378]: E0208 23:22:39.780306 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af88a98efc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.245 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708696316, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 777713929, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events "172.24.4.245.17b206af88a98efc" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:39.782728 kubelet[1378]: E0208 23:22:39.782657 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af88a9a83b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.245 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708702779, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 777719608, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events "172.24.4.245.17b206af88a9a83b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:39.784197 kubelet[1378]: E0208 23:22:39.784147 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af88a9b2b1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.245 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708705457, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 777723110, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events "172.24.4.245.17b206af88a9b2b1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:39.831000 audit[1407]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:39.831000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd508c7590 a2=0 a3=7ffd508c757c items=0 ppid=1378 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.831000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 8 23:22:39.833806 kubelet[1378]: I0208 23:22:39.833753 1378 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 8 23:22:39.834000 audit[1408]: NETFILTER_CFG table=mangle:7 family=10 entries=2 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:39.834000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc5ee476b0 a2=0 a3=7ffc5ee4769c items=0 ppid=1378 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.834000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 8 23:22:39.835121 kubelet[1378]: I0208 23:22:39.835105 1378 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 8 23:22:39.835240 kubelet[1378]: I0208 23:22:39.835227 1378 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 8 23:22:39.835344 kubelet[1378]: I0208 23:22:39.835333 1378 kubelet.go:2303] "Starting kubelet main sync loop" Feb 8 23:22:39.835507 kubelet[1378]: E0208 23:22:39.835491 1378 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 8 23:22:39.835000 audit[1410]: NETFILTER_CFG table=mangle:8 family=10 entries=1 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:39.835000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe25af3f50 a2=0 a3=7ffe25af3f3c items=0 ppid=1378 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.835000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 8 23:22:39.836000 audit[1411]: NETFILTER_CFG table=nat:9 family=10 entries=2 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:39.836000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdb68276a0 a2=0 a3=7ffdb682768c items=0 ppid=1378 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 8 23:22:39.837618 kubelet[1378]: W0208 23:22:39.837603 1378 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 8 23:22:39.837000 audit[1412]: NETFILTER_CFG table=filter:10 family=10 entries=2 op=nft_register_chain pid=1412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:39.837000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe1bf59f70 a2=0 a3=7ffe1bf59f5c items=0 ppid=1378 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.837000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 8 23:22:39.837983 kubelet[1378]: E0208 23:22:39.837969 1378 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 8 23:22:39.837000 audit[1409]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:39.837000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe5a842180 a2=0 a3=7ffe5a84216c items=0 ppid=1378 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.837000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 8 23:22:39.838000 audit[1414]: NETFILTER_CFG table=nat:12 family=2 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:39.838000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffd27812b0 a2=0 a3=7fffd278129c items=0 ppid=1378 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 8 23:22:39.840000 audit[1415]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_chain pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:39.840000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9c2339c0 a2=0 a3=7fff9c2339ac items=0 ppid=1378 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:39.840000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 8 23:22:39.916129 kubelet[1378]: E0208 23:22:39.915911 1378 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.245\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 8 23:22:39.981030 kubelet[1378]: I0208 23:22:39.980950 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.245" Feb 8 23:22:39.983932 kubelet[1378]: E0208 23:22:39.983787 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af88a98efc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.245 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708696316, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 980880699, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events "172.24.4.245.17b206af88a98efc" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:39.984640 kubelet[1378]: E0208 23:22:39.984516 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.245" Feb 8 23:22:39.986309 kubelet[1378]: E0208 23:22:39.986181 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af88a9a83b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.245 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708702779, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 980891685, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events "172.24.4.245.17b206af88a9a83b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:39.988494 kubelet[1378]: E0208 23:22:39.988325 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af88a9b2b1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.245 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708705457, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 980897775, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events "172.24.4.245.17b206af88a9b2b1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:40.319084 kubelet[1378]: E0208 23:22:40.319010 1378 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.245\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 8 23:22:40.386095 kubelet[1378]: I0208 23:22:40.386056 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.245" Feb 8 23:22:40.388644 kubelet[1378]: E0208 23:22:40.388602 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.245" Feb 8 23:22:40.388862 kubelet[1378]: E0208 23:22:40.388726 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af88a98efc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.245 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708696316, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 40, 385969165, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events "172.24.4.245.17b206af88a98efc" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:40.390733 kubelet[1378]: E0208 23:22:40.390615 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af88a9a83b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.245 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708702779, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 40, 385994113, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events "172.24.4.245.17b206af88a9a83b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:40.392345 kubelet[1378]: E0208 23:22:40.392203 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245.17b206af88a9b2b1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.245", UID:"172.24.4.245", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.245 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.245"}, FirstTimestamp:time.Date(2024, time.February, 8, 23, 22, 39, 708705457, time.Local), LastTimestamp:time.Date(2024, time.February, 8, 23, 22, 40, 385999941, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"172.24.4.245"}': 'events "172.24.4.245.17b206af88a9b2b1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 8 23:22:40.638917 kubelet[1378]: I0208 23:22:40.638709 1378 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 8 23:22:40.665658 kubelet[1378]: E0208 23:22:40.665615 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:41.113212 kubelet[1378]: E0208 23:22:41.113157 1378 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.24.4.245" not found Feb 8 23:22:41.147521 kubelet[1378]: E0208 23:22:41.147489 1378 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.24.4.245\" not found" node="172.24.4.245" Feb 8 23:22:41.190869 kubelet[1378]: I0208 23:22:41.190814 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.245" Feb 8 23:22:41.206347 kubelet[1378]: I0208 23:22:41.206311 1378 kubelet_node_status.go:73] "Successfully registered node" node="172.24.4.245" Feb 8 23:22:41.282700 kubelet[1378]: I0208 23:22:41.282644 1378 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 8 23:22:41.283523 env[1057]: time="2024-02-08T23:22:41.283366869Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 8 23:22:41.284262 kubelet[1378]: I0208 23:22:41.283892 1378 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 8 23:22:41.415000 audit[1192]: USER_END pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:22:41.415000 audit[1192]: CRED_DISP pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 8 23:22:41.415757 sudo[1192]: pam_unix(sudo:session): session closed for user root Feb 8 23:22:41.559406 sshd[1188]: pam_unix(sshd:session): session closed for user core Feb 8 23:22:41.561000 audit[1188]: USER_END pid=1188 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 8 23:22:41.562000 audit[1188]: CRED_DISP pid=1188 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 8 23:22:41.565485 systemd[1]: sshd@6-172.24.4.245:22-172.24.4.1:49578.service: Deactivated successfully. Feb 8 23:22:41.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.245:22-172.24.4.1:49578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 8 23:22:41.567314 systemd[1]: session-7.scope: Deactivated successfully. Feb 8 23:22:41.568988 systemd-logind[1050]: Session 7 logged out. Waiting for processes to exit. Feb 8 23:22:41.572087 systemd-logind[1050]: Removed session 7. Feb 8 23:22:41.665802 kubelet[1378]: I0208 23:22:41.665754 1378 apiserver.go:52] "Watching apiserver" Feb 8 23:22:41.666138 kubelet[1378]: E0208 23:22:41.666111 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:41.671693 kubelet[1378]: I0208 23:22:41.671041 1378 topology_manager.go:215] "Topology Admit Handler" podUID="66e8bc3f-53a7-4675-a077-ec4d3fb7482f" podNamespace="calico-system" podName="calico-node-fjvr4" Feb 8 23:22:41.672136 kubelet[1378]: I0208 23:22:41.672104 1378 topology_manager.go:215] "Topology Admit Handler" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" podNamespace="calico-system" podName="csi-node-driver-twvqb" Feb 8 23:22:41.672494 kubelet[1378]: I0208 23:22:41.672464 1378 topology_manager.go:215] "Topology Admit Handler" podUID="e2d2d2b1-25f4-44a5-91ac-2e5c3d66f589" podNamespace="kube-system" podName="kube-proxy-n2zg5" Feb 8 23:22:41.673280 kubelet[1378]: E0208 23:22:41.673218 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-twvqb" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" Feb 8 23:22:41.680022 kubelet[1378]: I0208 23:22:41.679984 1378 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 8 23:22:41.685127 systemd[1]: Created slice kubepods-besteffort-pode2d2d2b1_25f4_44a5_91ac_2e5c3d66f589.slice. Feb 8 23:22:41.691359 kubelet[1378]: I0208 23:22:41.691221 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/66e8bc3f-53a7-4675-a077-ec4d3fb7482f-cni-net-dir\") pod \"calico-node-fjvr4\" (UID: \"66e8bc3f-53a7-4675-a077-ec4d3fb7482f\") " pod="calico-system/calico-node-fjvr4" Feb 8 23:22:41.691551 kubelet[1378]: I0208 23:22:41.691465 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/66e8bc3f-53a7-4675-a077-ec4d3fb7482f-cni-log-dir\") pod \"calico-node-fjvr4\" (UID: \"66e8bc3f-53a7-4675-a077-ec4d3fb7482f\") " pod="calico-system/calico-node-fjvr4" Feb 8 23:22:41.691623 kubelet[1378]: I0208 23:22:41.691583 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hk5w2\" (UniqueName: \"kubernetes.io/projected/66e8bc3f-53a7-4675-a077-ec4d3fb7482f-kube-api-access-hk5w2\") pod \"calico-node-fjvr4\" (UID: \"66e8bc3f-53a7-4675-a077-ec4d3fb7482f\") " pod="calico-system/calico-node-fjvr4" Feb 8 23:22:41.691747 kubelet[1378]: I0208 23:22:41.691692 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e2d2d2b1-25f4-44a5-91ac-2e5c3d66f589-kube-proxy\") pod \"kube-proxy-n2zg5\" (UID: \"e2d2d2b1-25f4-44a5-91ac-2e5c3d66f589\") " pod="kube-system/kube-proxy-n2zg5" Feb 8 23:22:41.691896 kubelet[1378]: I0208 23:22:41.691816 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/66e8bc3f-53a7-4675-a077-ec4d3fb7482f-node-certs\") pod \"calico-node-fjvr4\" (UID: \"66e8bc3f-53a7-4675-a077-ec4d3fb7482f\") " pod="calico-system/calico-node-fjvr4" Feb 8 23:22:41.692005 kubelet[1378]: I0208 23:22:41.691929 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/66e8bc3f-53a7-4675-a077-ec4d3fb7482f-var-run-calico\") pod \"calico-node-fjvr4\" (UID: \"66e8bc3f-53a7-4675-a077-ec4d3fb7482f\") " pod="calico-system/calico-node-fjvr4" Feb 8 23:22:41.692111 kubelet[1378]: I0208 23:22:41.692070 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/66e8bc3f-53a7-4675-a077-ec4d3fb7482f-var-lib-calico\") pod \"calico-node-fjvr4\" (UID: \"66e8bc3f-53a7-4675-a077-ec4d3fb7482f\") " pod="calico-system/calico-node-fjvr4" Feb 8 23:22:41.692273 kubelet[1378]: I0208 23:22:41.692203 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/66e8bc3f-53a7-4675-a077-ec4d3fb7482f-cni-bin-dir\") pod \"calico-node-fjvr4\" (UID: \"66e8bc3f-53a7-4675-a077-ec4d3fb7482f\") " pod="calico-system/calico-node-fjvr4" Feb 8 23:22:41.692472 kubelet[1378]: I0208 23:22:41.692378 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e2d2d2b1-25f4-44a5-91ac-2e5c3d66f589-xtables-lock\") pod \"kube-proxy-n2zg5\" (UID: \"e2d2d2b1-25f4-44a5-91ac-2e5c3d66f589\") " pod="kube-system/kube-proxy-n2zg5" Feb 8 23:22:41.692593 kubelet[1378]: I0208 23:22:41.692516 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-92p24\" (UniqueName: \"kubernetes.io/projected/e2d2d2b1-25f4-44a5-91ac-2e5c3d66f589-kube-api-access-92p24\") pod \"kube-proxy-n2zg5\" (UID: \"e2d2d2b1-25f4-44a5-91ac-2e5c3d66f589\") " pod="kube-system/kube-proxy-n2zg5" Feb 8 23:22:41.692670 kubelet[1378]: I0208 23:22:41.692624 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/66e8bc3f-53a7-4675-a077-ec4d3fb7482f-xtables-lock\") pod \"calico-node-fjvr4\" (UID: \"66e8bc3f-53a7-4675-a077-ec4d3fb7482f\") " pod="calico-system/calico-node-fjvr4" Feb 8 23:22:41.692815 kubelet[1378]: I0208 23:22:41.692774 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ced5db52-feec-4fce-b6e1-2ee8d6daa1f6-kubelet-dir\") pod \"csi-node-driver-twvqb\" (UID: \"ced5db52-feec-4fce-b6e1-2ee8d6daa1f6\") " pod="calico-system/csi-node-driver-twvqb" Feb 8 23:22:41.692990 kubelet[1378]: I0208 23:22:41.692904 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ced5db52-feec-4fce-b6e1-2ee8d6daa1f6-socket-dir\") pod \"csi-node-driver-twvqb\" (UID: \"ced5db52-feec-4fce-b6e1-2ee8d6daa1f6\") " pod="calico-system/csi-node-driver-twvqb" Feb 8 23:22:41.693084 kubelet[1378]: I0208 23:22:41.693071 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kdsm5\" (UniqueName: \"kubernetes.io/projected/ced5db52-feec-4fce-b6e1-2ee8d6daa1f6-kube-api-access-kdsm5\") pod \"csi-node-driver-twvqb\" (UID: \"ced5db52-feec-4fce-b6e1-2ee8d6daa1f6\") " pod="calico-system/csi-node-driver-twvqb" Feb 8 23:22:41.693212 kubelet[1378]: I0208 23:22:41.693174 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/66e8bc3f-53a7-4675-a077-ec4d3fb7482f-lib-modules\") pod \"calico-node-fjvr4\" (UID: \"66e8bc3f-53a7-4675-a077-ec4d3fb7482f\") " pod="calico-system/calico-node-fjvr4" Feb 8 23:22:41.693343 kubelet[1378]: I0208 23:22:41.693307 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/66e8bc3f-53a7-4675-a077-ec4d3fb7482f-policysync\") pod \"calico-node-fjvr4\" (UID: \"66e8bc3f-53a7-4675-a077-ec4d3fb7482f\") " pod="calico-system/calico-node-fjvr4" Feb 8 23:22:41.693526 kubelet[1378]: I0208 23:22:41.693409 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/66e8bc3f-53a7-4675-a077-ec4d3fb7482f-tigera-ca-bundle\") pod \"calico-node-fjvr4\" (UID: \"66e8bc3f-53a7-4675-a077-ec4d3fb7482f\") " pod="calico-system/calico-node-fjvr4" Feb 8 23:22:41.693748 kubelet[1378]: I0208 23:22:41.693621 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/66e8bc3f-53a7-4675-a077-ec4d3fb7482f-flexvol-driver-host\") pod \"calico-node-fjvr4\" (UID: \"66e8bc3f-53a7-4675-a077-ec4d3fb7482f\") " pod="calico-system/calico-node-fjvr4" Feb 8 23:22:41.693748 kubelet[1378]: I0208 23:22:41.693726 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ced5db52-feec-4fce-b6e1-2ee8d6daa1f6-varrun\") pod \"csi-node-driver-twvqb\" (UID: \"ced5db52-feec-4fce-b6e1-2ee8d6daa1f6\") " pod="calico-system/csi-node-driver-twvqb" Feb 8 23:22:41.693987 kubelet[1378]: I0208 23:22:41.693826 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ced5db52-feec-4fce-b6e1-2ee8d6daa1f6-registration-dir\") pod \"csi-node-driver-twvqb\" (UID: \"ced5db52-feec-4fce-b6e1-2ee8d6daa1f6\") " pod="calico-system/csi-node-driver-twvqb" Feb 8 23:22:41.693987 kubelet[1378]: I0208 23:22:41.693941 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e2d2d2b1-25f4-44a5-91ac-2e5c3d66f589-lib-modules\") pod \"kube-proxy-n2zg5\" (UID: \"e2d2d2b1-25f4-44a5-91ac-2e5c3d66f589\") " pod="kube-system/kube-proxy-n2zg5" Feb 8 23:22:41.709677 systemd[1]: Created slice kubepods-besteffort-pod66e8bc3f_53a7_4675_a077_ec4d3fb7482f.slice. Feb 8 23:22:41.817493 kubelet[1378]: E0208 23:22:41.817331 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:41.817493 kubelet[1378]: W0208 23:22:41.817374 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:41.817493 kubelet[1378]: E0208 23:22:41.817477 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:41.859505 kubelet[1378]: E0208 23:22:41.859111 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:41.859505 kubelet[1378]: W0208 23:22:41.859147 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:41.859505 kubelet[1378]: E0208 23:22:41.859207 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:41.859865 kubelet[1378]: E0208 23:22:41.859627 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:41.859865 kubelet[1378]: W0208 23:22:41.859648 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:41.859865 kubelet[1378]: E0208 23:22:41.859692 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:41.860043 kubelet[1378]: E0208 23:22:41.860003 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:41.860043 kubelet[1378]: W0208 23:22:41.860023 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:41.860196 kubelet[1378]: E0208 23:22:41.860051 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:42.007548 env[1057]: time="2024-02-08T23:22:42.007258779Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n2zg5,Uid:e2d2d2b1-25f4-44a5-91ac-2e5c3d66f589,Namespace:kube-system,Attempt:0,}" Feb 8 23:22:42.017935 env[1057]: time="2024-02-08T23:22:42.017832660Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fjvr4,Uid:66e8bc3f-53a7-4675-a077-ec4d3fb7482f,Namespace:calico-system,Attempt:0,}" Feb 8 23:22:42.666763 kubelet[1378]: E0208 23:22:42.666673 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:42.804130 env[1057]: time="2024-02-08T23:22:42.804000393Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:42.807319 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2067670752.mount: Deactivated successfully. Feb 8 23:22:42.812809 env[1057]: time="2024-02-08T23:22:42.812693342Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:42.816309 env[1057]: time="2024-02-08T23:22:42.816231614Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:42.822353 env[1057]: time="2024-02-08T23:22:42.822237886Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:42.829878 env[1057]: time="2024-02-08T23:22:42.829796591Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:42.842899 env[1057]: time="2024-02-08T23:22:42.842826066Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:42.847353 env[1057]: time="2024-02-08T23:22:42.847276154Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:42.851326 env[1057]: time="2024-02-08T23:22:42.851275868Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:42.883782 env[1057]: time="2024-02-08T23:22:42.880237856Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:22:42.883782 env[1057]: time="2024-02-08T23:22:42.880627687Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:22:42.883782 env[1057]: time="2024-02-08T23:22:42.880718223Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:22:42.883782 env[1057]: time="2024-02-08T23:22:42.881072293Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/00c8f99ab91e5c17147cb3bc8263f0d52dc2d08704c08bb9309b8c2b57ef5649 pid=1435 runtime=io.containerd.runc.v2 Feb 8 23:22:42.917299 systemd[1]: Started cri-containerd-00c8f99ab91e5c17147cb3bc8263f0d52dc2d08704c08bb9309b8c2b57ef5649.scope. Feb 8 23:22:42.926524 env[1057]: time="2024-02-08T23:22:42.922819115Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:22:42.926524 env[1057]: time="2024-02-08T23:22:42.922866600Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:22:42.926524 env[1057]: time="2024-02-08T23:22:42.922905570Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:22:42.926524 env[1057]: time="2024-02-08T23:22:42.923089338Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/241e544baeec081f48a30830960d9e411c3251ba1288a8df7ec8d69ea742f0c9 pid=1459 runtime=io.containerd.runc.v2 Feb 8 23:22:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.934000 audit: BPF prog-id=61 op=LOAD Feb 8 23:22:42.935000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.935000 audit[1446]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1435 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:42.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030633866393961623931653563313731343763623362633832363366 Feb 8 23:22:42.935000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.935000 audit[1446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1435 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:42.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030633866393961623931653563313731343763623362633832363366 Feb 8 23:22:42.936000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.936000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.936000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.936000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.936000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.936000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.936000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.936000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.936000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.936000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.936000 audit: BPF prog-id=62 op=LOAD Feb 8 23:22:42.936000 audit[1446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00033e6f0 items=0 ppid=1435 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:42.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030633866393961623931653563313731343763623362633832363366 Feb 8 23:22:42.937000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.937000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.937000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.937000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.937000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.937000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.937000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.937000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.937000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.937000 audit: BPF prog-id=63 op=LOAD Feb 8 23:22:42.937000 audit[1446]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00033e738 items=0 ppid=1435 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:42.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030633866393961623931653563313731343763623362633832363366 Feb 8 23:22:42.938000 audit: BPF prog-id=63 op=UNLOAD Feb 8 23:22:42.938000 audit: BPF prog-id=62 op=UNLOAD Feb 8 23:22:42.938000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.938000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.938000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.938000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.938000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.938000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.938000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.938000 audit[1446]: AVC avc: denied { perfmon } for pid=1446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.938000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.938000 audit[1446]: AVC avc: denied { bpf } for pid=1446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.938000 audit: BPF prog-id=64 op=LOAD Feb 8 23:22:42.938000 audit[1446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00033eb48 items=0 ppid=1435 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:42.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030633866393961623931653563313731343763623362633832363366 Feb 8 23:22:42.950759 systemd[1]: Started cri-containerd-241e544baeec081f48a30830960d9e411c3251ba1288a8df7ec8d69ea742f0c9.scope. Feb 8 23:22:42.968173 env[1057]: time="2024-02-08T23:22:42.968117176Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n2zg5,Uid:e2d2d2b1-25f4-44a5-91ac-2e5c3d66f589,Namespace:kube-system,Attempt:0,} returns sandbox id \"00c8f99ab91e5c17147cb3bc8263f0d52dc2d08704c08bb9309b8c2b57ef5649\"" Feb 8 23:22:42.970383 env[1057]: time="2024-02-08T23:22:42.970332422Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 8 23:22:42.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.970000 audit: BPF prog-id=65 op=LOAD Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1459 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:42.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316535343462616565633038316634386133303833303936306439 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1459 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:42.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316535343462616565633038316634386133303833303936306439 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit: BPF prog-id=66 op=LOAD Feb 8 23:22:42.971000 audit[1481]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c00038a8b0 items=0 ppid=1459 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:42.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316535343462616565633038316634386133303833303936306439 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.971000 audit: BPF prog-id=67 op=LOAD Feb 8 23:22:42.971000 audit[1481]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c00038a8f8 items=0 ppid=1459 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:42.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316535343462616565633038316634386133303833303936306439 Feb 8 23:22:42.972000 audit: BPF prog-id=67 op=UNLOAD Feb 8 23:22:42.972000 audit: BPF prog-id=66 op=UNLOAD Feb 8 23:22:42.972000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.972000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.972000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.972000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.972000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.972000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.972000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.972000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.972000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.972000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:42.972000 audit: BPF prog-id=68 op=LOAD Feb 8 23:22:42.972000 audit[1481]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c00038ad08 items=0 ppid=1459 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:42.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234316535343462616565633038316634386133303833303936306439 Feb 8 23:22:42.988396 env[1057]: time="2024-02-08T23:22:42.988336937Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-fjvr4,Uid:66e8bc3f-53a7-4675-a077-ec4d3fb7482f,Namespace:calico-system,Attempt:0,} returns sandbox id \"241e544baeec081f48a30830960d9e411c3251ba1288a8df7ec8d69ea742f0c9\"" Feb 8 23:22:43.667781 kubelet[1378]: E0208 23:22:43.667715 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:43.807078 systemd[1]: run-containerd-runc-k8s.io-00c8f99ab91e5c17147cb3bc8263f0d52dc2d08704c08bb9309b8c2b57ef5649-runc.Msh3vU.mount: Deactivated successfully. Feb 8 23:22:43.838158 kubelet[1378]: E0208 23:22:43.837676 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-twvqb" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" Feb 8 23:22:44.512489 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3876861671.mount: Deactivated successfully. Feb 8 23:22:44.668247 kubelet[1378]: E0208 23:22:44.668199 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:45.421963 env[1057]: time="2024-02-08T23:22:45.421851116Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:45.424960 env[1057]: time="2024-02-08T23:22:45.424285409Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:45.425916 env[1057]: time="2024-02-08T23:22:45.425868314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:45.429965 env[1057]: time="2024-02-08T23:22:45.429270296Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:45.429965 env[1057]: time="2024-02-08T23:22:45.429570961Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 8 23:22:45.432341 env[1057]: time="2024-02-08T23:22:45.432290641Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 8 23:22:45.436327 env[1057]: time="2024-02-08T23:22:45.436260359Z" level=info msg="CreateContainer within sandbox \"00c8f99ab91e5c17147cb3bc8263f0d52dc2d08704c08bb9309b8c2b57ef5649\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 8 23:22:45.458696 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount218155451.mount: Deactivated successfully. Feb 8 23:22:45.463972 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3865732157.mount: Deactivated successfully. Feb 8 23:22:45.464408 env[1057]: time="2024-02-08T23:22:45.464320912Z" level=info msg="CreateContainer within sandbox \"00c8f99ab91e5c17147cb3bc8263f0d52dc2d08704c08bb9309b8c2b57ef5649\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"e11d0aed64f97e6f9b8815dca39e98e2137d9fc167550c2a54ebff7eb519b5b8\"" Feb 8 23:22:45.468006 env[1057]: time="2024-02-08T23:22:45.467939168Z" level=info msg="StartContainer for \"e11d0aed64f97e6f9b8815dca39e98e2137d9fc167550c2a54ebff7eb519b5b8\"" Feb 8 23:22:45.508659 systemd[1]: Started cri-containerd-e11d0aed64f97e6f9b8815dca39e98e2137d9fc167550c2a54ebff7eb519b5b8.scope. Feb 8 23:22:45.538000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.541148 kernel: kauditd_printk_skb: 157 callbacks suppressed Feb 8 23:22:45.541234 kernel: audit: type=1400 audit(1707434565.538:588): avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.538000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1435 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.549866 kernel: audit: type=1300 audit(1707434565.538:588): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1435 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.549912 kernel: audit: type=1327 audit(1707434565.538:588): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531316430616564363466393765366639623838313564636133396539 Feb 8 23:22:45.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531316430616564363466393765366639623838313564636133396539 Feb 8 23:22:45.554773 kernel: audit: type=1400 audit(1707434565.538:589): avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.538000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.538000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.561817 kernel: audit: type=1400 audit(1707434565.538:589): avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.538000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.565465 kernel: audit: type=1400 audit(1707434565.538:589): avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.538000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.569068 kernel: audit: type=1400 audit(1707434565.538:589): avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.569146 kernel: audit: type=1400 audit(1707434565.538:589): avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.538000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.538000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.576600 kernel: audit: type=1400 audit(1707434565.538:589): avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.538000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.538000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.538000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.538000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.538000 audit: BPF prog-id=69 op=LOAD Feb 8 23:22:45.538000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00028b560 items=0 ppid=1435 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531316430616564363466393765366639623838313564636133396539 Feb 8 23:22:45.583495 kernel: audit: type=1400 audit(1707434565.538:589): avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.544000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.544000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.544000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.544000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.544000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.544000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.544000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.544000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.544000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.544000 audit: BPF prog-id=70 op=LOAD Feb 8 23:22:45.544000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00028b5a8 items=0 ppid=1435 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531316430616564363466393765366639623838313564636133396539 Feb 8 23:22:45.554000 audit: BPF prog-id=70 op=UNLOAD Feb 8 23:22:45.554000 audit: BPF prog-id=69 op=UNLOAD Feb 8 23:22:45.554000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.554000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.554000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.554000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.554000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.554000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.554000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.554000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.554000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.554000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:45.554000 audit: BPF prog-id=71 op=LOAD Feb 8 23:22:45.554000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00028b638 items=0 ppid=1435 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531316430616564363466393765366639623838313564636133396539 Feb 8 23:22:45.596522 env[1057]: time="2024-02-08T23:22:45.596462354Z" level=info msg="StartContainer for \"e11d0aed64f97e6f9b8815dca39e98e2137d9fc167550c2a54ebff7eb519b5b8\" returns successfully" Feb 8 23:22:45.662000 audit[1567]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.662000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd90bbbf50 a2=0 a3=7ffd90bbbf3c items=0 ppid=1528 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.662000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 8 23:22:45.663000 audit[1568]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1568 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:45.663000 audit[1568]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0fe76410 a2=0 a3=7fff0fe763fc items=0 ppid=1528 pid=1568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 8 23:22:45.663000 audit[1569]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_chain pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.663000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd2624660 a2=0 a3=7ffdd262464c items=0 ppid=1528 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.663000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 8 23:22:45.664000 audit[1570]: NETFILTER_CFG table=nat:17 family=10 entries=1 op=nft_register_chain pid=1570 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:45.664000 audit[1570]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2ad1d560 a2=0 a3=7fff2ad1d54c items=0 ppid=1528 pid=1570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.664000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 8 23:22:45.666000 audit[1571]: NETFILTER_CFG table=filter:18 family=10 entries=1 op=nft_register_chain pid=1571 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:45.666000 audit[1571]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd1ceca70 a2=0 a3=7ffdd1ceca5c items=0 ppid=1528 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 8 23:22:45.666000 audit[1572]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_chain pid=1572 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.666000 audit[1572]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2e6af6a0 a2=0 a3=7ffd2e6af68c items=0 ppid=1528 pid=1572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.666000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 8 23:22:45.669410 kubelet[1378]: E0208 23:22:45.669336 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:45.769000 audit[1573]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1573 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.769000 audit[1573]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd59b75260 a2=0 a3=7ffd59b7524c items=0 ppid=1528 pid=1573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.769000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 8 23:22:45.776000 audit[1575]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1575 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.776000 audit[1575]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe0c58cd00 a2=0 a3=7ffe0c58ccec items=0 ppid=1528 pid=1575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.776000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 8 23:22:45.784000 audit[1578]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1578 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.784000 audit[1578]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff59b3a760 a2=0 a3=7fff59b3a74c items=0 ppid=1528 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.784000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 8 23:22:45.787000 audit[1579]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1579 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.787000 audit[1579]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee071b7d0 a2=0 a3=7ffee071b7bc items=0 ppid=1528 pid=1579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 8 23:22:45.792000 audit[1581]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1581 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.792000 audit[1581]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd42ed0dd0 a2=0 a3=7ffd42ed0dbc items=0 ppid=1528 pid=1581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.792000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 8 23:22:45.795000 audit[1582]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1582 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.795000 audit[1582]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7b2e60b0 a2=0 a3=7ffe7b2e609c items=0 ppid=1528 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.795000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 8 23:22:45.802000 audit[1584]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1584 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.802000 audit[1584]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff94b798a0 a2=0 a3=7fff94b7988c items=0 ppid=1528 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.802000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 8 23:22:45.811000 audit[1587]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1587 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.811000 audit[1587]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffcb097390 a2=0 a3=7fffcb09737c items=0 ppid=1528 pid=1587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 8 23:22:45.814000 audit[1588]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1588 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.814000 audit[1588]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc8889a80 a2=0 a3=7ffcc8889a6c items=0 ppid=1528 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.814000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 8 23:22:45.820000 audit[1590]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1590 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.820000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdad6d88c0 a2=0 a3=7ffdad6d88ac items=0 ppid=1528 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.820000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 8 23:22:45.823000 audit[1591]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1591 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.823000 audit[1591]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa7f4b230 a2=0 a3=7fffa7f4b21c items=0 ppid=1528 pid=1591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.823000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 8 23:22:45.829000 audit[1593]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1593 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.829000 audit[1593]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca13cde70 a2=0 a3=7ffca13cde5c items=0 ppid=1528 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.829000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 8 23:22:45.837887 kubelet[1378]: E0208 23:22:45.837053 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-twvqb" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" Feb 8 23:22:45.838000 audit[1596]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1596 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.838000 audit[1596]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdbe80160 a2=0 a3=7fffdbe8014c items=0 ppid=1528 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 8 23:22:45.850000 audit[1599]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1599 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.850000 audit[1599]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffedfc403d0 a2=0 a3=7ffedfc403bc items=0 ppid=1528 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.850000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 8 23:22:45.853000 audit[1600]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1600 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.853000 audit[1600]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff3d5c1720 a2=0 a3=7fff3d5c170c items=0 ppid=1528 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.853000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 8 23:22:45.858000 audit[1602]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1602 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.858000 audit[1602]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc85212e00 a2=0 a3=7ffc85212dec items=0 ppid=1528 pid=1602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.858000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:22:45.918585 kubelet[1378]: E0208 23:22:45.918320 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.918585 kubelet[1378]: W0208 23:22:45.918396 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.918585 kubelet[1378]: E0208 23:22:45.918500 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.919005 kubelet[1378]: E0208 23:22:45.918979 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.919057 kubelet[1378]: W0208 23:22:45.919009 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.919057 kubelet[1378]: E0208 23:22:45.919047 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.919000 audit[1610]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1610 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.919000 audit[1610]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffeabe55d50 a2=0 a3=7ffeabe55d3c items=0 ppid=1528 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.919000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:22:45.921138 kubelet[1378]: E0208 23:22:45.919784 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.921138 kubelet[1378]: W0208 23:22:45.919839 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.921138 kubelet[1378]: E0208 23:22:45.920006 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.921138 kubelet[1378]: E0208 23:22:45.920606 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.921138 kubelet[1378]: W0208 23:22:45.920631 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.921138 kubelet[1378]: E0208 23:22:45.920661 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.921356 kubelet[1378]: E0208 23:22:45.921154 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.921356 kubelet[1378]: W0208 23:22:45.921175 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.921356 kubelet[1378]: E0208 23:22:45.921203 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.921969 kubelet[1378]: E0208 23:22:45.921929 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.921969 kubelet[1378]: W0208 23:22:45.921962 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.922056 kubelet[1378]: E0208 23:22:45.921992 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.922000 audit[1615]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.922000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1f97f630 a2=0 a3=7ffd1f97f61c items=0 ppid=1528 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.922000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 8 23:22:45.924237 kubelet[1378]: E0208 23:22:45.924063 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.924237 kubelet[1378]: W0208 23:22:45.924087 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.924237 kubelet[1378]: E0208 23:22:45.924117 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.924861 kubelet[1378]: E0208 23:22:45.924823 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.924861 kubelet[1378]: W0208 23:22:45.924855 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.924983 kubelet[1378]: E0208 23:22:45.924885 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.925381 kubelet[1378]: E0208 23:22:45.925344 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.925381 kubelet[1378]: W0208 23:22:45.925375 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.925473 kubelet[1378]: E0208 23:22:45.925404 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.928537 kubelet[1378]: E0208 23:22:45.928520 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.928705 kubelet[1378]: W0208 23:22:45.928690 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.928794 kubelet[1378]: E0208 23:22:45.928782 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.929032 kubelet[1378]: E0208 23:22:45.929022 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.929100 kubelet[1378]: W0208 23:22:45.929089 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.929179 kubelet[1378]: E0208 23:22:45.929170 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.929000 audit[1620]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 8 23:22:45.929000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffe87ec820 a2=0 a3=7fffe87ec80c items=0 ppid=1528 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 8 23:22:45.931269 kubelet[1378]: E0208 23:22:45.931258 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.931355 kubelet[1378]: W0208 23:22:45.931342 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.931475 kubelet[1378]: E0208 23:22:45.931465 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.934752 kubelet[1378]: E0208 23:22:45.933760 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.934752 kubelet[1378]: W0208 23:22:45.933797 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.934752 kubelet[1378]: E0208 23:22:45.933835 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.934752 kubelet[1378]: E0208 23:22:45.934121 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.934752 kubelet[1378]: W0208 23:22:45.934140 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.934752 kubelet[1378]: E0208 23:22:45.934167 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.934752 kubelet[1378]: E0208 23:22:45.934515 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.934752 kubelet[1378]: W0208 23:22:45.934535 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.934752 kubelet[1378]: E0208 23:22:45.934562 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.935029 kubelet[1378]: E0208 23:22:45.934880 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.935029 kubelet[1378]: W0208 23:22:45.934900 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.935029 kubelet[1378]: E0208 23:22:45.934927 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.935259 kubelet[1378]: E0208 23:22:45.935231 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.935306 kubelet[1378]: W0208 23:22:45.935266 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.935306 kubelet[1378]: E0208 23:22:45.935294 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.936616 kubelet[1378]: E0208 23:22:45.935896 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.936616 kubelet[1378]: W0208 23:22:45.935926 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.936616 kubelet[1378]: E0208 23:22:45.935955 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.936616 kubelet[1378]: E0208 23:22:45.936241 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.936616 kubelet[1378]: W0208 23:22:45.936259 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.936616 kubelet[1378]: E0208 23:22:45.936286 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.936842 kubelet[1378]: E0208 23:22:45.936806 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.936887 kubelet[1378]: W0208 23:22:45.936843 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.936887 kubelet[1378]: E0208 23:22:45.936872 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.938739 kubelet[1378]: E0208 23:22:45.937698 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.938739 kubelet[1378]: W0208 23:22:45.937727 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.938739 kubelet[1378]: E0208 23:22:45.937757 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.938739 kubelet[1378]: E0208 23:22:45.938114 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.938739 kubelet[1378]: W0208 23:22:45.938132 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.938739 kubelet[1378]: E0208 23:22:45.938159 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.938739 kubelet[1378]: E0208 23:22:45.938549 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.938739 kubelet[1378]: W0208 23:22:45.938568 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.938739 kubelet[1378]: E0208 23:22:45.938596 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.938992 kubelet[1378]: E0208 23:22:45.938890 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.938992 kubelet[1378]: W0208 23:22:45.938909 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.938992 kubelet[1378]: E0208 23:22:45.938936 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.939266 kubelet[1378]: E0208 23:22:45.939243 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.939315 kubelet[1378]: W0208 23:22:45.939270 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.939315 kubelet[1378]: E0208 23:22:45.939310 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.939965 kubelet[1378]: E0208 23:22:45.939741 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.939965 kubelet[1378]: W0208 23:22:45.939769 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.939965 kubelet[1378]: E0208 23:22:45.939836 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.945024 kubelet[1378]: E0208 23:22:45.943752 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.945024 kubelet[1378]: W0208 23:22:45.943787 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.945024 kubelet[1378]: E0208 23:22:45.943831 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.945024 kubelet[1378]: E0208 23:22:45.944204 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.945024 kubelet[1378]: W0208 23:22:45.944224 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.945024 kubelet[1378]: E0208 23:22:45.944258 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.945024 kubelet[1378]: E0208 23:22:45.944725 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.945024 kubelet[1378]: W0208 23:22:45.944745 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.945024 kubelet[1378]: E0208 23:22:45.944773 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.945305 kubelet[1378]: E0208 23:22:45.945138 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.945305 kubelet[1378]: W0208 23:22:45.945157 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.945305 kubelet[1378]: E0208 23:22:45.945184 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.945780 kubelet[1378]: E0208 23:22:45.945764 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.945852 kubelet[1378]: W0208 23:22:45.945840 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.945931 kubelet[1378]: E0208 23:22:45.945920 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.947906 kubelet[1378]: E0208 23:22:45.947893 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:45.947981 kubelet[1378]: W0208 23:22:45.947970 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:45.948045 kubelet[1378]: E0208 23:22:45.948036 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:45.957000 audit[1643]: NETFILTER_CFG table=filter:39 family=2 entries=8 op=nft_register_rule pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:22:45.957000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe60918570 a2=0 a3=7ffe6091855c items=0 ppid=1528 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.957000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:22:45.977000 audit[1643]: NETFILTER_CFG table=nat:40 family=2 entries=21 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:22:45.977000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=8836 a0=3 a1=7ffe60918570 a2=0 a3=7ffe6091855c items=0 ppid=1528 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.977000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:22:45.979000 audit[1654]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1654 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:45.979000 audit[1654]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff5e59e600 a2=0 a3=7fff5e59e5ec items=0 ppid=1528 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.979000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 8 23:22:45.982000 audit[1656]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1656 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:45.982000 audit[1656]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc89ad6a70 a2=0 a3=7ffc89ad6a5c items=0 ppid=1528 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.982000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 8 23:22:45.986000 audit[1659]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:45.986000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdb2e4ba10 a2=0 a3=7ffdb2e4b9fc items=0 ppid=1528 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 8 23:22:45.987000 audit[1660]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1660 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:45.987000 audit[1660]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe11c0f7a0 a2=0 a3=7ffe11c0f78c items=0 ppid=1528 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.987000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 8 23:22:45.989000 audit[1662]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1662 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:45.989000 audit[1662]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe744a5400 a2=0 a3=7ffe744a53ec items=0 ppid=1528 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.989000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 8 23:22:45.990000 audit[1663]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1663 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:45.990000 audit[1663]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7ebff640 a2=0 a3=7ffd7ebff62c items=0 ppid=1528 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.990000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 8 23:22:45.992000 audit[1665]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1665 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:45.992000 audit[1665]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe6a12e530 a2=0 a3=7ffe6a12e51c items=0 ppid=1528 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 8 23:22:45.996000 audit[1668]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:45.996000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd756e4220 a2=0 a3=7ffd756e420c items=0 ppid=1528 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.996000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 8 23:22:45.997000 audit[1669]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:45.997000 audit[1669]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd55b660f0 a2=0 a3=7ffd55b660dc items=0 ppid=1528 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 8 23:22:45.999000 audit[1671]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1671 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:45.999000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc59a73d00 a2=0 a3=7ffc59a73cec items=0 ppid=1528 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:45.999000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 8 23:22:46.000000 audit[1672]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:46.000000 audit[1672]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9c47aab0 a2=0 a3=7ffd9c47aa9c items=0 ppid=1528 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.000000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 8 23:22:46.003000 audit[1674]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1674 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:46.003000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffb69b15e0 a2=0 a3=7fffb69b15cc items=0 ppid=1528 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 8 23:22:46.006000 audit[1677]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1677 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:46.006000 audit[1677]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce08ba370 a2=0 a3=7ffce08ba35c items=0 ppid=1528 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.006000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 8 23:22:46.010000 audit[1680]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1680 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:46.010000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe5f478ad0 a2=0 a3=7ffe5f478abc items=0 ppid=1528 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.010000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 8 23:22:46.011000 audit[1681]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:46.011000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd3d65e480 a2=0 a3=7ffd3d65e46c items=0 ppid=1528 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.011000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 8 23:22:46.013000 audit[1683]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:46.013000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc17acc0a0 a2=0 a3=7ffc17acc08c items=0 ppid=1528 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.013000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:22:46.018000 audit[1686]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:46.018000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffee38b8670 a2=0 a3=7ffee38b865c items=0 ppid=1528 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.018000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 8 23:22:46.019000 audit[1687]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=1687 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:46.019000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd05adb510 a2=0 a3=7ffd05adb4fc items=0 ppid=1528 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.019000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 8 23:22:46.022000 audit[1689]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=1689 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:46.022000 audit[1689]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc94f35b90 a2=0 a3=7ffc94f35b7c items=0 ppid=1528 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.022000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 8 23:22:46.024000 audit[1690]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1690 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:46.024000 audit[1690]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb5c22d00 a2=0 a3=7fffb5c22cec items=0 ppid=1528 pid=1690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.024000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 8 23:22:46.027000 audit[1692]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_rule pid=1692 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:46.027000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdd6f4de60 a2=0 a3=7ffdd6f4de4c items=0 ppid=1528 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.027000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:22:46.031000 audit[1695]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_rule pid=1695 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 8 23:22:46.031000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc1695bd80 a2=0 a3=7ffc1695bd6c items=0 ppid=1528 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 8 23:22:46.037000 audit[1697]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 8 23:22:46.037000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fffecec7090 a2=0 a3=7fffecec707c items=0 ppid=1528 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.037000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:22:46.038000 audit[1697]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 8 23:22:46.038000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fffecec7090 a2=0 a3=7fffecec707c items=0 ppid=1528 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:46.038000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:22:46.670377 kubelet[1378]: E0208 23:22:46.670327 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:47.017335 kubelet[1378]: E0208 23:22:46.946695 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.017335 kubelet[1378]: W0208 23:22:46.946820 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.017335 kubelet[1378]: E0208 23:22:46.946871 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.017335 kubelet[1378]: E0208 23:22:46.947275 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.017335 kubelet[1378]: W0208 23:22:46.947296 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.017335 kubelet[1378]: E0208 23:22:46.947324 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.017335 kubelet[1378]: E0208 23:22:46.947685 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.017335 kubelet[1378]: W0208 23:22:46.947705 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.017335 kubelet[1378]: E0208 23:22:46.947733 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.017335 kubelet[1378]: E0208 23:22:46.948045 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.018133 kubelet[1378]: W0208 23:22:46.948064 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.018133 kubelet[1378]: E0208 23:22:46.948092 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.018133 kubelet[1378]: E0208 23:22:46.948415 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.018133 kubelet[1378]: W0208 23:22:46.948497 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.018133 kubelet[1378]: E0208 23:22:46.948525 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.018133 kubelet[1378]: E0208 23:22:46.948868 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.018133 kubelet[1378]: W0208 23:22:46.948887 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.018133 kubelet[1378]: E0208 23:22:46.948951 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.018133 kubelet[1378]: E0208 23:22:46.949390 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.018133 kubelet[1378]: W0208 23:22:46.949410 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.018766 kubelet[1378]: E0208 23:22:46.949473 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.018766 kubelet[1378]: E0208 23:22:46.949837 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.018766 kubelet[1378]: W0208 23:22:46.949856 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.018766 kubelet[1378]: E0208 23:22:46.949883 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.018766 kubelet[1378]: E0208 23:22:46.950261 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.018766 kubelet[1378]: W0208 23:22:46.950280 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.018766 kubelet[1378]: E0208 23:22:46.950310 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.018766 kubelet[1378]: E0208 23:22:46.950702 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.018766 kubelet[1378]: W0208 23:22:46.950721 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.018766 kubelet[1378]: E0208 23:22:46.950748 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.019342 kubelet[1378]: E0208 23:22:46.951126 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.019342 kubelet[1378]: W0208 23:22:46.951148 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.019342 kubelet[1378]: E0208 23:22:46.951178 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.019342 kubelet[1378]: E0208 23:22:46.951580 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.019342 kubelet[1378]: W0208 23:22:46.951600 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.019342 kubelet[1378]: E0208 23:22:46.951629 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.019342 kubelet[1378]: E0208 23:22:46.952028 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.019342 kubelet[1378]: W0208 23:22:46.952052 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.019342 kubelet[1378]: E0208 23:22:46.952081 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.019342 kubelet[1378]: E0208 23:22:46.952517 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.019987 kubelet[1378]: W0208 23:22:46.952537 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.019987 kubelet[1378]: E0208 23:22:46.952568 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.019987 kubelet[1378]: E0208 23:22:46.952948 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.019987 kubelet[1378]: W0208 23:22:46.952974 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.019987 kubelet[1378]: E0208 23:22:46.953009 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.019987 kubelet[1378]: E0208 23:22:46.953369 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.019987 kubelet[1378]: W0208 23:22:46.953388 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.019987 kubelet[1378]: E0208 23:22:46.953414 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.019987 kubelet[1378]: E0208 23:22:46.953808 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.019987 kubelet[1378]: W0208 23:22:46.953826 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.020609 kubelet[1378]: E0208 23:22:46.953853 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.020609 kubelet[1378]: E0208 23:22:46.954173 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.020609 kubelet[1378]: W0208 23:22:46.954191 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.020609 kubelet[1378]: E0208 23:22:46.954216 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.020609 kubelet[1378]: E0208 23:22:46.954589 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.020609 kubelet[1378]: W0208 23:22:46.954607 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.020609 kubelet[1378]: E0208 23:22:46.954633 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.020609 kubelet[1378]: E0208 23:22:46.955023 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.020609 kubelet[1378]: W0208 23:22:46.955043 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.020609 kubelet[1378]: E0208 23:22:46.955069 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.048676 kubelet[1378]: E0208 23:22:47.048562 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.048676 kubelet[1378]: W0208 23:22:47.048620 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.048676 kubelet[1378]: E0208 23:22:47.048677 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.049374 kubelet[1378]: E0208 23:22:47.049234 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.049374 kubelet[1378]: W0208 23:22:47.049261 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.049374 kubelet[1378]: E0208 23:22:47.049300 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.049912 kubelet[1378]: E0208 23:22:47.049809 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.049912 kubelet[1378]: W0208 23:22:47.049835 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.049912 kubelet[1378]: E0208 23:22:47.049876 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.050416 kubelet[1378]: E0208 23:22:47.050254 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.050416 kubelet[1378]: W0208 23:22:47.050299 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.050416 kubelet[1378]: E0208 23:22:47.050345 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.051623 kubelet[1378]: E0208 23:22:47.050754 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.051623 kubelet[1378]: W0208 23:22:47.050798 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.051623 kubelet[1378]: E0208 23:22:47.050837 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.051623 kubelet[1378]: E0208 23:22:47.051257 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.051623 kubelet[1378]: W0208 23:22:47.051283 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.051623 kubelet[1378]: E0208 23:22:47.051322 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.052827 kubelet[1378]: E0208 23:22:47.052262 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.052827 kubelet[1378]: W0208 23:22:47.052296 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.052827 kubelet[1378]: E0208 23:22:47.052338 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.055525 kubelet[1378]: E0208 23:22:47.053003 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.055525 kubelet[1378]: W0208 23:22:47.053035 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.055525 kubelet[1378]: E0208 23:22:47.053081 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.055525 kubelet[1378]: E0208 23:22:47.053602 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.055525 kubelet[1378]: W0208 23:22:47.053628 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.055525 kubelet[1378]: E0208 23:22:47.053675 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.055525 kubelet[1378]: E0208 23:22:47.054176 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.055525 kubelet[1378]: W0208 23:22:47.054202 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.055525 kubelet[1378]: E0208 23:22:47.054236 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.055525 kubelet[1378]: E0208 23:22:47.054810 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.056801 kubelet[1378]: W0208 23:22:47.054833 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.056801 kubelet[1378]: E0208 23:22:47.054884 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.056801 kubelet[1378]: E0208 23:22:47.056236 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 8 23:22:47.056801 kubelet[1378]: W0208 23:22:47.056266 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 8 23:22:47.056801 kubelet[1378]: E0208 23:22:47.056369 1378 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 8 23:22:47.333996 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2481407040.mount: Deactivated successfully. Feb 8 23:22:47.671762 kubelet[1378]: E0208 23:22:47.671602 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:47.838828 kubelet[1378]: E0208 23:22:47.838789 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-twvqb" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" Feb 8 23:22:48.672116 kubelet[1378]: E0208 23:22:48.672051 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:49.150480 env[1057]: time="2024-02-08T23:22:49.150363576Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:49.157173 env[1057]: time="2024-02-08T23:22:49.157097385Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:49.162470 env[1057]: time="2024-02-08T23:22:49.162356358Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:49.168873 env[1057]: time="2024-02-08T23:22:49.168788459Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:49.172189 env[1057]: time="2024-02-08T23:22:49.172128237Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 8 23:22:49.177506 env[1057]: time="2024-02-08T23:22:49.177410863Z" level=info msg="CreateContainer within sandbox \"241e544baeec081f48a30830960d9e411c3251ba1288a8df7ec8d69ea742f0c9\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 8 23:22:49.201490 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2863625781.mount: Deactivated successfully. Feb 8 23:22:49.211157 env[1057]: time="2024-02-08T23:22:49.211054069Z" level=info msg="CreateContainer within sandbox \"241e544baeec081f48a30830960d9e411c3251ba1288a8df7ec8d69ea742f0c9\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"da0572005ccd1a7fba33ab87712e01820cef470f67fef7b0945eddbcf5e0d528\"" Feb 8 23:22:49.212571 env[1057]: time="2024-02-08T23:22:49.212519945Z" level=info msg="StartContainer for \"da0572005ccd1a7fba33ab87712e01820cef470f67fef7b0945eddbcf5e0d528\"" Feb 8 23:22:49.271739 systemd[1]: Started cri-containerd-da0572005ccd1a7fba33ab87712e01820cef470f67fef7b0945eddbcf5e0d528.scope. Feb 8 23:22:49.297000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.297000 audit[1739]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1459 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:49.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303537323030356363643161376662613333616238373731326530 Feb 8 23:22:49.297000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.297000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.297000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.297000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.297000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.297000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.297000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.297000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.297000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.297000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.297000 audit: BPF prog-id=72 op=LOAD Feb 8 23:22:49.297000 audit[1739]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027a440 items=0 ppid=1459 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:49.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303537323030356363643161376662613333616238373731326530 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit: BPF prog-id=73 op=LOAD Feb 8 23:22:49.299000 audit[1739]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027a488 items=0 ppid=1459 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:49.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303537323030356363643161376662613333616238373731326530 Feb 8 23:22:49.299000 audit: BPF prog-id=73 op=UNLOAD Feb 8 23:22:49.299000 audit: BPF prog-id=72 op=UNLOAD Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { perfmon } for pid=1739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit[1739]: AVC avc: denied { bpf } for pid=1739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:49.299000 audit: BPF prog-id=74 op=LOAD Feb 8 23:22:49.299000 audit[1739]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027a518 items=0 ppid=1459 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:49.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6461303537323030356363643161376662613333616238373731326530 Feb 8 23:22:49.392526 systemd[1]: cri-containerd-da0572005ccd1a7fba33ab87712e01820cef470f67fef7b0945eddbcf5e0d528.scope: Deactivated successfully. Feb 8 23:22:49.394000 audit: BPF prog-id=74 op=UNLOAD Feb 8 23:22:49.672353 kubelet[1378]: E0208 23:22:49.672309 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:49.699484 env[1057]: time="2024-02-08T23:22:49.699309427Z" level=info msg="StartContainer for \"da0572005ccd1a7fba33ab87712e01820cef470f67fef7b0945eddbcf5e0d528\" returns successfully" Feb 8 23:22:49.740754 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-da0572005ccd1a7fba33ab87712e01820cef470f67fef7b0945eddbcf5e0d528-rootfs.mount: Deactivated successfully. Feb 8 23:22:49.837389 kubelet[1378]: E0208 23:22:49.837265 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-twvqb" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" Feb 8 23:22:50.010122 kubelet[1378]: I0208 23:22:49.962762 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-n2zg5" podStartSLOduration=6.501541582 podCreationTimestamp="2024-02-08 23:22:41 +0000 UTC" firstStartedPulling="2024-02-08 23:22:42.969686318 +0000 UTC m=+4.078986446" lastFinishedPulling="2024-02-08 23:22:45.430774283 +0000 UTC m=+6.540074451" observedRunningTime="2024-02-08 23:22:45.923930631 +0000 UTC m=+7.033230800" watchObservedRunningTime="2024-02-08 23:22:49.962629587 +0000 UTC m=+11.071929755" Feb 8 23:22:50.672658 kubelet[1378]: E0208 23:22:50.672562 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:50.702589 env[1057]: time="2024-02-08T23:22:50.702398714Z" level=info msg="shim disconnected" id=da0572005ccd1a7fba33ab87712e01820cef470f67fef7b0945eddbcf5e0d528 Feb 8 23:22:50.703456 env[1057]: time="2024-02-08T23:22:50.703349157Z" level=warning msg="cleaning up after shim disconnected" id=da0572005ccd1a7fba33ab87712e01820cef470f67fef7b0945eddbcf5e0d528 namespace=k8s.io Feb 8 23:22:50.703700 env[1057]: time="2024-02-08T23:22:50.703660001Z" level=info msg="cleaning up dead shim" Feb 8 23:22:50.721039 env[1057]: time="2024-02-08T23:22:50.720971744Z" level=warning msg="cleanup warnings time=\"2024-02-08T23:22:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1784 runtime=io.containerd.runc.v2\n" Feb 8 23:22:50.926551 env[1057]: time="2024-02-08T23:22:50.925734502Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 8 23:22:51.672828 kubelet[1378]: E0208 23:22:51.672747 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:51.837902 kubelet[1378]: E0208 23:22:51.837849 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-twvqb" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" Feb 8 23:22:52.674546 kubelet[1378]: E0208 23:22:52.674492 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:53.305488 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2882399675.mount: Deactivated successfully. Feb 8 23:22:53.675632 kubelet[1378]: E0208 23:22:53.675459 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:53.838676 kubelet[1378]: E0208 23:22:53.838620 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-twvqb" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" Feb 8 23:22:54.676453 kubelet[1378]: E0208 23:22:54.676363 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:55.677209 kubelet[1378]: E0208 23:22:55.677012 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:55.836890 kubelet[1378]: E0208 23:22:55.836847 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-twvqb" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" Feb 8 23:22:56.678139 kubelet[1378]: E0208 23:22:56.678014 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:57.679189 kubelet[1378]: E0208 23:22:57.679133 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:57.839569 kubelet[1378]: E0208 23:22:57.839512 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-twvqb" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" Feb 8 23:22:58.679600 kubelet[1378]: E0208 23:22:58.679508 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:59.665329 kubelet[1378]: E0208 23:22:59.665190 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:59.680627 kubelet[1378]: E0208 23:22:59.680598 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:22:59.836274 kubelet[1378]: E0208 23:22:59.836178 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-twvqb" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" Feb 8 23:22:59.873017 env[1057]: time="2024-02-08T23:22:59.872816182Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:59.878261 env[1057]: time="2024-02-08T23:22:59.878180190Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:59.886504 env[1057]: time="2024-02-08T23:22:59.884146406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:59.891398 env[1057]: time="2024-02-08T23:22:59.891326487Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 8 23:22:59.891691 env[1057]: time="2024-02-08T23:22:59.889151712Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:22:59.899209 env[1057]: time="2024-02-08T23:22:59.899096121Z" level=info msg="CreateContainer within sandbox \"241e544baeec081f48a30830960d9e411c3251ba1288a8df7ec8d69ea742f0c9\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 8 23:22:59.930839 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3048270253.mount: Deactivated successfully. Feb 8 23:22:59.942363 env[1057]: time="2024-02-08T23:22:59.942259998Z" level=info msg="CreateContainer within sandbox \"241e544baeec081f48a30830960d9e411c3251ba1288a8df7ec8d69ea742f0c9\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5ae3cb80ae7ff47124079c14b3cf925d8de8822071075da5aea7ac4a789f1907\"" Feb 8 23:22:59.943000 env[1057]: time="2024-02-08T23:22:59.942970086Z" level=info msg="StartContainer for \"5ae3cb80ae7ff47124079c14b3cf925d8de8822071075da5aea7ac4a789f1907\"" Feb 8 23:22:59.978144 systemd[1]: run-containerd-runc-k8s.io-5ae3cb80ae7ff47124079c14b3cf925d8de8822071075da5aea7ac4a789f1907-runc.wNfW3q.mount: Deactivated successfully. Feb 8 23:22:59.982239 systemd[1]: Started cri-containerd-5ae3cb80ae7ff47124079c14b3cf925d8de8822071075da5aea7ac4a789f1907.scope. Feb 8 23:23:00.005860 kernel: kauditd_printk_skb: 230 callbacks suppressed Feb 8 23:23:00.006017 kernel: audit: type=1400 audit(1707434579.999:652): avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1459 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:00.011593 kernel: audit: type=1300 audit(1707434579.999:652): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1459 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:59.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653363623830616537666634373132343037396331346233636639 Feb 8 23:23:00.017801 kernel: audit: type=1327 audit(1707434579.999:652): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653363623830616537666634373132343037396331346233636639 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:00.021789 kernel: audit: type=1400 audit(1707434579.999:653): avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:00.021831 kernel: audit: type=1400 audit(1707434579.999:653): avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:00.025447 kernel: audit: type=1400 audit(1707434579.999:653): avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:00.036953 kernel: audit: type=1400 audit(1707434579.999:653): avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:00.037003 kernel: audit: type=1400 audit(1707434579.999:653): avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:00.049721 kernel: audit: type=1400 audit(1707434579.999:653): avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:00.049775 kernel: audit: type=1400 audit(1707434579.999:653): avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit: BPF prog-id=75 op=LOAD Feb 8 23:22:59.999000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000294210 items=0 ppid=1459 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:59.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653363623830616537666634373132343037396331346233636639 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit: BPF prog-id=76 op=LOAD Feb 8 23:22:59.999000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000294258 items=0 ppid=1459 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:59.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653363623830616537666634373132343037396331346233636639 Feb 8 23:22:59.999000 audit: BPF prog-id=76 op=UNLOAD Feb 8 23:22:59.999000 audit: BPF prog-id=75 op=UNLOAD Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:22:59.999000 audit: BPF prog-id=77 op=LOAD Feb 8 23:22:59.999000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002942e8 items=0 ppid=1459 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:22:59.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561653363623830616537666634373132343037396331346233636639 Feb 8 23:23:00.144148 env[1057]: time="2024-02-08T23:23:00.144082094Z" level=info msg="StartContainer for \"5ae3cb80ae7ff47124079c14b3cf925d8de8822071075da5aea7ac4a789f1907\" returns successfully" Feb 8 23:23:00.683204 kubelet[1378]: E0208 23:23:00.682453 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:01.683731 kubelet[1378]: E0208 23:23:01.683596 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:01.836197 kubelet[1378]: E0208 23:23:01.836145 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-twvqb" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" Feb 8 23:23:02.062374 env[1057]: time="2024-02-08T23:23:02.062275787Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 8 23:23:02.069708 systemd[1]: cri-containerd-5ae3cb80ae7ff47124079c14b3cf925d8de8822071075da5aea7ac4a789f1907.scope: Deactivated successfully. Feb 8 23:23:02.074000 audit: BPF prog-id=77 op=UNLOAD Feb 8 23:23:02.098351 kubelet[1378]: I0208 23:23:02.098254 1378 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 8 23:23:02.117065 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5ae3cb80ae7ff47124079c14b3cf925d8de8822071075da5aea7ac4a789f1907-rootfs.mount: Deactivated successfully. Feb 8 23:23:02.796612 kubelet[1378]: E0208 23:23:02.683871 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:03.382071 env[1057]: time="2024-02-08T23:23:03.382007143Z" level=info msg="shim disconnected" id=5ae3cb80ae7ff47124079c14b3cf925d8de8822071075da5aea7ac4a789f1907 Feb 8 23:23:03.382551 env[1057]: time="2024-02-08T23:23:03.382526777Z" level=warning msg="cleaning up after shim disconnected" id=5ae3cb80ae7ff47124079c14b3cf925d8de8822071075da5aea7ac4a789f1907 namespace=k8s.io Feb 8 23:23:03.382634 env[1057]: time="2024-02-08T23:23:03.382616998Z" level=info msg="cleaning up dead shim" Feb 8 23:23:03.393148 env[1057]: time="2024-02-08T23:23:03.393101210Z" level=warning msg="cleanup warnings time=\"2024-02-08T23:23:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1855 runtime=io.containerd.runc.v2\n" Feb 8 23:23:03.684954 kubelet[1378]: E0208 23:23:03.684712 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:03.847738 systemd[1]: Created slice kubepods-besteffort-podced5db52_feec_4fce_b6e1_2ee8d6daa1f6.slice. Feb 8 23:23:03.852160 env[1057]: time="2024-02-08T23:23:03.852077207Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-twvqb,Uid:ced5db52-feec-4fce-b6e1-2ee8d6daa1f6,Namespace:calico-system,Attempt:0,}" Feb 8 23:23:03.971992 env[1057]: time="2024-02-08T23:23:03.971825245Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 8 23:23:04.323907 env[1057]: time="2024-02-08T23:23:04.323801785Z" level=error msg="Failed to destroy network for sandbox \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:23:04.324737 env[1057]: time="2024-02-08T23:23:04.324671947Z" level=error msg="encountered an error cleaning up failed sandbox \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:23:04.324976 env[1057]: time="2024-02-08T23:23:04.324914151Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-twvqb,Uid:ced5db52-feec-4fce-b6e1-2ee8d6daa1f6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:23:04.325530 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db-shm.mount: Deactivated successfully. Feb 8 23:23:04.326554 kubelet[1378]: E0208 23:23:04.325514 1378 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:23:04.326554 kubelet[1378]: E0208 23:23:04.325632 1378 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-twvqb" Feb 8 23:23:04.326554 kubelet[1378]: E0208 23:23:04.325690 1378 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-twvqb" Feb 8 23:23:04.327129 kubelet[1378]: E0208 23:23:04.325796 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-twvqb_calico-system(ced5db52-feec-4fce-b6e1-2ee8d6daa1f6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-twvqb_calico-system(ced5db52-feec-4fce-b6e1-2ee8d6daa1f6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-twvqb" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" Feb 8 23:23:04.685617 kubelet[1378]: E0208 23:23:04.685363 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:04.803563 update_engine[1051]: I0208 23:23:04.802630 1051 update_attempter.cc:509] Updating boot flags... Feb 8 23:23:04.973909 kubelet[1378]: I0208 23:23:04.973204 1378 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:04.975497 env[1057]: time="2024-02-08T23:23:04.975374098Z" level=info msg="StopPodSandbox for \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\"" Feb 8 23:23:05.032710 env[1057]: time="2024-02-08T23:23:05.032651651Z" level=error msg="StopPodSandbox for \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\" failed" error="failed to destroy network for sandbox \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:23:05.033228 kubelet[1378]: E0208 23:23:05.033028 1378 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:05.033228 kubelet[1378]: E0208 23:23:05.033101 1378 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db"} Feb 8 23:23:05.033228 kubelet[1378]: E0208 23:23:05.033164 1378 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ced5db52-feec-4fce-b6e1-2ee8d6daa1f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 8 23:23:05.033228 kubelet[1378]: E0208 23:23:05.033201 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ced5db52-feec-4fce-b6e1-2ee8d6daa1f6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-twvqb" podUID="ced5db52-feec-4fce-b6e1-2ee8d6daa1f6" Feb 8 23:23:05.686337 kubelet[1378]: E0208 23:23:05.686234 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:06.687138 kubelet[1378]: E0208 23:23:06.686965 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:07.687863 kubelet[1378]: E0208 23:23:07.687680 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:08.688306 kubelet[1378]: E0208 23:23:08.688194 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:09.240379 kubelet[1378]: I0208 23:23:09.240341 1378 topology_manager.go:215] "Topology Admit Handler" podUID="9acd9e7b-71a9-48e3-a23a-190140a7e36b" podNamespace="default" podName="nginx-deployment-6d5f899847-w5bss" Feb 8 23:23:09.246197 systemd[1]: Created slice kubepods-besteffort-pod9acd9e7b_71a9_48e3_a23a_190140a7e36b.slice. Feb 8 23:23:09.323978 kubelet[1378]: I0208 23:23:09.323781 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qchvz\" (UniqueName: \"kubernetes.io/projected/9acd9e7b-71a9-48e3-a23a-190140a7e36b-kube-api-access-qchvz\") pod \"nginx-deployment-6d5f899847-w5bss\" (UID: \"9acd9e7b-71a9-48e3-a23a-190140a7e36b\") " pod="default/nginx-deployment-6d5f899847-w5bss" Feb 8 23:23:09.551492 env[1057]: time="2024-02-08T23:23:09.550754591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-w5bss,Uid:9acd9e7b-71a9-48e3-a23a-190140a7e36b,Namespace:default,Attempt:0,}" Feb 8 23:23:09.688849 kubelet[1378]: E0208 23:23:09.688789 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:09.708196 env[1057]: time="2024-02-08T23:23:09.708129094Z" level=error msg="Failed to destroy network for sandbox \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:23:09.710398 env[1057]: time="2024-02-08T23:23:09.710364618Z" level=error msg="encountered an error cleaning up failed sandbox \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:23:09.709705 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3-shm.mount: Deactivated successfully. Feb 8 23:23:09.710586 env[1057]: time="2024-02-08T23:23:09.710438623Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-w5bss,Uid:9acd9e7b-71a9-48e3-a23a-190140a7e36b,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:23:09.711261 kubelet[1378]: E0208 23:23:09.710828 1378 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:23:09.711261 kubelet[1378]: E0208 23:23:09.710886 1378 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-w5bss" Feb 8 23:23:09.711261 kubelet[1378]: E0208 23:23:09.710913 1378 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-w5bss" Feb 8 23:23:09.711501 kubelet[1378]: E0208 23:23:09.710972 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-w5bss_default(9acd9e7b-71a9-48e3-a23a-190140a7e36b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-w5bss_default(9acd9e7b-71a9-48e3-a23a-190140a7e36b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-w5bss" podUID="9acd9e7b-71a9-48e3-a23a-190140a7e36b" Feb 8 23:23:09.988701 kubelet[1378]: I0208 23:23:09.986655 1378 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:09.990401 env[1057]: time="2024-02-08T23:23:09.990297485Z" level=info msg="StopPodSandbox for \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\"" Feb 8 23:23:10.067064 env[1057]: time="2024-02-08T23:23:10.066948583Z" level=error msg="StopPodSandbox for \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\" failed" error="failed to destroy network for sandbox \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 8 23:23:10.068044 kubelet[1378]: E0208 23:23:10.067726 1378 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:10.068044 kubelet[1378]: E0208 23:23:10.067805 1378 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3"} Feb 8 23:23:10.068044 kubelet[1378]: E0208 23:23:10.067910 1378 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9acd9e7b-71a9-48e3-a23a-190140a7e36b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 8 23:23:10.068044 kubelet[1378]: E0208 23:23:10.067988 1378 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9acd9e7b-71a9-48e3-a23a-190140a7e36b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-w5bss" podUID="9acd9e7b-71a9-48e3-a23a-190140a7e36b" Feb 8 23:23:10.284000 audit[1992]: NETFILTER_CFG table=filter:65 family=2 entries=14 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:10.286152 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 8 23:23:10.286324 kernel: audit: type=1325 audit(1707434590.284:659): table=filter:65 family=2 entries=14 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:10.284000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff22e18730 a2=0 a3=7fff22e1871c items=0 ppid=1528 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:10.294297 kernel: audit: type=1300 audit(1707434590.284:659): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7fff22e18730 a2=0 a3=7fff22e1871c items=0 ppid=1528 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:10.284000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:10.303569 kernel: audit: type=1327 audit(1707434590.284:659): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:10.285000 audit[1992]: NETFILTER_CFG table=nat:66 family=2 entries=14 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:10.325747 kernel: audit: type=1325 audit(1707434590.285:660): table=nat:66 family=2 entries=14 op=nft_register_rule pid=1992 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:10.325957 kernel: audit: type=1300 audit(1707434590.285:660): arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7fff22e18730 a2=0 a3=0 items=0 ppid=1528 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:10.285000 audit[1992]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7fff22e18730 a2=0 a3=0 items=0 ppid=1528 pid=1992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:10.334562 kernel: audit: type=1327 audit(1707434590.285:660): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:10.285000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:10.690958 kubelet[1378]: E0208 23:23:10.689280 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:11.274000 audit[1994]: NETFILTER_CFG table=filter:67 family=2 entries=11 op=nft_register_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:11.274000 audit[1994]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdc38af0b0 a2=0 a3=7ffdc38af09c items=0 ppid=1528 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.283312 kernel: audit: type=1325 audit(1707434591.274:661): table=filter:67 family=2 entries=11 op=nft_register_rule pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:11.283517 kernel: audit: type=1300 audit(1707434591.274:661): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdc38af0b0 a2=0 a3=7ffdc38af09c items=0 ppid=1528 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.274000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:11.277000 audit[1994]: NETFILTER_CFG table=nat:68 family=2 entries=35 op=nft_register_chain pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:11.292164 kernel: audit: type=1327 audit(1707434591.274:661): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:11.292300 kernel: audit: type=1325 audit(1707434591.277:662): table=nat:68 family=2 entries=35 op=nft_register_chain pid=1994 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:11.277000 audit[1994]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffdc38af0b0 a2=0 a3=7ffdc38af09c items=0 ppid=1528 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:11.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:11.690325 kubelet[1378]: E0208 23:23:11.690163 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:12.691542 kubelet[1378]: E0208 23:23:12.691496 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:13.691790 kubelet[1378]: E0208 23:23:13.691728 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:14.425070 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount282020284.mount: Deactivated successfully. Feb 8 23:23:14.521574 env[1057]: time="2024-02-08T23:23:14.521497543Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:14.525015 env[1057]: time="2024-02-08T23:23:14.524954299Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:14.527511 env[1057]: time="2024-02-08T23:23:14.527471208Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:14.529945 env[1057]: time="2024-02-08T23:23:14.529905846Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:14.531507 env[1057]: time="2024-02-08T23:23:14.531372091Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 8 23:23:14.558743 env[1057]: time="2024-02-08T23:23:14.558705449Z" level=info msg="CreateContainer within sandbox \"241e544baeec081f48a30830960d9e411c3251ba1288a8df7ec8d69ea742f0c9\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 8 23:23:14.582183 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount902806301.mount: Deactivated successfully. Feb 8 23:23:14.588119 env[1057]: time="2024-02-08T23:23:14.588077773Z" level=info msg="CreateContainer within sandbox \"241e544baeec081f48a30830960d9e411c3251ba1288a8df7ec8d69ea742f0c9\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"95008688a74b41411ccdc6fdd1b030a830186c711667becd7e19b257c2271cb3\"" Feb 8 23:23:14.589037 env[1057]: time="2024-02-08T23:23:14.588821575Z" level=info msg="StartContainer for \"95008688a74b41411ccdc6fdd1b030a830186c711667becd7e19b257c2271cb3\"" Feb 8 23:23:14.616865 systemd[1]: Started cri-containerd-95008688a74b41411ccdc6fdd1b030a830186c711667becd7e19b257c2271cb3.scope. Feb 8 23:23:14.640000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.640000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1459 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:14.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935303038363838613734623431343131636364633666646431623033 Feb 8 23:23:14.640000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.640000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.640000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.640000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.640000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.640000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.640000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.640000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.640000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.640000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.640000 audit: BPF prog-id=78 op=LOAD Feb 8 23:23:14.640000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000396370 items=0 ppid=1459 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:14.640000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935303038363838613734623431343131636364633666646431623033 Feb 8 23:23:14.642000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.642000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.642000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.642000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.642000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.642000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.642000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.642000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.642000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.642000 audit: BPF prog-id=79 op=LOAD Feb 8 23:23:14.642000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003963b8 items=0 ppid=1459 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:14.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935303038363838613734623431343131636364633666646431623033 Feb 8 23:23:14.643000 audit: BPF prog-id=79 op=UNLOAD Feb 8 23:23:14.643000 audit: BPF prog-id=78 op=UNLOAD Feb 8 23:23:14.643000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.643000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.643000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.643000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.643000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.643000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.643000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.643000 audit[2010]: AVC avc: denied { perfmon } for pid=2010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.643000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.643000 audit[2010]: AVC avc: denied { bpf } for pid=2010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:14.643000 audit: BPF prog-id=80 op=LOAD Feb 8 23:23:14.643000 audit[2010]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000396448 items=0 ppid=1459 pid=2010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:14.643000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935303038363838613734623431343131636364633666646431623033 Feb 8 23:23:14.671626 env[1057]: time="2024-02-08T23:23:14.671562127Z" level=info msg="StartContainer for \"95008688a74b41411ccdc6fdd1b030a830186c711667becd7e19b257c2271cb3\" returns successfully" Feb 8 23:23:14.692774 kubelet[1378]: E0208 23:23:14.692622 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:14.766976 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 8 23:23:14.767283 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 8 23:23:15.049031 kubelet[1378]: I0208 23:23:15.048859 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-fjvr4" podStartSLOduration=2.505933458 podCreationTimestamp="2024-02-08 23:22:41 +0000 UTC" firstStartedPulling="2024-02-08 23:22:42.989482371 +0000 UTC m=+4.098782499" lastFinishedPulling="2024-02-08 23:23:14.532360984 +0000 UTC m=+35.641661152" observedRunningTime="2024-02-08 23:23:15.046901423 +0000 UTC m=+36.156201572" watchObservedRunningTime="2024-02-08 23:23:15.048812111 +0000 UTC m=+36.158112229" Feb 8 23:23:15.692931 kubelet[1378]: E0208 23:23:15.692837 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:15.838496 env[1057]: time="2024-02-08T23:23:15.838249511Z" level=info msg="StopPodSandbox for \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\"" Feb 8 23:23:16.079353 systemd[1]: run-containerd-runc-k8s.io-95008688a74b41411ccdc6fdd1b030a830186c711667becd7e19b257c2271cb3-runc.wk24dp.mount: Deactivated successfully. Feb 8 23:23:16.102504 env[1057]: 2024-02-08 23:23:15.994 [INFO][2105] k8s.go 578: Cleaning up netns ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:16.102504 env[1057]: 2024-02-08 23:23:15.994 [INFO][2105] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" iface="eth0" netns="/var/run/netns/cni-94c04c44-0130-572e-0501-83f37c83d205" Feb 8 23:23:16.102504 env[1057]: 2024-02-08 23:23:15.997 [INFO][2105] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" iface="eth0" netns="/var/run/netns/cni-94c04c44-0130-572e-0501-83f37c83d205" Feb 8 23:23:16.102504 env[1057]: 2024-02-08 23:23:16.001 [INFO][2105] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" iface="eth0" netns="/var/run/netns/cni-94c04c44-0130-572e-0501-83f37c83d205" Feb 8 23:23:16.102504 env[1057]: 2024-02-08 23:23:16.001 [INFO][2105] k8s.go 585: Releasing IP address(es) ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:16.102504 env[1057]: 2024-02-08 23:23:16.001 [INFO][2105] utils.go 188: Calico CNI releasing IP address ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:16.102504 env[1057]: 2024-02-08 23:23:16.074 [INFO][2111] ipam_plugin.go 415: Releasing address using handleID ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" HandleID="k8s-pod-network.15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Workload="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:16.102504 env[1057]: 2024-02-08 23:23:16.074 [INFO][2111] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:16.102504 env[1057]: 2024-02-08 23:23:16.074 [INFO][2111] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:16.102504 env[1057]: 2024-02-08 23:23:16.095 [WARNING][2111] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" HandleID="k8s-pod-network.15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Workload="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:16.102504 env[1057]: 2024-02-08 23:23:16.095 [INFO][2111] ipam_plugin.go 443: Releasing address using workloadID ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" HandleID="k8s-pod-network.15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Workload="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:16.102504 env[1057]: 2024-02-08 23:23:16.098 [INFO][2111] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:16.102504 env[1057]: 2024-02-08 23:23:16.099 [INFO][2105] k8s.go 591: Teardown processing complete. ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:16.110758 systemd[1]: run-netns-cni\x2d94c04c44\x2d0130\x2d572e\x2d0501\x2d83f37c83d205.mount: Deactivated successfully. Feb 8 23:23:16.112744 env[1057]: time="2024-02-08T23:23:16.112656580Z" level=info msg="TearDown network for sandbox \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\" successfully" Feb 8 23:23:16.112855 env[1057]: time="2024-02-08T23:23:16.112739842Z" level=info msg="StopPodSandbox for \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\" returns successfully" Feb 8 23:23:16.114046 env[1057]: time="2024-02-08T23:23:16.113978776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-twvqb,Uid:ced5db52-feec-4fce-b6e1-2ee8d6daa1f6,Namespace:calico-system,Attempt:1,}" Feb 8 23:23:16.630000 audit[2204]: AVC avc: denied { write } for pid=2204 comm="tee" name="fd" dev="proc" ino=18376 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:16.633532 kernel: kauditd_printk_skb: 45 callbacks suppressed Feb 8 23:23:16.633593 kernel: audit: type=1400 audit(1707434596.630:669): avc: denied { write } for pid=2204 comm="tee" name="fd" dev="proc" ino=18376 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:16.644000 audit[2211]: AVC avc: denied { write } for pid=2211 comm="tee" name="fd" dev="proc" ino=18382 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:16.674884 kernel: audit: type=1400 audit(1707434596.644:670): avc: denied { write } for pid=2211 comm="tee" name="fd" dev="proc" ino=18382 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:16.674981 kernel: audit: type=1400 audit(1707434596.647:671): avc: denied { write } for pid=2206 comm="tee" name="fd" dev="proc" ino=19255 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:16.675012 kernel: audit: type=1300 audit(1707434596.647:671): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4950f973 a2=241 a3=1b6 items=1 ppid=2162 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.675057 kernel: audit: type=1307 audit(1707434596.647:671): cwd="/etc/service/enabled/bird6/log" Feb 8 23:23:16.675124 kernel: audit: type=1302 audit(1707434596.647:671): item=0 name="/dev/fd/63" inode=18361 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:16.675163 kernel: audit: type=1327 audit(1707434596.647:671): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:16.647000 audit[2206]: AVC avc: denied { write } for pid=2206 comm="tee" name="fd" dev="proc" ino=19255 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:16.647000 audit[2206]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4950f973 a2=241 a3=1b6 items=1 ppid=2162 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.647000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 8 23:23:16.647000 audit: PATH item=0 name="/dev/fd/63" inode=18361 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:16.647000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:16.647000 audit[2209]: AVC avc: denied { write } for pid=2209 comm="tee" name="fd" dev="proc" ino=19259 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:16.685513 kernel: audit: type=1400 audit(1707434596.647:672): avc: denied { write } for pid=2209 comm="tee" name="fd" dev="proc" ino=19259 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:16.647000 audit[2209]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf3ef3974 a2=241 a3=1b6 items=1 ppid=2169 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.647000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 8 23:23:16.693528 kernel: audit: type=1300 audit(1707434596.647:672): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf3ef3974 a2=241 a3=1b6 items=1 ppid=2169 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.693613 kernel: audit: type=1307 audit(1707434596.647:672): cwd="/etc/service/enabled/bird/log" Feb 8 23:23:16.693816 kubelet[1378]: E0208 23:23:16.693752 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:16.647000 audit: PATH item=0 name="/dev/fd/63" inode=18364 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:16.647000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:16.651000 audit[2225]: AVC avc: denied { write } for pid=2225 comm="tee" name="fd" dev="proc" ino=19263 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:16.651000 audit[2225]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec69aa963 a2=241 a3=1b6 items=1 ppid=2160 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.651000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 8 23:23:16.651000 audit: PATH item=0 name="/dev/fd/63" inode=18379 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:16.651000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:16.630000 audit[2204]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4ba87973 a2=241 a3=1b6 items=1 ppid=2167 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.630000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 8 23:23:16.829690 kernel: Initializing XFRM netlink socket Feb 8 23:23:16.630000 audit: PATH item=0 name="/dev/fd/63" inode=18358 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:16.630000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:16.663000 audit[2218]: AVC avc: denied { write } for pid=2218 comm="tee" name="fd" dev="proc" ino=18385 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:16.663000 audit[2218]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0de60964 a2=241 a3=1b6 items=1 ppid=2164 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.663000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 8 23:23:16.663000 audit: PATH item=0 name="/dev/fd/63" inode=18373 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:16.663000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:16.711000 audit[2216]: AVC avc: denied { write } for pid=2216 comm="tee" name="fd" dev="proc" ino=19277 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 8 23:23:16.711000 audit[2216]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffb7947975 a2=241 a3=1b6 items=1 ppid=2158 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.711000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 8 23:23:16.711000 audit: PATH item=0 name="/dev/fd/63" inode=18370 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:16.711000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:16.644000 audit[2211]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd8bb36973 a2=241 a3=1b6 items=1 ppid=2166 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:16.644000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 8 23:23:16.644000 audit: PATH item=0 name="/dev/fd/63" inode=18367 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:23:16.644000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 8 23:23:16.859038 systemd-networkd[975]: cali15587b32cb6: Link UP Feb 8 23:23:16.863178 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:23:16.863297 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali15587b32cb6: link becomes ready Feb 8 23:23:16.864000 systemd-networkd[975]: cali15587b32cb6: Gained carrier Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.497 [INFO][2138] utils.go 100: File /var/lib/calico/mtu does not exist Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.533 [INFO][2138] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.245-k8s-csi--node--driver--twvqb-eth0 csi-node-driver- calico-system ced5db52-feec-4fce-b6e1-2ee8d6daa1f6 941 0 2024-02-08 23:22:41 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.245 csi-node-driver-twvqb eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali15587b32cb6 [] []}} ContainerID="4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" Namespace="calico-system" Pod="csi-node-driver-twvqb" WorkloadEndpoint="172.24.4.245-k8s-csi--node--driver--twvqb-" Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.533 [INFO][2138] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" Namespace="calico-system" Pod="csi-node-driver-twvqb" WorkloadEndpoint="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.624 [INFO][2171] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" HandleID="k8s-pod-network.4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" Workload="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.652 [INFO][2171] ipam_plugin.go 268: Auto assigning IP ContainerID="4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" HandleID="k8s-pod-network.4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" Workload="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000118a80), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.245", "pod":"csi-node-driver-twvqb", "timestamp":"2024-02-08 23:23:16.624797896 +0000 UTC"}, Hostname:"172.24.4.245", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.653 [INFO][2171] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.653 [INFO][2171] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.653 [INFO][2171] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.245' Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.657 [INFO][2171] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" host="172.24.4.245" Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.666 [INFO][2171] ipam.go 372: Looking up existing affinities for host host="172.24.4.245" Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.684 [INFO][2171] ipam.go 489: Trying affinity for 192.168.89.64/26 host="172.24.4.245" Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.692 [INFO][2171] ipam.go 155: Attempting to load block cidr=192.168.89.64/26 host="172.24.4.245" Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.698 [INFO][2171] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.89.64/26 host="172.24.4.245" Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.698 [INFO][2171] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.89.64/26 handle="k8s-pod-network.4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" host="172.24.4.245" Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.706 [INFO][2171] ipam.go 1682: Creating new handle: k8s-pod-network.4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26 Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.714 [INFO][2171] ipam.go 1203: Writing block in order to claim IPs block=192.168.89.64/26 handle="k8s-pod-network.4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" host="172.24.4.245" Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.734 [INFO][2171] ipam.go 1216: Successfully claimed IPs: [192.168.89.65/26] block=192.168.89.64/26 handle="k8s-pod-network.4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" host="172.24.4.245" Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.735 [INFO][2171] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.89.65/26] handle="k8s-pod-network.4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" host="172.24.4.245" Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.735 [INFO][2171] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:16.959301 env[1057]: 2024-02-08 23:23:16.735 [INFO][2171] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.89.65/26] IPv6=[] ContainerID="4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" HandleID="k8s-pod-network.4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" Workload="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:16.960267 env[1057]: 2024-02-08 23:23:16.737 [INFO][2138] k8s.go 385: Populated endpoint ContainerID="4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" Namespace="calico-system" Pod="csi-node-driver-twvqb" WorkloadEndpoint="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-csi--node--driver--twvqb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ced5db52-feec-4fce-b6e1-2ee8d6daa1f6", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 22, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"", Pod:"csi-node-driver-twvqb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali15587b32cb6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:16.960267 env[1057]: 2024-02-08 23:23:16.737 [INFO][2138] k8s.go 386: Calico CNI using IPs: [192.168.89.65/32] ContainerID="4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" Namespace="calico-system" Pod="csi-node-driver-twvqb" WorkloadEndpoint="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:16.960267 env[1057]: 2024-02-08 23:23:16.737 [INFO][2138] dataplane_linux.go 68: Setting the host side veth name to cali15587b32cb6 ContainerID="4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" Namespace="calico-system" Pod="csi-node-driver-twvqb" WorkloadEndpoint="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:16.960267 env[1057]: 2024-02-08 23:23:16.859 [INFO][2138] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" Namespace="calico-system" Pod="csi-node-driver-twvqb" WorkloadEndpoint="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:16.960267 env[1057]: 2024-02-08 23:23:16.859 [INFO][2138] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" Namespace="calico-system" Pod="csi-node-driver-twvqb" WorkloadEndpoint="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-csi--node--driver--twvqb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ced5db52-feec-4fce-b6e1-2ee8d6daa1f6", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 22, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26", Pod:"csi-node-driver-twvqb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali15587b32cb6", MAC:"d6:f0:5c:6b:77:40", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:16.960267 env[1057]: 2024-02-08 23:23:16.957 [INFO][2138] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26" Namespace="calico-system" Pod="csi-node-driver-twvqb" WorkloadEndpoint="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit: BPF prog-id=81 op=LOAD Feb 8 23:23:17.074000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffebce978a0 a2=70 a3=7fa4e3f01000 items=0 ppid=2185 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.074000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:17.074000 audit: BPF prog-id=81 op=UNLOAD Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.074000 audit: BPF prog-id=82 op=LOAD Feb 8 23:23:17.074000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffebce978a0 a2=70 a3=6e items=0 ppid=2185 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.074000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:17.075000 audit: BPF prog-id=82 op=UNLOAD Feb 8 23:23:17.075000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.075000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffebce97850 a2=70 a3=470860 items=0 ppid=2185 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.075000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:17.075000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.075000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.075000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.075000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.075000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.075000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.075000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.075000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.075000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.075000 audit: BPF prog-id=83 op=LOAD Feb 8 23:23:17.075000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffebce97830 a2=70 a3=7ffebce978a0 items=0 ppid=2185 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.075000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:17.075000 audit: BPF prog-id=83 op=UNLOAD Feb 8 23:23:17.075000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.075000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffebce97910 a2=70 a3=0 items=0 ppid=2185 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.075000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:17.075000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.075000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffebce97900 a2=70 a3=0 items=0 ppid=2185 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.075000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:17.075000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.075000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffebce97940 a2=70 a3=fe00 items=0 ppid=2185 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.075000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:17.076000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.076000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.076000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.076000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.076000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.076000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.076000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.076000 audit[2316]: AVC avc: denied { perfmon } for pid=2316 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.076000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.076000 audit[2316]: AVC avc: denied { bpf } for pid=2316 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.076000 audit: BPF prog-id=84 op=LOAD Feb 8 23:23:17.076000 audit[2316]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffebce97860 a2=70 a3=ffffffff items=0 ppid=2185 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.076000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 8 23:23:17.080000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.080000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0b536380 a2=70 a3=ffff items=0 ppid=2185 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.080000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 8 23:23:17.084000 audit[2318]: AVC avc: denied { bpf } for pid=2318 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.084000 audit[2318]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe0b536250 a2=70 a3=3 items=0 ppid=2185 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.084000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 8 23:23:17.091000 audit: BPF prog-id=84 op=UNLOAD Feb 8 23:23:17.336000 audit[2342]: NETFILTER_CFG table=mangle:69 family=2 entries=19 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:17.336000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffd151da4a0 a2=0 a3=7ffd151da48c items=0 ppid=2185 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.336000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:17.382000 audit[2341]: NETFILTER_CFG table=raw:70 family=2 entries=19 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:17.382000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc80054e20 a2=0 a3=0 items=0 ppid=2185 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.382000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:17.388000 audit[2344]: NETFILTER_CFG table=nat:71 family=2 entries=16 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:17.388000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7fff05b34230 a2=0 a3=0 items=0 ppid=2185 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.388000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:17.389000 audit[2345]: NETFILTER_CFG table=filter:72 family=2 entries=71 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:17.389000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=36636 a0=3 a1=7ffc777b5c30 a2=0 a3=0 items=0 ppid=2185 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.389000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:17.512519 env[1057]: time="2024-02-08T23:23:17.512343606Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:23:17.512830 env[1057]: time="2024-02-08T23:23:17.512470042Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:23:17.512830 env[1057]: time="2024-02-08T23:23:17.512506844Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:23:17.512830 env[1057]: time="2024-02-08T23:23:17.512761209Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26 pid=2357 runtime=io.containerd.runc.v2 Feb 8 23:23:17.552694 systemd[1]: run-containerd-runc-k8s.io-4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26-runc.eZafOl.mount: Deactivated successfully. Feb 8 23:23:17.566661 systemd[1]: Started cri-containerd-4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26.scope. Feb 8 23:23:17.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.592000 audit: BPF prog-id=85 op=LOAD Feb 8 23:23:17.594000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.594000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2357 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439333539383164653834353239346463656436643839363833336535 Feb 8 23:23:17.594000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.594000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2357 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439333539383164653834353239346463656436643839363833336535 Feb 8 23:23:17.594000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.594000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.594000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.594000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.594000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.594000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.594000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.594000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.594000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.594000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.594000 audit: BPF prog-id=86 op=LOAD Feb 8 23:23:17.594000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003a5a80 items=0 ppid=2357 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439333539383164653834353239346463656436643839363833336535 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit: BPF prog-id=87 op=LOAD Feb 8 23:23:17.596000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003a5ac8 items=0 ppid=2357 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439333539383164653834353239346463656436643839363833336535 Feb 8 23:23:17.596000 audit: BPF prog-id=87 op=UNLOAD Feb 8 23:23:17.596000 audit: BPF prog-id=86 op=UNLOAD Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { perfmon } for pid=2366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit[2366]: AVC avc: denied { bpf } for pid=2366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:17.596000 audit: BPF prog-id=88 op=LOAD Feb 8 23:23:17.596000 audit[2366]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a5ed8 items=0 ppid=2357 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:17.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439333539383164653834353239346463656436643839363833336535 Feb 8 23:23:17.618644 env[1057]: time="2024-02-08T23:23:17.618582680Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-twvqb,Uid:ced5db52-feec-4fce-b6e1-2ee8d6daa1f6,Namespace:calico-system,Attempt:1,} returns sandbox id \"4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26\"" Feb 8 23:23:17.620865 env[1057]: time="2024-02-08T23:23:17.620835502Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 8 23:23:17.694857 kubelet[1378]: E0208 23:23:17.694772 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:17.979920 systemd-networkd[975]: vxlan.calico: Link UP Feb 8 23:23:17.979958 systemd-networkd[975]: vxlan.calico: Gained carrier Feb 8 23:23:18.477722 systemd-networkd[975]: cali15587b32cb6: Gained IPv6LL Feb 8 23:23:18.695809 kubelet[1378]: E0208 23:23:18.695644 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:19.373652 systemd-networkd[975]: vxlan.calico: Gained IPv6LL Feb 8 23:23:19.665830 kubelet[1378]: E0208 23:23:19.665636 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:19.696042 kubelet[1378]: E0208 23:23:19.695994 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:19.820000 audit[2422]: NETFILTER_CFG table=filter:73 family=2 entries=8 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:19.820000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff57432a40 a2=0 a3=7fff57432a2c items=0 ppid=1528 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:19.820000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:19.825000 audit[2422]: NETFILTER_CFG table=nat:74 family=2 entries=44 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:19.825000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7fff57432a40 a2=0 a3=7fff57432a2c items=0 ppid=1528 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:19.825000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:19.858000 audit[2424]: NETFILTER_CFG table=filter:75 family=2 entries=8 op=nft_register_rule pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:19.858000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdc35ed670 a2=0 a3=7ffdc35ed65c items=0 ppid=1528 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:19.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:19.960000 audit[2424]: NETFILTER_CFG table=nat:76 family=2 entries=56 op=nft_register_chain pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:19.960000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7ffdc35ed670 a2=0 a3=7ffdc35ed65c items=0 ppid=1528 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:19.960000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:20.034990 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1639972266.mount: Deactivated successfully. Feb 8 23:23:20.697710 kubelet[1378]: E0208 23:23:20.697632 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:21.454056 env[1057]: time="2024-02-08T23:23:21.453912583Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:21.458600 env[1057]: time="2024-02-08T23:23:21.458508247Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:21.463907 env[1057]: time="2024-02-08T23:23:21.463829887Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:21.468245 env[1057]: time="2024-02-08T23:23:21.468172582Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:21.470141 env[1057]: time="2024-02-08T23:23:21.470048343Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 8 23:23:21.475931 env[1057]: time="2024-02-08T23:23:21.475397706Z" level=info msg="CreateContainer within sandbox \"4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 8 23:23:21.506204 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1736244052.mount: Deactivated successfully. Feb 8 23:23:21.517499 env[1057]: time="2024-02-08T23:23:21.517370060Z" level=info msg="CreateContainer within sandbox \"4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"5d8a3bdaa54dc3b33a6fa409ff75aa83f5412f536cae06d61d45b556f8de2b0c\"" Feb 8 23:23:21.519326 env[1057]: time="2024-02-08T23:23:21.519267973Z" level=info msg="StartContainer for \"5d8a3bdaa54dc3b33a6fa409ff75aa83f5412f536cae06d61d45b556f8de2b0c\"" Feb 8 23:23:21.564942 systemd[1]: Started cri-containerd-5d8a3bdaa54dc3b33a6fa409ff75aa83f5412f536cae06d61d45b556f8de2b0c.scope. Feb 8 23:23:21.594000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.594000 audit[2434]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2357 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:21.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564386133626461613534646333623333613666613430396666373561 Feb 8 23:23:21.594000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.594000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.594000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.594000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.594000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.594000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.594000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.594000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.594000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.594000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.594000 audit: BPF prog-id=89 op=LOAD Feb 8 23:23:21.594000 audit[2434]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000396e90 items=0 ppid=2357 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:21.594000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564386133626461613534646333623333613666613430396666373561 Feb 8 23:23:21.595000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.595000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.595000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.595000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.595000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.595000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.595000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.595000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.595000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.595000 audit: BPF prog-id=90 op=LOAD Feb 8 23:23:21.595000 audit[2434]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000396ed8 items=0 ppid=2357 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:21.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564386133626461613534646333623333613666613430396666373561 Feb 8 23:23:21.596000 audit: BPF prog-id=90 op=UNLOAD Feb 8 23:23:21.596000 audit: BPF prog-id=89 op=UNLOAD Feb 8 23:23:21.596000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.596000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.596000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.596000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.596000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.596000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.596000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.596000 audit[2434]: AVC avc: denied { perfmon } for pid=2434 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.596000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.596000 audit[2434]: AVC avc: denied { bpf } for pid=2434 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:21.596000 audit: BPF prog-id=91 op=LOAD Feb 8 23:23:21.596000 audit[2434]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000396f68 items=0 ppid=2357 pid=2434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:21.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564386133626461613534646333623333613666613430396666373561 Feb 8 23:23:21.618753 env[1057]: time="2024-02-08T23:23:21.618681372Z" level=info msg="StartContainer for \"5d8a3bdaa54dc3b33a6fa409ff75aa83f5412f536cae06d61d45b556f8de2b0c\" returns successfully" Feb 8 23:23:21.620123 env[1057]: time="2024-02-08T23:23:21.620099466Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 8 23:23:21.698840 kubelet[1378]: E0208 23:23:21.698756 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:22.699995 kubelet[1378]: E0208 23:23:22.699923 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:23.701058 kubelet[1378]: E0208 23:23:23.701003 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:23.837612 env[1057]: time="2024-02-08T23:23:23.837579843Z" level=info msg="StopPodSandbox for \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\"" Feb 8 23:23:23.934027 env[1057]: time="2024-02-08T23:23:23.933944324Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:23.938534 env[1057]: time="2024-02-08T23:23:23.938498230Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:23.941072 env[1057]: time="2024-02-08T23:23:23.941034719Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:23.942744 env[1057]: time="2024-02-08T23:23:23.942702309Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:23.943344 env[1057]: time="2024-02-08T23:23:23.943311086Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 8 23:23:23.945772 env[1057]: time="2024-02-08T23:23:23.945742021Z" level=info msg="CreateContainer within sandbox \"4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 8 23:23:23.965880 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1332391875.mount: Deactivated successfully. Feb 8 23:23:23.977023 env[1057]: time="2024-02-08T23:23:23.976973722Z" level=info msg="CreateContainer within sandbox \"4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"332bbcc5b9007bdc3a5844ae3353f09d80ce8665a5524fa134ccb82c17ffcb0d\"" Feb 8 23:23:23.978104 env[1057]: time="2024-02-08T23:23:23.978056444Z" level=info msg="StartContainer for \"332bbcc5b9007bdc3a5844ae3353f09d80ce8665a5524fa134ccb82c17ffcb0d\"" Feb 8 23:23:24.027108 systemd[1]: run-containerd-runc-k8s.io-332bbcc5b9007bdc3a5844ae3353f09d80ce8665a5524fa134ccb82c17ffcb0d-runc.ig1vup.mount: Deactivated successfully. Feb 8 23:23:24.028705 systemd[1]: Started cri-containerd-332bbcc5b9007bdc3a5844ae3353f09d80ce8665a5524fa134ccb82c17ffcb0d.scope. Feb 8 23:23:24.037552 env[1057]: 2024-02-08 23:23:23.969 [INFO][2484] k8s.go 578: Cleaning up netns ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:24.037552 env[1057]: 2024-02-08 23:23:23.969 [INFO][2484] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" iface="eth0" netns="/var/run/netns/cni-5d7d0f9a-ae82-b1c1-063e-ba9185b30816" Feb 8 23:23:24.037552 env[1057]: 2024-02-08 23:23:23.970 [INFO][2484] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" iface="eth0" netns="/var/run/netns/cni-5d7d0f9a-ae82-b1c1-063e-ba9185b30816" Feb 8 23:23:24.037552 env[1057]: 2024-02-08 23:23:23.970 [INFO][2484] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" iface="eth0" netns="/var/run/netns/cni-5d7d0f9a-ae82-b1c1-063e-ba9185b30816" Feb 8 23:23:24.037552 env[1057]: 2024-02-08 23:23:23.970 [INFO][2484] k8s.go 585: Releasing IP address(es) ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:24.037552 env[1057]: 2024-02-08 23:23:23.970 [INFO][2484] utils.go 188: Calico CNI releasing IP address ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:24.037552 env[1057]: 2024-02-08 23:23:24.003 [INFO][2491] ipam_plugin.go 415: Releasing address using handleID ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" HandleID="k8s-pod-network.f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Workload="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:24.037552 env[1057]: 2024-02-08 23:23:24.004 [INFO][2491] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:24.037552 env[1057]: 2024-02-08 23:23:24.004 [INFO][2491] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:24.037552 env[1057]: 2024-02-08 23:23:24.016 [WARNING][2491] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" HandleID="k8s-pod-network.f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Workload="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:24.037552 env[1057]: 2024-02-08 23:23:24.016 [INFO][2491] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" HandleID="k8s-pod-network.f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Workload="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:24.037552 env[1057]: 2024-02-08 23:23:24.020 [INFO][2491] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:24.037552 env[1057]: 2024-02-08 23:23:24.032 [INFO][2484] k8s.go 591: Teardown processing complete. ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:24.038137 env[1057]: time="2024-02-08T23:23:24.037748487Z" level=info msg="TearDown network for sandbox \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\" successfully" Feb 8 23:23:24.038137 env[1057]: time="2024-02-08T23:23:24.037781610Z" level=info msg="StopPodSandbox for \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\" returns successfully" Feb 8 23:23:24.038847 env[1057]: time="2024-02-08T23:23:24.038815465Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-w5bss,Uid:9acd9e7b-71a9-48e3-a23a-190140a7e36b,Namespace:default,Attempt:1,}" Feb 8 23:23:24.048000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.050215 kernel: kauditd_printk_skb: 220 callbacks suppressed Feb 8 23:23:24.050305 kernel: audit: type=1400 audit(1707434604.048:722): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.048000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2357 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:24.057846 kernel: audit: type=1300 audit(1707434604.048:722): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2357 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:24.057890 kernel: audit: type=1327 audit(1707434604.048:722): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326262636335623930303762646333613538343461653333353366 Feb 8 23:23:24.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326262636335623930303762646333613538343461653333353366 Feb 8 23:23:24.049000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.068520 kernel: audit: type=1400 audit(1707434604.049:723): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.049000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.072993 kernel: audit: type=1400 audit(1707434604.049:723): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.073040 kernel: audit: type=1400 audit(1707434604.049:723): avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.049000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.049000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.080462 kernel: audit: type=1400 audit(1707434604.049:723): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.049000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.090104 kernel: audit: type=1400 audit(1707434604.049:723): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.090160 kernel: audit: type=1400 audit(1707434604.049:723): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.049000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.093907 kernel: audit: type=1400 audit(1707434604.049:723): avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.049000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.049000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.049000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.049000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.049000 audit: BPF prog-id=92 op=LOAD Feb 8 23:23:24.049000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000268b40 items=0 ppid=2357 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:24.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326262636335623930303762646333613538343461653333353366 Feb 8 23:23:24.057000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.057000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.057000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.057000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.057000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.057000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.057000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.057000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.057000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.057000 audit: BPF prog-id=93 op=LOAD Feb 8 23:23:24.057000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000268b88 items=0 ppid=2357 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:24.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326262636335623930303762646333613538343461653333353366 Feb 8 23:23:24.061000 audit: BPF prog-id=93 op=UNLOAD Feb 8 23:23:24.061000 audit: BPF prog-id=92 op=UNLOAD Feb 8 23:23:24.061000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.061000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.061000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.061000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.061000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.061000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.061000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.061000 audit[2503]: AVC avc: denied { perfmon } for pid=2503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.061000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.061000 audit[2503]: AVC avc: denied { bpf } for pid=2503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.061000 audit: BPF prog-id=94 op=LOAD Feb 8 23:23:24.061000 audit[2503]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000268c18 items=0 ppid=2357 pid=2503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:24.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333326262636335623930303762646333613538343461653333353366 Feb 8 23:23:24.101532 env[1057]: time="2024-02-08T23:23:24.101488971Z" level=info msg="StartContainer for \"332bbcc5b9007bdc3a5844ae3353f09d80ce8665a5524fa134ccb82c17ffcb0d\" returns successfully" Feb 8 23:23:24.267878 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:23:24.268055 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif185f4eadf4: link becomes ready Feb 8 23:23:24.265035 systemd-networkd[975]: calif185f4eadf4: Link UP Feb 8 23:23:24.269910 systemd-networkd[975]: calif185f4eadf4: Gained carrier Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.144 [INFO][2535] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0 nginx-deployment-6d5f899847- default 9acd9e7b-71a9-48e3-a23a-190140a7e36b 1004 0 2024-02-08 23:23:09 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.245 nginx-deployment-6d5f899847-w5bss eth0 default [] [] [kns.default ksa.default.default] calif185f4eadf4 [] []}} ContainerID="498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" Namespace="default" Pod="nginx-deployment-6d5f899847-w5bss" WorkloadEndpoint="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-" Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.144 [INFO][2535] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" Namespace="default" Pod="nginx-deployment-6d5f899847-w5bss" WorkloadEndpoint="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.174 [INFO][2547] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" HandleID="k8s-pod-network.498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" Workload="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.189 [INFO][2547] ipam_plugin.go 268: Auto assigning IP ContainerID="498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" HandleID="k8s-pod-network.498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" Workload="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004a1b00), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.245", "pod":"nginx-deployment-6d5f899847-w5bss", "timestamp":"2024-02-08 23:23:24.174173054 +0000 UTC"}, Hostname:"172.24.4.245", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.189 [INFO][2547] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.189 [INFO][2547] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.189 [INFO][2547] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.245' Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.194 [INFO][2547] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" host="172.24.4.245" Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.215 [INFO][2547] ipam.go 372: Looking up existing affinities for host host="172.24.4.245" Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.222 [INFO][2547] ipam.go 489: Trying affinity for 192.168.89.64/26 host="172.24.4.245" Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.226 [INFO][2547] ipam.go 155: Attempting to load block cidr=192.168.89.64/26 host="172.24.4.245" Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.229 [INFO][2547] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.89.64/26 host="172.24.4.245" Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.229 [INFO][2547] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.89.64/26 handle="k8s-pod-network.498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" host="172.24.4.245" Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.231 [INFO][2547] ipam.go 1682: Creating new handle: k8s-pod-network.498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673 Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.236 [INFO][2547] ipam.go 1203: Writing block in order to claim IPs block=192.168.89.64/26 handle="k8s-pod-network.498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" host="172.24.4.245" Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.245 [INFO][2547] ipam.go 1216: Successfully claimed IPs: [192.168.89.66/26] block=192.168.89.64/26 handle="k8s-pod-network.498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" host="172.24.4.245" Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.245 [INFO][2547] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.89.66/26] handle="k8s-pod-network.498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" host="172.24.4.245" Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.245 [INFO][2547] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:24.287684 env[1057]: 2024-02-08 23:23:24.245 [INFO][2547] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.89.66/26] IPv6=[] ContainerID="498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" HandleID="k8s-pod-network.498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" Workload="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:24.289611 env[1057]: 2024-02-08 23:23:24.247 [INFO][2535] k8s.go 385: Populated endpoint ContainerID="498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" Namespace="default" Pod="nginx-deployment-6d5f899847-w5bss" WorkloadEndpoint="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"9acd9e7b-71a9-48e3-a23a-190140a7e36b", ResourceVersion:"1004", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"", Pod:"nginx-deployment-6d5f899847-w5bss", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif185f4eadf4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:24.289611 env[1057]: 2024-02-08 23:23:24.247 [INFO][2535] k8s.go 386: Calico CNI using IPs: [192.168.89.66/32] ContainerID="498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" Namespace="default" Pod="nginx-deployment-6d5f899847-w5bss" WorkloadEndpoint="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:24.289611 env[1057]: 2024-02-08 23:23:24.247 [INFO][2535] dataplane_linux.go 68: Setting the host side veth name to calif185f4eadf4 ContainerID="498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" Namespace="default" Pod="nginx-deployment-6d5f899847-w5bss" WorkloadEndpoint="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:24.289611 env[1057]: 2024-02-08 23:23:24.269 [INFO][2535] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" Namespace="default" Pod="nginx-deployment-6d5f899847-w5bss" WorkloadEndpoint="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:24.289611 env[1057]: 2024-02-08 23:23:24.270 [INFO][2535] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" Namespace="default" Pod="nginx-deployment-6d5f899847-w5bss" WorkloadEndpoint="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"9acd9e7b-71a9-48e3-a23a-190140a7e36b", ResourceVersion:"1004", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673", Pod:"nginx-deployment-6d5f899847-w5bss", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif185f4eadf4", MAC:"0e:b8:4f:28:2e:62", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:24.289611 env[1057]: 2024-02-08 23:23:24.276 [INFO][2535] k8s.go 491: Wrote updated endpoint to datastore ContainerID="498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673" Namespace="default" Pod="nginx-deployment-6d5f899847-w5bss" WorkloadEndpoint="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:24.304234 env[1057]: time="2024-02-08T23:23:24.304148075Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:23:24.304492 env[1057]: time="2024-02-08T23:23:24.304241956Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:23:24.304492 env[1057]: time="2024-02-08T23:23:24.304276573Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:23:24.304654 env[1057]: time="2024-02-08T23:23:24.304551775Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673 pid=2579 runtime=io.containerd.runc.v2 Feb 8 23:23:24.318000 audit[2594]: NETFILTER_CFG table=filter:77 family=2 entries=40 op=nft_register_chain pid=2594 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:24.318000 audit[2594]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7fff4d951320 a2=0 a3=7fff4d95130c items=0 ppid=2185 pid=2594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:24.318000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:24.326780 systemd[1]: Started cri-containerd-498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673.scope. Feb 8 23:23:24.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.339000 audit: BPF prog-id=95 op=LOAD Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2579 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:24.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439383630316333636236643766366630363534616135323632626264 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2579 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:24.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439383630316333636236643766366630363534616135323632626264 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit: BPF prog-id=96 op=LOAD Feb 8 23:23:24.341000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00009e340 items=0 ppid=2579 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:24.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439383630316333636236643766366630363534616135323632626264 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.341000 audit: BPF prog-id=97 op=LOAD Feb 8 23:23:24.341000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009e388 items=0 ppid=2579 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:24.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439383630316333636236643766366630363534616135323632626264 Feb 8 23:23:24.342000 audit: BPF prog-id=97 op=UNLOAD Feb 8 23:23:24.342000 audit: BPF prog-id=96 op=UNLOAD Feb 8 23:23:24.342000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.342000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.342000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.342000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.342000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.342000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.342000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.342000 audit[2590]: AVC avc: denied { perfmon } for pid=2590 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.342000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.342000 audit[2590]: AVC avc: denied { bpf } for pid=2590 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:24.342000 audit: BPF prog-id=98 op=LOAD Feb 8 23:23:24.342000 audit[2590]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009e798 items=0 ppid=2579 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:24.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439383630316333636236643766366630363534616135323632626264 Feb 8 23:23:24.375328 env[1057]: time="2024-02-08T23:23:24.375269853Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-w5bss,Uid:9acd9e7b-71a9-48e3-a23a-190140a7e36b,Namespace:default,Attempt:1,} returns sandbox id \"498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673\"" Feb 8 23:23:24.377237 env[1057]: time="2024-02-08T23:23:24.377209576Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 8 23:23:24.703519 kubelet[1378]: E0208 23:23:24.701866 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:24.802064 kubelet[1378]: I0208 23:23:24.802018 1378 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 8 23:23:24.803396 kubelet[1378]: I0208 23:23:24.803360 1378 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 8 23:23:24.971380 systemd[1]: run-netns-cni\x2d5d7d0f9a\x2dae82\x2db1c1\x2d063e\x2dba9185b30816.mount: Deactivated successfully. Feb 8 23:23:25.075470 kubelet[1378]: I0208 23:23:25.075379 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-twvqb" podStartSLOduration=37.751849286 podCreationTimestamp="2024-02-08 23:22:41 +0000 UTC" firstStartedPulling="2024-02-08 23:23:17.620137494 +0000 UTC m=+38.729437612" lastFinishedPulling="2024-02-08 23:23:23.94359317 +0000 UTC m=+45.052893288" observedRunningTime="2024-02-08 23:23:25.07167829 +0000 UTC m=+46.180978529" watchObservedRunningTime="2024-02-08 23:23:25.075304962 +0000 UTC m=+46.184605130" Feb 8 23:23:25.702966 kubelet[1378]: E0208 23:23:25.702908 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:25.774018 systemd-networkd[975]: calif185f4eadf4: Gained IPv6LL Feb 8 23:23:26.704396 kubelet[1378]: E0208 23:23:26.704356 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:27.705369 kubelet[1378]: E0208 23:23:27.705301 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:28.705682 kubelet[1378]: E0208 23:23:28.705598 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:28.936992 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount553886589.mount: Deactivated successfully. Feb 8 23:23:29.706658 kubelet[1378]: E0208 23:23:29.706448 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:30.484215 env[1057]: time="2024-02-08T23:23:30.484046797Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:30.489285 env[1057]: time="2024-02-08T23:23:30.489210275Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:30.495154 env[1057]: time="2024-02-08T23:23:30.494966422Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:30.500528 env[1057]: time="2024-02-08T23:23:30.500467319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:30.503893 env[1057]: time="2024-02-08T23:23:30.503780192Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 8 23:23:30.510621 env[1057]: time="2024-02-08T23:23:30.510512564Z" level=info msg="CreateContainer within sandbox \"498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 8 23:23:30.536918 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3407312074.mount: Deactivated successfully. Feb 8 23:23:30.547537 env[1057]: time="2024-02-08T23:23:30.547380242Z" level=info msg="CreateContainer within sandbox \"498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"b3632891555b306e1eed818bff92bf21481811b6122ecc6b0e3cf77773c4e88b\"" Feb 8 23:23:30.549354 env[1057]: time="2024-02-08T23:23:30.549281504Z" level=info msg="StartContainer for \"b3632891555b306e1eed818bff92bf21481811b6122ecc6b0e3cf77773c4e88b\"" Feb 8 23:23:30.602357 systemd[1]: Started cri-containerd-b3632891555b306e1eed818bff92bf21481811b6122ecc6b0e3cf77773c4e88b.scope. Feb 8 23:23:30.625900 kernel: kauditd_printk_skb: 93 callbacks suppressed Feb 8 23:23:30.626606 kernel: audit: type=1400 audit(1707434610.611:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.626869 kernel: audit: type=1400 audit(1707434610.611:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.627146 kernel: audit: type=1400 audit(1707434610.611:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.633502 kernel: audit: type=1400 audit(1707434610.611:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.637531 kernel: audit: type=1400 audit(1707434610.611:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.647715 kernel: audit: type=1400 audit(1707434610.611:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.649413 kernel: audit: type=1400 audit(1707434610.611:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.649466 kernel: audit: type=1400 audit(1707434610.611:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.611000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.611000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.655931 kernel: audit: type=1400 audit(1707434610.611:755): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.612000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.660556 kernel: audit: type=1400 audit(1707434610.612:756): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.612000 audit: BPF prog-id=99 op=LOAD Feb 8 23:23:30.613000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.613000 audit[2636]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2579 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:30.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233363332383931353535623330366531656564383138626666393262 Feb 8 23:23:30.613000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.613000 audit[2636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2579 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:30.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233363332383931353535623330366531656564383138626666393262 Feb 8 23:23:30.613000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.613000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.613000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.613000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.613000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.613000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.613000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.613000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.613000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.613000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.613000 audit: BPF prog-id=100 op=LOAD Feb 8 23:23:30.613000 audit[2636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c0550 items=0 ppid=2579 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:30.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233363332383931353535623330366531656564383138626666393262 Feb 8 23:23:30.620000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.620000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.620000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.620000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.620000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.620000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.620000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.620000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.620000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.620000 audit: BPF prog-id=101 op=LOAD Feb 8 23:23:30.620000 audit[2636]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c0598 items=0 ppid=2579 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:30.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233363332383931353535623330366531656564383138626666393262 Feb 8 23:23:30.624000 audit: BPF prog-id=101 op=UNLOAD Feb 8 23:23:30.624000 audit: BPF prog-id=100 op=UNLOAD Feb 8 23:23:30.624000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.624000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.624000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.624000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.624000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.624000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.624000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.624000 audit[2636]: AVC avc: denied { perfmon } for pid=2636 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.624000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.624000 audit[2636]: AVC avc: denied { bpf } for pid=2636 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:30.624000 audit: BPF prog-id=102 op=LOAD Feb 8 23:23:30.624000 audit[2636]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c09a8 items=0 ppid=2579 pid=2636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:30.624000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233363332383931353535623330366531656564383138626666393262 Feb 8 23:23:30.664725 env[1057]: time="2024-02-08T23:23:30.664662897Z" level=info msg="StartContainer for \"b3632891555b306e1eed818bff92bf21481811b6122ecc6b0e3cf77773c4e88b\" returns successfully" Feb 8 23:23:30.709062 kubelet[1378]: E0208 23:23:30.708980 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:31.530309 systemd[1]: run-containerd-runc-k8s.io-b3632891555b306e1eed818bff92bf21481811b6122ecc6b0e3cf77773c4e88b-runc.yKr5Qj.mount: Deactivated successfully. Feb 8 23:23:31.710257 kubelet[1378]: E0208 23:23:31.710182 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:32.712937 kubelet[1378]: E0208 23:23:32.712796 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:33.713459 kubelet[1378]: E0208 23:23:33.713347 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:34.714587 kubelet[1378]: E0208 23:23:34.714502 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:35.716074 kubelet[1378]: E0208 23:23:35.716036 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:36.717464 kubelet[1378]: E0208 23:23:36.717348 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:37.278000 audit[2686]: NETFILTER_CFG table=filter:78 family=2 entries=9 op=nft_register_rule pid=2686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:37.283755 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 8 23:23:37.283951 kernel: audit: type=1325 audit(1707434617.278:765): table=filter:78 family=2 entries=9 op=nft_register_rule pid=2686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:37.278000 audit[2686]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe70b13570 a2=0 a3=7ffe70b1355c items=0 ppid=1528 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:37.305640 kernel: audit: type=1300 audit(1707434617.278:765): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe70b13570 a2=0 a3=7ffe70b1355c items=0 ppid=1528 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:37.305883 kernel: audit: type=1327 audit(1707434617.278:765): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:37.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:37.313919 kernel: audit: type=1325 audit(1707434617.278:766): table=nat:79 family=2 entries=20 op=nft_register_rule pid=2686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:37.278000 audit[2686]: NETFILTER_CFG table=nat:79 family=2 entries=20 op=nft_register_rule pid=2686 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:37.278000 audit[2686]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe70b13570 a2=0 a3=7ffe70b1355c items=0 ppid=1528 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:37.335682 kubelet[1378]: I0208 23:23:37.335602 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-w5bss" podStartSLOduration=22.207178076 podCreationTimestamp="2024-02-08 23:23:09 +0000 UTC" firstStartedPulling="2024-02-08 23:23:24.376510837 +0000 UTC m=+45.485810955" lastFinishedPulling="2024-02-08 23:23:30.504828306 +0000 UTC m=+51.614128474" observedRunningTime="2024-02-08 23:23:31.099588392 +0000 UTC m=+52.208888561" watchObservedRunningTime="2024-02-08 23:23:37.335495595 +0000 UTC m=+58.444795754" Feb 8 23:23:37.336360 kubelet[1378]: I0208 23:23:37.336331 1378 topology_manager.go:215] "Topology Admit Handler" podUID="16fe7e8c-bd19-42bd-9751-0f8facc524d7" podNamespace="calico-apiserver" podName="calico-apiserver-58596f568f-zx6t5" Feb 8 23:23:37.338227 kernel: audit: type=1300 audit(1707434617.278:766): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe70b13570 a2=0 a3=7ffe70b1355c items=0 ppid=1528 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:37.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:37.347666 kernel: audit: type=1327 audit(1707434617.278:766): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:37.332000 audit[2688]: NETFILTER_CFG table=filter:80 family=2 entries=10 op=nft_register_rule pid=2688 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:37.353472 kernel: audit: type=1325 audit(1707434617.332:767): table=filter:80 family=2 entries=10 op=nft_register_rule pid=2688 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:37.353626 kernel: audit: type=1300 audit(1707434617.332:767): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc129614d0 a2=0 a3=7ffc129614bc items=0 ppid=1528 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:37.332000 audit[2688]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffc129614d0 a2=0 a3=7ffc129614bc items=0 ppid=1528 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:37.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:37.368489 kernel: audit: type=1327 audit(1707434617.332:767): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:37.368646 kernel: audit: type=1325 audit(1707434617.352:768): table=nat:81 family=2 entries=20 op=nft_register_rule pid=2688 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:37.352000 audit[2688]: NETFILTER_CFG table=nat:81 family=2 entries=20 op=nft_register_rule pid=2688 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:37.368112 systemd[1]: Created slice kubepods-besteffort-pod16fe7e8c_bd19_42bd_9751_0f8facc524d7.slice. Feb 8 23:23:37.352000 audit[2688]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffc129614d0 a2=0 a3=7ffc129614bc items=0 ppid=1528 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:37.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:37.431922 kubelet[1378]: I0208 23:23:37.431866 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gn7s5\" (UniqueName: \"kubernetes.io/projected/16fe7e8c-bd19-42bd-9751-0f8facc524d7-kube-api-access-gn7s5\") pod \"calico-apiserver-58596f568f-zx6t5\" (UID: \"16fe7e8c-bd19-42bd-9751-0f8facc524d7\") " pod="calico-apiserver/calico-apiserver-58596f568f-zx6t5" Feb 8 23:23:37.432487 kubelet[1378]: I0208 23:23:37.432406 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/16fe7e8c-bd19-42bd-9751-0f8facc524d7-calico-apiserver-certs\") pod \"calico-apiserver-58596f568f-zx6t5\" (UID: \"16fe7e8c-bd19-42bd-9751-0f8facc524d7\") " pod="calico-apiserver/calico-apiserver-58596f568f-zx6t5" Feb 8 23:23:37.534918 kubelet[1378]: E0208 23:23:37.534787 1378 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 8 23:23:37.535282 kubelet[1378]: E0208 23:23:37.535255 1378 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/16fe7e8c-bd19-42bd-9751-0f8facc524d7-calico-apiserver-certs podName:16fe7e8c-bd19-42bd-9751-0f8facc524d7 nodeName:}" failed. No retries permitted until 2024-02-08 23:23:38.035209727 +0000 UTC m=+59.144509885 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/16fe7e8c-bd19-42bd-9751-0f8facc524d7-calico-apiserver-certs") pod "calico-apiserver-58596f568f-zx6t5" (UID: "16fe7e8c-bd19-42bd-9751-0f8facc524d7") : secret "calico-apiserver-certs" not found Feb 8 23:23:37.718131 kubelet[1378]: E0208 23:23:37.718085 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:38.177220 kubelet[1378]: I0208 23:23:38.177148 1378 topology_manager.go:215] "Topology Admit Handler" podUID="25e10bce-2229-4d42-84c5-51bb625e26d8" podNamespace="default" podName="nfs-server-provisioner-0" Feb 8 23:23:38.189332 systemd[1]: Created slice kubepods-besteffort-pod25e10bce_2229_4d42_84c5_51bb625e26d8.slice. Feb 8 23:23:38.278910 env[1057]: time="2024-02-08T23:23:38.278814828Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58596f568f-zx6t5,Uid:16fe7e8c-bd19-42bd-9751-0f8facc524d7,Namespace:calico-apiserver,Attempt:0,}" Feb 8 23:23:38.341160 kubelet[1378]: I0208 23:23:38.341087 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2z54z\" (UniqueName: \"kubernetes.io/projected/25e10bce-2229-4d42-84c5-51bb625e26d8-kube-api-access-2z54z\") pod \"nfs-server-provisioner-0\" (UID: \"25e10bce-2229-4d42-84c5-51bb625e26d8\") " pod="default/nfs-server-provisioner-0" Feb 8 23:23:38.341363 kubelet[1378]: I0208 23:23:38.341199 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/25e10bce-2229-4d42-84c5-51bb625e26d8-data\") pod \"nfs-server-provisioner-0\" (UID: \"25e10bce-2229-4d42-84c5-51bb625e26d8\") " pod="default/nfs-server-provisioner-0" Feb 8 23:23:38.387000 audit[2709]: NETFILTER_CFG table=filter:82 family=2 entries=22 op=nft_register_rule pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:38.387000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffd871eaf00 a2=0 a3=7ffd871eaeec items=0 ppid=1528 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.387000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:38.390000 audit[2709]: NETFILTER_CFG table=nat:83 family=2 entries=20 op=nft_register_rule pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:38.390000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd871eaf00 a2=0 a3=0 items=0 ppid=1528 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:38.496798 env[1057]: time="2024-02-08T23:23:38.496056740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:25e10bce-2229-4d42-84c5-51bb625e26d8,Namespace:default,Attempt:0,}" Feb 8 23:23:38.519658 systemd-networkd[975]: cali1e3f2b46687: Link UP Feb 8 23:23:38.532922 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:23:38.533957 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1e3f2b46687: link becomes ready Feb 8 23:23:38.542369 systemd-networkd[975]: cali1e3f2b46687: Gained carrier Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.410 [INFO][2698] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-eth0 calico-apiserver-58596f568f- calico-apiserver 16fe7e8c-bd19-42bd-9751-0f8facc524d7 1095 0 2024-02-08 23:23:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:58596f568f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.24.4.245 calico-apiserver-58596f568f-zx6t5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali1e3f2b46687 [] []}} ContainerID="d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" Namespace="calico-apiserver" Pod="calico-apiserver-58596f568f-zx6t5" WorkloadEndpoint="172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-" Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.410 [INFO][2698] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" Namespace="calico-apiserver" Pod="calico-apiserver-58596f568f-zx6t5" WorkloadEndpoint="172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-eth0" Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.441 [INFO][2712] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" HandleID="k8s-pod-network.d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" Workload="172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-eth0" Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.467 [INFO][2712] ipam_plugin.go 268: Auto assigning IP ContainerID="d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" HandleID="k8s-pod-network.d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" Workload="172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cbd0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.24.4.245", "pod":"calico-apiserver-58596f568f-zx6t5", "timestamp":"2024-02-08 23:23:38.441319706 +0000 UTC"}, Hostname:"172.24.4.245", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.468 [INFO][2712] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.468 [INFO][2712] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.468 [INFO][2712] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.245' Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.472 [INFO][2712] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" host="172.24.4.245" Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.478 [INFO][2712] ipam.go 372: Looking up existing affinities for host host="172.24.4.245" Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.482 [INFO][2712] ipam.go 489: Trying affinity for 192.168.89.64/26 host="172.24.4.245" Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.484 [INFO][2712] ipam.go 155: Attempting to load block cidr=192.168.89.64/26 host="172.24.4.245" Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.487 [INFO][2712] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.89.64/26 host="172.24.4.245" Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.487 [INFO][2712] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.89.64/26 handle="k8s-pod-network.d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" host="172.24.4.245" Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.488 [INFO][2712] ipam.go 1682: Creating new handle: k8s-pod-network.d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.494 [INFO][2712] ipam.go 1203: Writing block in order to claim IPs block=192.168.89.64/26 handle="k8s-pod-network.d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" host="172.24.4.245" Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.508 [INFO][2712] ipam.go 1216: Successfully claimed IPs: [192.168.89.67/26] block=192.168.89.64/26 handle="k8s-pod-network.d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" host="172.24.4.245" Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.508 [INFO][2712] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.89.67/26] handle="k8s-pod-network.d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" host="172.24.4.245" Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.508 [INFO][2712] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:38.561915 env[1057]: 2024-02-08 23:23:38.508 [INFO][2712] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.89.67/26] IPv6=[] ContainerID="d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" HandleID="k8s-pod-network.d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" Workload="172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-eth0" Feb 8 23:23:38.562676 env[1057]: 2024-02-08 23:23:38.513 [INFO][2698] k8s.go 385: Populated endpoint ContainerID="d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" Namespace="calico-apiserver" Pod="calico-apiserver-58596f568f-zx6t5" WorkloadEndpoint="172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-eth0", GenerateName:"calico-apiserver-58596f568f-", Namespace:"calico-apiserver", SelfLink:"", UID:"16fe7e8c-bd19-42bd-9751-0f8facc524d7", ResourceVersion:"1095", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58596f568f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"", Pod:"calico-apiserver-58596f568f-zx6t5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.89.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1e3f2b46687", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:38.562676 env[1057]: 2024-02-08 23:23:38.513 [INFO][2698] k8s.go 386: Calico CNI using IPs: [192.168.89.67/32] ContainerID="d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" Namespace="calico-apiserver" Pod="calico-apiserver-58596f568f-zx6t5" WorkloadEndpoint="172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-eth0" Feb 8 23:23:38.562676 env[1057]: 2024-02-08 23:23:38.513 [INFO][2698] dataplane_linux.go 68: Setting the host side veth name to cali1e3f2b46687 ContainerID="d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" Namespace="calico-apiserver" Pod="calico-apiserver-58596f568f-zx6t5" WorkloadEndpoint="172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-eth0" Feb 8 23:23:38.562676 env[1057]: 2024-02-08 23:23:38.545 [INFO][2698] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" Namespace="calico-apiserver" Pod="calico-apiserver-58596f568f-zx6t5" WorkloadEndpoint="172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-eth0" Feb 8 23:23:38.562676 env[1057]: 2024-02-08 23:23:38.546 [INFO][2698] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" Namespace="calico-apiserver" Pod="calico-apiserver-58596f568f-zx6t5" WorkloadEndpoint="172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-eth0", GenerateName:"calico-apiserver-58596f568f-", Namespace:"calico-apiserver", SelfLink:"", UID:"16fe7e8c-bd19-42bd-9751-0f8facc524d7", ResourceVersion:"1095", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"58596f568f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed", Pod:"calico-apiserver-58596f568f-zx6t5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.89.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali1e3f2b46687", MAC:"76:92:c3:36:64:4b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:38.562676 env[1057]: 2024-02-08 23:23:38.560 [INFO][2698] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed" Namespace="calico-apiserver" Pod="calico-apiserver-58596f568f-zx6t5" WorkloadEndpoint="172.24.4.245-k8s-calico--apiserver--58596f568f--zx6t5-eth0" Feb 8 23:23:38.576161 env[1057]: time="2024-02-08T23:23:38.575796224Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:23:38.576161 env[1057]: time="2024-02-08T23:23:38.575846380Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:23:38.576161 env[1057]: time="2024-02-08T23:23:38.575860636Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:23:38.576511 env[1057]: time="2024-02-08T23:23:38.576400821Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed pid=2753 runtime=io.containerd.runc.v2 Feb 8 23:23:38.597591 systemd[1]: Started cri-containerd-d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed.scope. Feb 8 23:23:38.605732 systemd[1]: run-containerd-runc-k8s.io-d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed-runc.f0TzGT.mount: Deactivated successfully. Feb 8 23:23:38.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.630000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit: BPF prog-id=103 op=LOAD Feb 8 23:23:38.631000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2753 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363430623534346363366161636632323062326339363865313662 Feb 8 23:23:38.631000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2753 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363430623534346363366161636632323062326339363865313662 Feb 8 23:23:38.631000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.631000 audit: BPF prog-id=104 op=LOAD Feb 8 23:23:38.631000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024d60 items=0 ppid=2753 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363430623534346363366161636632323062326339363865313662 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit: BPF prog-id=105 op=LOAD Feb 8 23:23:38.632000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024da8 items=0 ppid=2753 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363430623534346363366161636632323062326339363865313662 Feb 8 23:23:38.632000 audit: BPF prog-id=105 op=UNLOAD Feb 8 23:23:38.632000 audit: BPF prog-id=104 op=UNLOAD Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.632000 audit: BPF prog-id=106 op=LOAD Feb 8 23:23:38.632000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000251b8 items=0 ppid=2753 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439363430623534346363366161636632323062326339363865313662 Feb 8 23:23:38.634000 audit[2787]: NETFILTER_CFG table=filter:84 family=2 entries=57 op=nft_register_chain pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:38.634000 audit[2787]: SYSCALL arch=c000003e syscall=46 success=yes exit=29768 a0=3 a1=7ffcc9b9f6c0 a2=0 a3=7ffcc9b9f6ac items=0 ppid=2185 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.634000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:38.685847 env[1057]: time="2024-02-08T23:23:38.685789155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-58596f568f-zx6t5,Uid:16fe7e8c-bd19-42bd-9751-0f8facc524d7,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed\"" Feb 8 23:23:38.688238 env[1057]: time="2024-02-08T23:23:38.688193986Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 8 23:23:38.719509 kubelet[1378]: E0208 23:23:38.719362 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:38.807413 systemd-networkd[975]: cali60e51b789ff: Link UP Feb 8 23:23:38.813236 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 8 23:23:38.816721 systemd-networkd[975]: cali60e51b789ff: Gained carrier Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.624 [INFO][2723] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.245-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 25e10bce-2229-4d42-84c5-51bb625e26d8 1119 0 2024-02-08 23:23:38 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.245 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.245-k8s-nfs--server--provisioner--0-" Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.624 [INFO][2723] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.245-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.689 [INFO][2788] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" HandleID="k8s-pod-network.bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" Workload="172.24.4.245-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.729 [INFO][2788] ipam_plugin.go 268: Auto assigning IP ContainerID="bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" HandleID="k8s-pod-network.bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" Workload="172.24.4.245-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290290), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.245", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-08 23:23:38.689339638 +0000 UTC"}, Hostname:"172.24.4.245", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.729 [INFO][2788] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.729 [INFO][2788] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.729 [INFO][2788] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.245' Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.732 [INFO][2788] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" host="172.24.4.245" Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.742 [INFO][2788] ipam.go 372: Looking up existing affinities for host host="172.24.4.245" Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.755 [INFO][2788] ipam.go 489: Trying affinity for 192.168.89.64/26 host="172.24.4.245" Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.763 [INFO][2788] ipam.go 155: Attempting to load block cidr=192.168.89.64/26 host="172.24.4.245" Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.768 [INFO][2788] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.89.64/26 host="172.24.4.245" Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.769 [INFO][2788] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.89.64/26 handle="k8s-pod-network.bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" host="172.24.4.245" Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.773 [INFO][2788] ipam.go 1682: Creating new handle: k8s-pod-network.bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.781 [INFO][2788] ipam.go 1203: Writing block in order to claim IPs block=192.168.89.64/26 handle="k8s-pod-network.bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" host="172.24.4.245" Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.791 [INFO][2788] ipam.go 1216: Successfully claimed IPs: [192.168.89.68/26] block=192.168.89.64/26 handle="k8s-pod-network.bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" host="172.24.4.245" Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.791 [INFO][2788] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.89.68/26] handle="k8s-pod-network.bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" host="172.24.4.245" Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.791 [INFO][2788] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:38.836380 env[1057]: 2024-02-08 23:23:38.791 [INFO][2788] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.89.68/26] IPv6=[] ContainerID="bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" HandleID="k8s-pod-network.bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" Workload="172.24.4.245-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:23:38.838106 env[1057]: 2024-02-08 23:23:38.794 [INFO][2723] k8s.go 385: Populated endpoint ContainerID="bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.245-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"25e10bce-2229-4d42-84c5-51bb625e26d8", ResourceVersion:"1119", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.89.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:38.838106 env[1057]: 2024-02-08 23:23:38.794 [INFO][2723] k8s.go 386: Calico CNI using IPs: [192.168.89.68/32] ContainerID="bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.245-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:23:38.838106 env[1057]: 2024-02-08 23:23:38.794 [INFO][2723] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.245-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:23:38.838106 env[1057]: 2024-02-08 23:23:38.818 [INFO][2723] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.245-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:23:38.838613 env[1057]: 2024-02-08 23:23:38.818 [INFO][2723] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.245-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"25e10bce-2229-4d42-84c5-51bb625e26d8", ResourceVersion:"1119", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.89.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ce:d7:eb:bf:98:05", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:38.838613 env[1057]: 2024-02-08 23:23:38.834 [INFO][2723] k8s.go 491: Wrote updated endpoint to datastore ContainerID="bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.245-k8s-nfs--server--provisioner--0-eth0" Feb 8 23:23:38.879808 env[1057]: time="2024-02-08T23:23:38.879683343Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:23:38.880262 env[1057]: time="2024-02-08T23:23:38.880195102Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:23:38.880562 env[1057]: time="2024-02-08T23:23:38.880500176Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:23:38.881141 env[1057]: time="2024-02-08T23:23:38.881088732Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c pid=2825 runtime=io.containerd.runc.v2 Feb 8 23:23:38.886000 audit[2835]: NETFILTER_CFG table=filter:85 family=2 entries=38 op=nft_register_chain pid=2835 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:23:38.886000 audit[2835]: SYSCALL arch=c000003e syscall=46 success=yes exit=19484 a0=3 a1=7fff39c75830 a2=0 a3=7fff39c7581c items=0 ppid=2185 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.886000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:23:38.899076 systemd[1]: Started cri-containerd-bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c.scope. Feb 8 23:23:38.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.914000 audit: BPF prog-id=107 op=LOAD Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353835663836353533393763316236366461383432333439313839 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353835663836353533393763316236366461383432333439313839 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit: BPF prog-id=108 op=LOAD Feb 8 23:23:38.915000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024420 items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353835663836353533393763316236366461383432333439313839 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.915000 audit: BPF prog-id=109 op=LOAD Feb 8 23:23:38.915000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024468 items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353835663836353533393763316236366461383432333439313839 Feb 8 23:23:38.915000 audit: BPF prog-id=109 op=UNLOAD Feb 8 23:23:38.915000 audit: BPF prog-id=108 op=UNLOAD Feb 8 23:23:38.917000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.917000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.917000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.917000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.917000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.917000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.917000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.917000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.917000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.917000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:38.917000 audit: BPF prog-id=110 op=LOAD Feb 8 23:23:38.917000 audit[2836]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024878 items=0 ppid=2825 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:38.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353835663836353533393763316236366461383432333439313839 Feb 8 23:23:38.952469 env[1057]: time="2024-02-08T23:23:38.952411462Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:25e10bce-2229-4d42-84c5-51bb625e26d8,Namespace:default,Attempt:0,} returns sandbox id \"bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c\"" Feb 8 23:23:39.665500 kubelet[1378]: E0208 23:23:39.665397 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:39.697325 env[1057]: time="2024-02-08T23:23:39.697228310Z" level=info msg="StopPodSandbox for \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\"" Feb 8 23:23:39.719872 kubelet[1378]: E0208 23:23:39.719744 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:39.853595 systemd-networkd[975]: cali60e51b789ff: Gained IPv6LL Feb 8 23:23:39.855578 systemd-networkd[975]: cali1e3f2b46687: Gained IPv6LL Feb 8 23:23:39.890062 env[1057]: 2024-02-08 23:23:39.790 [WARNING][2871] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-csi--node--driver--twvqb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ced5db52-feec-4fce-b6e1-2ee8d6daa1f6", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 22, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26", Pod:"csi-node-driver-twvqb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali15587b32cb6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:39.890062 env[1057]: 2024-02-08 23:23:39.790 [INFO][2871] k8s.go 578: Cleaning up netns ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:39.890062 env[1057]: 2024-02-08 23:23:39.790 [INFO][2871] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" iface="eth0" netns="" Feb 8 23:23:39.890062 env[1057]: 2024-02-08 23:23:39.791 [INFO][2871] k8s.go 585: Releasing IP address(es) ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:39.890062 env[1057]: 2024-02-08 23:23:39.791 [INFO][2871] utils.go 188: Calico CNI releasing IP address ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:39.890062 env[1057]: 2024-02-08 23:23:39.852 [INFO][2878] ipam_plugin.go 415: Releasing address using handleID ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" HandleID="k8s-pod-network.15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Workload="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:39.890062 env[1057]: 2024-02-08 23:23:39.852 [INFO][2878] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:39.890062 env[1057]: 2024-02-08 23:23:39.852 [INFO][2878] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:39.890062 env[1057]: 2024-02-08 23:23:39.881 [WARNING][2878] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" HandleID="k8s-pod-network.15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Workload="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:39.890062 env[1057]: 2024-02-08 23:23:39.881 [INFO][2878] ipam_plugin.go 443: Releasing address using workloadID ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" HandleID="k8s-pod-network.15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Workload="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:39.890062 env[1057]: 2024-02-08 23:23:39.887 [INFO][2878] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:39.890062 env[1057]: 2024-02-08 23:23:39.889 [INFO][2871] k8s.go 591: Teardown processing complete. ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:39.890792 env[1057]: time="2024-02-08T23:23:39.890747938Z" level=info msg="TearDown network for sandbox \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\" successfully" Feb 8 23:23:39.890890 env[1057]: time="2024-02-08T23:23:39.890870623Z" level=info msg="StopPodSandbox for \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\" returns successfully" Feb 8 23:23:39.891566 env[1057]: time="2024-02-08T23:23:39.891534002Z" level=info msg="RemovePodSandbox for \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\"" Feb 8 23:23:39.891662 env[1057]: time="2024-02-08T23:23:39.891575320Z" level=info msg="Forcibly stopping sandbox \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\"" Feb 8 23:23:39.997187 env[1057]: 2024-02-08 23:23:39.951 [WARNING][2898] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-csi--node--driver--twvqb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ced5db52-feec-4fce-b6e1-2ee8d6daa1f6", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 22, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"4935981de845294dced6d896833e5f010efe4314a0e3707022db7165b4323d26", Pod:"csi-node-driver-twvqb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali15587b32cb6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:39.997187 env[1057]: 2024-02-08 23:23:39.951 [INFO][2898] k8s.go 578: Cleaning up netns ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:39.997187 env[1057]: 2024-02-08 23:23:39.951 [INFO][2898] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" iface="eth0" netns="" Feb 8 23:23:39.997187 env[1057]: 2024-02-08 23:23:39.951 [INFO][2898] k8s.go 585: Releasing IP address(es) ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:39.997187 env[1057]: 2024-02-08 23:23:39.951 [INFO][2898] utils.go 188: Calico CNI releasing IP address ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:39.997187 env[1057]: 2024-02-08 23:23:39.976 [INFO][2904] ipam_plugin.go 415: Releasing address using handleID ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" HandleID="k8s-pod-network.15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Workload="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:39.997187 env[1057]: 2024-02-08 23:23:39.976 [INFO][2904] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:39.997187 env[1057]: 2024-02-08 23:23:39.976 [INFO][2904] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:39.997187 env[1057]: 2024-02-08 23:23:39.992 [WARNING][2904] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" HandleID="k8s-pod-network.15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Workload="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:39.997187 env[1057]: 2024-02-08 23:23:39.992 [INFO][2904] ipam_plugin.go 443: Releasing address using workloadID ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" HandleID="k8s-pod-network.15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Workload="172.24.4.245-k8s-csi--node--driver--twvqb-eth0" Feb 8 23:23:39.997187 env[1057]: 2024-02-08 23:23:39.994 [INFO][2904] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:39.997187 env[1057]: 2024-02-08 23:23:39.995 [INFO][2898] k8s.go 591: Teardown processing complete. ContainerID="15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db" Feb 8 23:23:39.997187 env[1057]: time="2024-02-08T23:23:39.997099709Z" level=info msg="TearDown network for sandbox \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\" successfully" Feb 8 23:23:40.004698 env[1057]: time="2024-02-08T23:23:40.004664627Z" level=info msg="RemovePodSandbox \"15bfe378b7579415e7a207718f09830ff981cd631a76847078827e7f53f605db\" returns successfully" Feb 8 23:23:40.005410 env[1057]: time="2024-02-08T23:23:40.005386156Z" level=info msg="StopPodSandbox for \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\"" Feb 8 23:23:40.139594 env[1057]: 2024-02-08 23:23:40.056 [WARNING][2922] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"9acd9e7b-71a9-48e3-a23a-190140a7e36b", ResourceVersion:"1035", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673", Pod:"nginx-deployment-6d5f899847-w5bss", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif185f4eadf4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:40.139594 env[1057]: 2024-02-08 23:23:40.056 [INFO][2922] k8s.go 578: Cleaning up netns ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:40.139594 env[1057]: 2024-02-08 23:23:40.057 [INFO][2922] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" iface="eth0" netns="" Feb 8 23:23:40.139594 env[1057]: 2024-02-08 23:23:40.057 [INFO][2922] k8s.go 585: Releasing IP address(es) ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:40.139594 env[1057]: 2024-02-08 23:23:40.057 [INFO][2922] utils.go 188: Calico CNI releasing IP address ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:40.139594 env[1057]: 2024-02-08 23:23:40.105 [INFO][2929] ipam_plugin.go 415: Releasing address using handleID ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" HandleID="k8s-pod-network.f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Workload="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:40.139594 env[1057]: 2024-02-08 23:23:40.105 [INFO][2929] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:40.139594 env[1057]: 2024-02-08 23:23:40.106 [INFO][2929] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:40.139594 env[1057]: 2024-02-08 23:23:40.131 [WARNING][2929] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" HandleID="k8s-pod-network.f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Workload="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:40.139594 env[1057]: 2024-02-08 23:23:40.131 [INFO][2929] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" HandleID="k8s-pod-network.f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Workload="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:40.139594 env[1057]: 2024-02-08 23:23:40.135 [INFO][2929] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:40.139594 env[1057]: 2024-02-08 23:23:40.137 [INFO][2922] k8s.go 591: Teardown processing complete. ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:40.141031 env[1057]: time="2024-02-08T23:23:40.140955373Z" level=info msg="TearDown network for sandbox \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\" successfully" Feb 8 23:23:40.141270 env[1057]: time="2024-02-08T23:23:40.141202356Z" level=info msg="StopPodSandbox for \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\" returns successfully" Feb 8 23:23:40.142600 env[1057]: time="2024-02-08T23:23:40.142527780Z" level=info msg="RemovePodSandbox for \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\"" Feb 8 23:23:40.142905 env[1057]: time="2024-02-08T23:23:40.142793397Z" level=info msg="Forcibly stopping sandbox \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\"" Feb 8 23:23:40.265354 env[1057]: 2024-02-08 23:23:40.221 [WARNING][2947] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"9acd9e7b-71a9-48e3-a23a-190140a7e36b", ResourceVersion:"1035", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"498601c3cb6d7f6f0654aa5262bbdd9d6c7e320e7cb8363c218eea5f47700673", Pod:"nginx-deployment-6d5f899847-w5bss", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif185f4eadf4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:23:40.265354 env[1057]: 2024-02-08 23:23:40.222 [INFO][2947] k8s.go 578: Cleaning up netns ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:40.265354 env[1057]: 2024-02-08 23:23:40.222 [INFO][2947] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" iface="eth0" netns="" Feb 8 23:23:40.265354 env[1057]: 2024-02-08 23:23:40.222 [INFO][2947] k8s.go 585: Releasing IP address(es) ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:40.265354 env[1057]: 2024-02-08 23:23:40.222 [INFO][2947] utils.go 188: Calico CNI releasing IP address ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:40.265354 env[1057]: 2024-02-08 23:23:40.245 [INFO][2954] ipam_plugin.go 415: Releasing address using handleID ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" HandleID="k8s-pod-network.f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Workload="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:40.265354 env[1057]: 2024-02-08 23:23:40.245 [INFO][2954] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:23:40.265354 env[1057]: 2024-02-08 23:23:40.245 [INFO][2954] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:23:40.265354 env[1057]: 2024-02-08 23:23:40.257 [WARNING][2954] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" HandleID="k8s-pod-network.f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Workload="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:40.265354 env[1057]: 2024-02-08 23:23:40.257 [INFO][2954] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" HandleID="k8s-pod-network.f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Workload="172.24.4.245-k8s-nginx--deployment--6d5f899847--w5bss-eth0" Feb 8 23:23:40.265354 env[1057]: 2024-02-08 23:23:40.262 [INFO][2954] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:23:40.265354 env[1057]: 2024-02-08 23:23:40.263 [INFO][2947] k8s.go 591: Teardown processing complete. ContainerID="f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3" Feb 8 23:23:40.266490 env[1057]: time="2024-02-08T23:23:40.265352800Z" level=info msg="TearDown network for sandbox \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\" successfully" Feb 8 23:23:40.279312 env[1057]: time="2024-02-08T23:23:40.279224303Z" level=info msg="RemovePodSandbox \"f692dc2ab4e2b0041b1575c93d8f3a43decb1c0a0e3fa73514eabaccaaa1cfd3\" returns successfully" Feb 8 23:23:40.522534 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2252609896.mount: Deactivated successfully. Feb 8 23:23:40.721063 kubelet[1378]: E0208 23:23:40.720958 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:41.721801 kubelet[1378]: E0208 23:23:41.721743 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:42.722665 kubelet[1378]: E0208 23:23:42.722555 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:43.724102 kubelet[1378]: E0208 23:23:43.724009 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:44.182217 env[1057]: time="2024-02-08T23:23:44.182120868Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:44.186728 env[1057]: time="2024-02-08T23:23:44.186649787Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:44.191071 env[1057]: time="2024-02-08T23:23:44.190997180Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:44.195774 env[1057]: time="2024-02-08T23:23:44.195700322Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:44.198404 env[1057]: time="2024-02-08T23:23:44.198329623Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 8 23:23:44.201402 env[1057]: time="2024-02-08T23:23:44.201288615Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 8 23:23:44.204406 env[1057]: time="2024-02-08T23:23:44.204278505Z" level=info msg="CreateContainer within sandbox \"d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 8 23:23:44.364512 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2876894940.mount: Deactivated successfully. Feb 8 23:23:44.379506 env[1057]: time="2024-02-08T23:23:44.379352333Z" level=info msg="CreateContainer within sandbox \"d9640b544cc6aacf220b2c968e16bec693ca3c5ad0c15c47fa487a5336cdbaed\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f62bd987e55f49e80e823cf8f60f9d72f3f180513085c166cd383bc6290d27e2\"" Feb 8 23:23:44.381364 env[1057]: time="2024-02-08T23:23:44.381310352Z" level=info msg="StartContainer for \"f62bd987e55f49e80e823cf8f60f9d72f3f180513085c166cd383bc6290d27e2\"" Feb 8 23:23:44.447881 systemd[1]: run-containerd-runc-k8s.io-f62bd987e55f49e80e823cf8f60f9d72f3f180513085c166cd383bc6290d27e2-runc.lVHk99.mount: Deactivated successfully. Feb 8 23:23:44.459073 systemd[1]: Started cri-containerd-f62bd987e55f49e80e823cf8f60f9d72f3f180513085c166cd383bc6290d27e2.scope. Feb 8 23:23:44.487253 kernel: kauditd_printk_skb: 128 callbacks suppressed Feb 8 23:23:44.490763 kernel: audit: type=1400 audit(1707434624.478:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.490805 kernel: audit: type=1400 audit(1707434624.478:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.490836 kernel: audit: type=1400 audit(1707434624.478:811): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.494879 kernel: audit: type=1400 audit(1707434624.478:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.502213 kernel: audit: type=1400 audit(1707434624.478:813): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.502279 kernel: audit: type=1400 audit(1707434624.478:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.510031 kernel: audit: type=1400 audit(1707434624.478:815): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.510101 kernel: audit: type=1400 audit(1707434624.478:816): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.510129 kernel: audit: type=1400 audit(1707434624.478:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.517623 kernel: audit: type=1400 audit(1707434624.478:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.478000 audit: BPF prog-id=111 op=LOAD Feb 8 23:23:44.479000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.479000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2753 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:44.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636326264393837653535663439653830653832336366386636306639 Feb 8 23:23:44.479000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.479000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2753 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:44.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636326264393837653535663439653830653832336366386636306639 Feb 8 23:23:44.479000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.479000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.479000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.479000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.479000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.479000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.479000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.479000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.479000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.479000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.479000 audit: BPF prog-id=112 op=LOAD Feb 8 23:23:44.479000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003de360 items=0 ppid=2753 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:44.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636326264393837653535663439653830653832336366386636306639 Feb 8 23:23:44.480000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.480000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.480000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.480000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.480000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.480000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.480000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.480000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.480000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.480000 audit: BPF prog-id=113 op=LOAD Feb 8 23:23:44.480000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003de3a8 items=0 ppid=2753 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:44.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636326264393837653535663439653830653832336366386636306639 Feb 8 23:23:44.486000 audit: BPF prog-id=113 op=UNLOAD Feb 8 23:23:44.486000 audit: BPF prog-id=112 op=UNLOAD Feb 8 23:23:44.487000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.487000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.487000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.487000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.487000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.487000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.487000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.487000 audit[2971]: AVC avc: denied { perfmon } for pid=2971 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.487000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.487000 audit[2971]: AVC avc: denied { bpf } for pid=2971 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:44.487000 audit: BPF prog-id=114 op=LOAD Feb 8 23:23:44.487000 audit[2971]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003de7b8 items=0 ppid=2753 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:44.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636326264393837653535663439653830653832336366386636306639 Feb 8 23:23:44.554782 env[1057]: time="2024-02-08T23:23:44.554669454Z" level=info msg="StartContainer for \"f62bd987e55f49e80e823cf8f60f9d72f3f180513085c166cd383bc6290d27e2\" returns successfully" Feb 8 23:23:44.729563 kubelet[1378]: E0208 23:23:44.725205 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:45.287411 kubelet[1378]: I0208 23:23:45.287158 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-58596f568f-zx6t5" podStartSLOduration=2.775491657 podCreationTimestamp="2024-02-08 23:23:37 +0000 UTC" firstStartedPulling="2024-02-08 23:23:38.687601813 +0000 UTC m=+59.796901941" lastFinishedPulling="2024-02-08 23:23:44.199213913 +0000 UTC m=+65.308514081" observedRunningTime="2024-02-08 23:23:45.286817019 +0000 UTC m=+66.396117147" watchObservedRunningTime="2024-02-08 23:23:45.287103797 +0000 UTC m=+66.396403925" Feb 8 23:23:45.328000 audit[3002]: NETFILTER_CFG table=filter:86 family=2 entries=34 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:45.328000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffcd3259e50 a2=0 a3=7ffcd3259e3c items=0 ppid=1528 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:45.328000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:45.332000 audit[3002]: NETFILTER_CFG table=nat:87 family=2 entries=20 op=nft_register_rule pid=3002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:45.332000 audit[3002]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffcd3259e50 a2=0 a3=4f4e203b7374726f items=0 ppid=1528 pid=3002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:45.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:45.726281 kubelet[1378]: E0208 23:23:45.725598 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:45.730000 audit[3004]: NETFILTER_CFG table=filter:88 family=2 entries=34 op=nft_register_rule pid=3004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:45.730000 audit[3004]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7fffd605de20 a2=0 a3=7fffd605de0c items=0 ppid=1528 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:45.730000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:45.732000 audit[3004]: NETFILTER_CFG table=nat:89 family=2 entries=20 op=nft_register_rule pid=3004 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:45.732000 audit[3004]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fffd605de20 a2=0 a3=0 items=0 ppid=1528 pid=3004 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:45.732000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:45.983000 audit[2982]: AVC avc: denied { watch } for pid=2982 comm="apiserver" path="/calico-apiserver-certs/..2024_02_08_23_23_38.234986166/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c230,c460 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c230,c460 tclass=file permissive=0 Feb 8 23:23:45.983000 audit[2982]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000366260 a2=fc6 a3=0 items=0 ppid=2753 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c230,c460 key=(null) Feb 8 23:23:45.983000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 8 23:23:46.726227 kubelet[1378]: E0208 23:23:46.726144 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:47.727386 kubelet[1378]: E0208 23:23:47.727226 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:48.680575 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount169882867.mount: Deactivated successfully. Feb 8 23:23:48.728458 kubelet[1378]: E0208 23:23:48.728369 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:49.331318 systemd[1]: run-containerd-runc-k8s.io-95008688a74b41411ccdc6fdd1b030a830186c711667becd7e19b257c2271cb3-runc.TZdFQR.mount: Deactivated successfully. Feb 8 23:23:49.729291 kubelet[1378]: E0208 23:23:49.729110 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:50.729595 kubelet[1378]: E0208 23:23:50.729550 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:51.730367 kubelet[1378]: E0208 23:23:51.730281 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:51.907050 env[1057]: time="2024-02-08T23:23:51.906956143Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:51.909628 env[1057]: time="2024-02-08T23:23:51.909599364Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:51.913233 env[1057]: time="2024-02-08T23:23:51.913194320Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:51.917947 env[1057]: time="2024-02-08T23:23:51.917920264Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:23:51.919851 env[1057]: time="2024-02-08T23:23:51.919769280Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 8 23:23:51.922591 env[1057]: time="2024-02-08T23:23:51.922556896Z" level=info msg="CreateContainer within sandbox \"bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 8 23:23:51.944286 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2760727381.mount: Deactivated successfully. Feb 8 23:23:51.951494 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1359408692.mount: Deactivated successfully. Feb 8 23:23:51.951678 env[1057]: time="2024-02-08T23:23:51.951642056Z" level=info msg="CreateContainer within sandbox \"bc585f8655397c1b66da8423491897e64c306ca6c11d71ec0520fae6a070232c\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"ff056896e5294a8da7ecadbdc926135d407f5a630e37712c64736ed6fda3d6fb\"" Feb 8 23:23:51.952761 env[1057]: time="2024-02-08T23:23:51.952728067Z" level=info msg="StartContainer for \"ff056896e5294a8da7ecadbdc926135d407f5a630e37712c64736ed6fda3d6fb\"" Feb 8 23:23:51.988885 systemd[1]: Started cri-containerd-ff056896e5294a8da7ecadbdc926135d407f5a630e37712c64736ed6fda3d6fb.scope. Feb 8 23:23:52.013307 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 8 23:23:52.014033 kernel: audit: type=1400 audit(1707434632.002:832): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.014093 kernel: audit: type=1400 audit(1707434632.002:833): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.022149 kernel: audit: type=1400 audit(1707434632.002:834): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.022297 kernel: audit: type=1400 audit(1707434632.002:835): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.022347 kernel: audit: type=1400 audit(1707434632.002:836): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.025856 kernel: audit: type=1400 audit(1707434632.002:837): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.033702 kernel: audit: type=1400 audit(1707434632.002:838): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.033763 kernel: audit: type=1400 audit(1707434632.002:839): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.041353 kernel: audit: type=1400 audit(1707434632.002:840): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.041407 kernel: audit: type=1400 audit(1707434632.008:841): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.008000 audit: BPF prog-id=115 op=LOAD Feb 8 23:23:52.009000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.009000 audit[3041]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2825 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:52.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666303536383936653532393461386461376563616462646339323631 Feb 8 23:23:52.009000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.009000 audit[3041]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2825 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:52.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666303536383936653532393461386461376563616462646339323631 Feb 8 23:23:52.009000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.009000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.009000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.009000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.009000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.009000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.009000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.009000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.009000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.009000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.009000 audit: BPF prog-id=116 op=LOAD Feb 8 23:23:52.009000 audit[3041]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003aa3a0 items=0 ppid=2825 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:52.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666303536383936653532393461386461376563616462646339323631 Feb 8 23:23:52.012000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.012000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.012000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.012000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.012000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.012000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.012000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.012000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.012000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.012000 audit: BPF prog-id=117 op=LOAD Feb 8 23:23:52.012000 audit[3041]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003aa3e8 items=0 ppid=2825 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:52.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666303536383936653532393461386461376563616462646339323631 Feb 8 23:23:52.013000 audit: BPF prog-id=117 op=UNLOAD Feb 8 23:23:52.013000 audit: BPF prog-id=116 op=UNLOAD Feb 8 23:23:52.013000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.013000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.013000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.013000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.013000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.013000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.013000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.013000 audit[3041]: AVC avc: denied { perfmon } for pid=3041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.013000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.013000 audit[3041]: AVC avc: denied { bpf } for pid=3041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:23:52.013000 audit: BPF prog-id=118 op=LOAD Feb 8 23:23:52.013000 audit[3041]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003aa7f8 items=0 ppid=2825 pid=3041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:52.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666303536383936653532393461386461376563616462646339323631 Feb 8 23:23:52.068385 env[1057]: time="2024-02-08T23:23:52.068341306Z" level=info msg="StartContainer for \"ff056896e5294a8da7ecadbdc926135d407f5a630e37712c64736ed6fda3d6fb\" returns successfully" Feb 8 23:23:52.111000 audit[3069]: AVC avc: denied { search } for pid=3069 comm="rpcbind" name="crypto" dev="proc" ino=23723 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c697 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 8 23:23:52.111000 audit[3069]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f4f5b4410c0 a2=0 a3=0 items=0 ppid=3052 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c697 key=(null) Feb 8 23:23:52.111000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 8 23:23:52.154000 audit[3074]: AVC avc: denied { search } for pid=3074 comm="dbus-daemon" name="crypto" dev="proc" ino=23723 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c697 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 8 23:23:52.154000 audit[3074]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fd7e3afc0c0 a2=0 a3=0 items=0 ppid=3052 pid=3074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c697 key=(null) Feb 8 23:23:52.154000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 8 23:23:52.158000 audit[3075]: AVC avc: denied { watch } for pid=3075 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538201 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c697 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c523,c697 tclass=dir permissive=0 Feb 8 23:23:52.158000 audit[3075]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55716853a970 a2=2c8 a3=7ffff59dbb4c items=0 ppid=3052 pid=3075 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c697 key=(null) Feb 8 23:23:52.158000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 8 23:23:52.162000 audit[3076]: AVC avc: denied { read } for pid=3076 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c697 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 8 23:23:52.162000 audit[3076]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f818cc92320 a1=80000 a2=d a3=7fffdbeec3d0 items=0 ppid=3052 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c697 key=(null) Feb 8 23:23:52.162000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 8 23:23:52.163000 audit[3076]: AVC avc: denied { search } for pid=3076 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23723 scontext=system_u:system_r:svirt_lxc_net_t:s0:c523,c697 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 8 23:23:52.163000 audit[3076]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f818c1e60c0 a2=0 a3=0 items=0 ppid=3052 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c523,c697 key=(null) Feb 8 23:23:52.163000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 8 23:23:52.339699 kubelet[1378]: I0208 23:23:52.339654 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.373443725 podCreationTimestamp="2024-02-08 23:23:38 +0000 UTC" firstStartedPulling="2024-02-08 23:23:38.953986545 +0000 UTC m=+60.063286663" lastFinishedPulling="2024-02-08 23:23:51.92012054 +0000 UTC m=+73.029420698" observedRunningTime="2024-02-08 23:23:52.339470306 +0000 UTC m=+73.448770464" watchObservedRunningTime="2024-02-08 23:23:52.33957776 +0000 UTC m=+73.448877928" Feb 8 23:23:52.380000 audit[3081]: NETFILTER_CFG table=filter:90 family=2 entries=22 op=nft_register_rule pid=3081 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:52.380000 audit[3081]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe8d57d1f0 a2=0 a3=7ffe8d57d1dc items=0 ppid=1528 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:52.380000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:52.388000 audit[3081]: NETFILTER_CFG table=nat:91 family=2 entries=104 op=nft_register_chain pid=3081 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:23:52.388000 audit[3081]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7ffe8d57d1f0 a2=0 a3=7ffe8d57d1dc items=0 ppid=1528 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:23:52.388000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:23:52.731735 kubelet[1378]: E0208 23:23:52.731525 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:53.733086 kubelet[1378]: E0208 23:23:53.733012 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:54.734166 kubelet[1378]: E0208 23:23:54.734108 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:55.735538 kubelet[1378]: E0208 23:23:55.735493 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:56.736413 kubelet[1378]: E0208 23:23:56.736314 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:57.737192 kubelet[1378]: E0208 23:23:57.737129 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:58.738998 kubelet[1378]: E0208 23:23:58.738885 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:59.664751 kubelet[1378]: E0208 23:23:59.664696 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:23:59.739575 kubelet[1378]: E0208 23:23:59.739518 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:00.741593 kubelet[1378]: E0208 23:24:00.741495 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:01.742392 kubelet[1378]: E0208 23:24:01.742330 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:02.743763 kubelet[1378]: E0208 23:24:02.743666 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:03.744733 kubelet[1378]: E0208 23:24:03.744699 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:04.745405 kubelet[1378]: E0208 23:24:04.745214 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:05.746482 kubelet[1378]: E0208 23:24:05.746360 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:06.747689 kubelet[1378]: E0208 23:24:06.747643 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:07.749482 kubelet[1378]: E0208 23:24:07.749375 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:08.323675 systemd[1]: run-containerd-runc-k8s.io-f62bd987e55f49e80e823cf8f60f9d72f3f180513085c166cd383bc6290d27e2-runc.7xbMke.mount: Deactivated successfully. Feb 8 23:24:08.429488 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 8 23:24:08.429711 kernel: audit: type=1325 audit(1707434648.424:857): table=filter:92 family=2 entries=9 op=nft_register_rule pid=3173 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:08.424000 audit[3173]: NETFILTER_CFG table=filter:92 family=2 entries=9 op=nft_register_rule pid=3173 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:08.424000 audit[3173]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdae26e3c0 a2=0 a3=7ffdae26e3ac items=0 ppid=1528 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:08.437898 kernel: audit: type=1300 audit(1707434648.424:857): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdae26e3c0 a2=0 a3=7ffdae26e3ac items=0 ppid=1528 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:08.424000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:08.441513 kernel: audit: type=1327 audit(1707434648.424:857): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:08.428000 audit[3173]: NETFILTER_CFG table=nat:93 family=2 entries=51 op=nft_register_chain pid=3173 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:08.428000 audit[3173]: SYSCALL arch=c000003e syscall=46 success=yes exit=17716 a0=3 a1=7ffdae26e3c0 a2=0 a3=7ffdae26e3ac items=0 ppid=1528 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:08.461944 kernel: audit: type=1325 audit(1707434648.428:858): table=nat:93 family=2 entries=51 op=nft_register_chain pid=3173 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:08.462024 kernel: audit: type=1300 audit(1707434648.428:858): arch=c000003e syscall=46 success=yes exit=17716 a0=3 a1=7ffdae26e3c0 a2=0 a3=7ffdae26e3ac items=0 ppid=1528 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:08.462081 kernel: audit: type=1327 audit(1707434648.428:858): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:08.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:08.455000 audit[3175]: NETFILTER_CFG table=filter:94 family=2 entries=8 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:08.455000 audit[3175]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe9b138900 a2=0 a3=7ffe9b1388ec items=0 ppid=1528 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:08.477509 kernel: audit: type=1325 audit(1707434648.455:859): table=filter:94 family=2 entries=8 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:08.477565 kernel: audit: type=1300 audit(1707434648.455:859): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe9b138900 a2=0 a3=7ffe9b1388ec items=0 ppid=1528 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:08.455000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:08.482197 kernel: audit: type=1327 audit(1707434648.455:859): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:08.468000 audit[3175]: NETFILTER_CFG table=nat:95 family=2 entries=58 op=nft_register_chain pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:08.468000 audit[3175]: SYSCALL arch=c000003e syscall=46 success=yes exit=19604 a0=3 a1=7ffe9b138900 a2=0 a3=7ffe9b1388ec items=0 ppid=1528 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:08.468000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 8 23:24:08.487446 kernel: audit: type=1325 audit(1707434648.468:860): table=nat:95 family=2 entries=58 op=nft_register_chain pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 8 23:24:08.751259 kubelet[1378]: E0208 23:24:08.751091 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:09.752315 kubelet[1378]: E0208 23:24:09.752194 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:10.754397 kubelet[1378]: E0208 23:24:10.754319 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:11.755058 kubelet[1378]: E0208 23:24:11.755001 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:12.755867 kubelet[1378]: E0208 23:24:12.755808 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:13.757237 kubelet[1378]: E0208 23:24:13.757190 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:14.759191 kubelet[1378]: E0208 23:24:14.759074 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:15.760149 kubelet[1378]: E0208 23:24:15.760092 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:16.760343 kubelet[1378]: E0208 23:24:16.760269 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:17.504195 kubelet[1378]: I0208 23:24:17.504052 1378 topology_manager.go:215] "Topology Admit Handler" podUID="4b438716-00ac-4542-bd52-1dc597c974e2" podNamespace="default" podName="test-pod-1" Feb 8 23:24:17.518155 systemd[1]: Created slice kubepods-besteffort-pod4b438716_00ac_4542_bd52_1dc597c974e2.slice. Feb 8 23:24:17.643254 kubelet[1378]: I0208 23:24:17.643201 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lgbc7\" (UniqueName: \"kubernetes.io/projected/4b438716-00ac-4542-bd52-1dc597c974e2-kube-api-access-lgbc7\") pod \"test-pod-1\" (UID: \"4b438716-00ac-4542-bd52-1dc597c974e2\") " pod="default/test-pod-1" Feb 8 23:24:17.644170 kubelet[1378]: I0208 23:24:17.644138 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-0f1dffe9-b830-4953-8133-bdc6f2904918\" (UniqueName: \"kubernetes.io/nfs/4b438716-00ac-4542-bd52-1dc597c974e2-pvc-0f1dffe9-b830-4953-8133-bdc6f2904918\") pod \"test-pod-1\" (UID: \"4b438716-00ac-4542-bd52-1dc597c974e2\") " pod="default/test-pod-1" Feb 8 23:24:17.761458 kubelet[1378]: E0208 23:24:17.761244 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:17.984228 kernel: Failed to create system directory netfs Feb 8 23:24:17.984476 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 8 23:24:17.984543 kernel: audit: type=1400 audit(1707434657.969:861): avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:17.984598 kernel: Failed to create system directory netfs Feb 8 23:24:17.984642 kernel: Failed to create system directory netfs Feb 8 23:24:17.984690 kernel: audit: type=1400 audit(1707434657.969:861): avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:17.984738 kernel: Failed to create system directory netfs Feb 8 23:24:17.969000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:17.969000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.006356 kernel: audit: type=1400 audit(1707434657.969:861): avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:17.969000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.018526 kernel: audit: type=1400 audit(1707434657.969:861): avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:17.969000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:17.969000 audit[3184]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5649d7fa55e0 a1=153bc a2=5649d7dae2b0 a3=5 items=0 ppid=9 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:17.969000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:24:18.041771 kernel: audit: type=1300 audit(1707434657.969:861): arch=c000003e syscall=175 success=yes exit=0 a0=5649d7fa55e0 a1=153bc a2=5649d7dae2b0 a3=5 items=0 ppid=9 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:18.041937 kernel: audit: type=1327 audit(1707434657.969:861): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:24:18.047983 kernel: Failed to create system directory fscache Feb 8 23:24:18.048033 kernel: audit: type=1400 audit(1707434658.036:862): avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.048055 kernel: Failed to create system directory fscache Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.052870 kernel: audit: type=1400 audit(1707434658.036:862): avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.052923 kernel: Failed to create system directory fscache Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.057800 kernel: audit: type=1400 audit(1707434658.036:862): avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.057852 kernel: Failed to create system directory fscache Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.062507 kernel: audit: type=1400 audit(1707434658.036:862): avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.062550 kernel: Failed to create system directory fscache Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.064494 kernel: Failed to create system directory fscache Feb 8 23:24:18.064524 kernel: Failed to create system directory fscache Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.066447 kernel: Failed to create system directory fscache Feb 8 23:24:18.066475 kernel: Failed to create system directory fscache Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.069340 kernel: Failed to create system directory fscache Feb 8 23:24:18.069376 kernel: Failed to create system directory fscache Feb 8 23:24:18.069393 kernel: Failed to create system directory fscache Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.071275 kernel: Failed to create system directory fscache Feb 8 23:24:18.071327 kernel: Failed to create system directory fscache Feb 8 23:24:18.036000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.074514 kernel: FS-Cache: Loaded Feb 8 23:24:18.036000 audit[3184]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5649d81ba9c0 a1=4c0fc a2=5649d7dae2b0 a3=5 items=0 ppid=9 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:18.036000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.117473 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.117537 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.117558 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.118462 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.120346 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.120404 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.121296 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.122251 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.124368 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.124411 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.126248 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.126312 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.128167 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.128219 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.130086 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.130133 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.131986 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.132041 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.132953 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.133897 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.135857 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.135927 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.137848 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.137898 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.139790 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.139851 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.141692 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.141747 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.143587 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.143637 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.145495 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.145547 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.148339 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.148396 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.148443 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.149286 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.151167 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.151230 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.153077 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.153133 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.154979 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.155044 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.156900 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.156944 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.158827 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.158878 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.160785 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.160830 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.162707 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.162758 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.163710 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.164721 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.165723 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.166683 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.167503 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.169492 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.169607 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.170319 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.171186 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.172113 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.173006 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.173914 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.174889 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.175861 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.176851 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.177691 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.178721 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.179696 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.180618 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.181571 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.183508 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.183695 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.186373 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.186499 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.186553 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.187365 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.188391 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.189331 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.190341 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.191267 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.192364 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.193253 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.194241 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.195256 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.196252 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.197222 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.198123 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.199094 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.200086 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.201062 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.201985 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.202975 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.203916 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.204893 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.205853 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.206768 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.207613 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.208891 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.209624 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.214502 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.215557 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.217241 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.220232 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.220412 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.221506 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.222587 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.223606 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.225740 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.225877 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.226800 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.227853 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.228950 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.230083 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.231271 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.232363 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.233361 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.234359 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.235378 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.236484 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.237594 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.238523 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.239555 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.240569 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.241590 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.242580 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.099000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.244695 kernel: Failed to create system directory sunrpc Feb 8 23:24:18.258291 kernel: RPC: Registered named UNIX socket transport module. Feb 8 23:24:18.258508 kernel: RPC: Registered udp transport module. Feb 8 23:24:18.258566 kernel: RPC: Registered tcp transport module. Feb 8 23:24:18.259221 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 8 23:24:18.099000 audit[3184]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5649d8206ad0 a1=1588c4 a2=5649d7dae2b0 a3=5 items=6 ppid=9 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:18.099000 audit: CWD cwd="/" Feb 8 23:24:18.099000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:24:18.099000 audit: PATH item=1 name=(null) inode=24184 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:24:18.099000 audit: PATH item=2 name=(null) inode=24184 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:24:18.099000 audit: PATH item=3 name=(null) inode=24185 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:24:18.099000 audit: PATH item=4 name=(null) inode=24184 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:24:18.099000 audit: PATH item=5 name=(null) inode=24186 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 8 23:24:18.099000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.339636 kernel: Failed to create system directory nfs Feb 8 23:24:18.339814 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.342212 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.347054 kernel: Failed to create system directory nfs Feb 8 23:24:18.347137 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.349461 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.351924 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.355065 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.357456 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.359831 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.362258 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.367011 kernel: Failed to create system directory nfs Feb 8 23:24:18.367152 kernel: Failed to create system directory nfs Feb 8 23:24:18.367182 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.371263 kernel: Failed to create system directory nfs Feb 8 23:24:18.371312 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.375474 kernel: Failed to create system directory nfs Feb 8 23:24:18.375516 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.384888 kernel: Failed to create system directory nfs Feb 8 23:24:18.384939 kernel: Failed to create system directory nfs Feb 8 23:24:18.384987 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.391154 kernel: Failed to create system directory nfs Feb 8 23:24:18.391284 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.395714 kernel: Failed to create system directory nfs Feb 8 23:24:18.395763 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.399945 kernel: Failed to create system directory nfs Feb 8 23:24:18.400043 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.404196 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.407523 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.411493 kernel: Failed to create system directory nfs Feb 8 23:24:18.411560 kernel: Failed to create system directory nfs Feb 8 23:24:18.411592 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.412921 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.413779 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.414626 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.415480 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.417241 kernel: Failed to create system directory nfs Feb 8 23:24:18.417310 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.418099 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.419050 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.420208 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.421039 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.421937 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.422787 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.423633 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.425482 kernel: Failed to create system directory nfs Feb 8 23:24:18.425540 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.427273 kernel: Failed to create system directory nfs Feb 8 23:24:18.427349 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.428197 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.429111 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.430030 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.430936 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.431857 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.432765 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.433618 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.434477 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.436167 kernel: Failed to create system directory nfs Feb 8 23:24:18.436220 kernel: Failed to create system directory nfs Feb 8 23:24:18.325000 audit[3184]: AVC avc: denied { confidentiality } for pid=3184 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.453470 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 8 23:24:18.325000 audit[3184]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5649d83a9680 a1=e29dc a2=5649d7dae2b0 a3=5 items=0 ppid=9 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:18.325000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.505163 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.505274 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.505320 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.507173 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.507257 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.509124 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.509219 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.511193 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.511259 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.513079 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.513185 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.515000 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.515081 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.516941 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.517007 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.518812 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.518878 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.520710 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.520790 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.522578 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.522664 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.524560 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.524630 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.526474 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.526566 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.527309 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.528320 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.529266 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.530155 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.531158 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.532062 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.533067 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.534972 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.535058 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.535864 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.536869 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.538763 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.538848 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.539674 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.540670 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.542577 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.542662 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.544450 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.544521 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.545409 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.546351 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.547290 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.548199 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.549158 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.551207 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.551294 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.552111 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.553110 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.555025 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.555116 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.556954 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.557040 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.558866 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.558952 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.559803 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.562147 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.562216 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.564059 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.564148 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.565977 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.566047 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.567929 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.568017 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.568801 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.569799 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.570700 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.571722 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.572634 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.573636 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.575573 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.575683 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.577482 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.577613 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.578333 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.579332 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.580225 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.581245 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.583142 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.583227 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.584043 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.585055 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.586954 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.587068 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.587854 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.592651 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.600754 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.600846 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.600943 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.600983 kernel: Failed to create system directory nfs4 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.484000 audit[3189]: AVC avc: denied { confidentiality } for pid=3189 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.761959 kubelet[1378]: E0208 23:24:18.761870 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:18.776676 kernel: NFS: Registering the id_resolver key type Feb 8 23:24:18.776802 kernel: Key type id_resolver registered Feb 8 23:24:18.776825 kernel: Key type id_legacy registered Feb 8 23:24:18.484000 audit[3189]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f6ab2aaf010 a1=1d3cc4 a2=55b7182e22b0 a3=5 items=0 ppid=9 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:18.484000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.790559 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.792797 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.792842 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.793981 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.795119 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.796235 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.797322 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.798363 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.800552 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.800597 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.801677 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.802765 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.803901 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.804982 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.806090 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.807180 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.808233 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.809311 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.810375 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.812510 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.812563 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.813598 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.814665 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.815737 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.816811 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.817878 kernel: Failed to create system directory rpcgss Feb 8 23:24:18.785000 audit[3190]: AVC avc: denied { confidentiality } for pid=3190 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 8 23:24:18.785000 audit[3190]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f6061556010 a1=4f524 a2=557c8a1582b0 a3=5 items=0 ppid=9 pid=3190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:18.785000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 8 23:24:18.864147 nfsidmap[3198]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Feb 8 23:24:18.875277 nfsidmap[3199]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Feb 8 23:24:18.897000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2559 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:24:18.897000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2559 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:24:18.897000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2559 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:24:18.899000 audit[1125]: AVC avc: denied { watch_reads } for pid=1125 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2559 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:24:18.899000 audit[1125]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a49f1b9650 a2=10 a3=66152cbb7a1df9e0 items=0 ppid=1 pid=1125 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:18.899000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 8 23:24:18.899000 audit[1125]: AVC avc: denied { watch_reads } for pid=1125 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2559 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:24:18.899000 audit[1125]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a49f1b9650 a2=10 a3=66152cbb7a1df9e0 items=0 ppid=1 pid=1125 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:18.899000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 8 23:24:18.899000 audit[1125]: AVC avc: denied { watch_reads } for pid=1125 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2559 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 8 23:24:18.899000 audit[1125]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55a49f1b9650 a2=10 a3=66152cbb7a1df9e0 items=0 ppid=1 pid=1125 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:18.899000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 8 23:24:19.031036 env[1057]: time="2024-02-08T23:24:19.030099963Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4b438716-00ac-4542-bd52-1dc597c974e2,Namespace:default,Attempt:0,}" Feb 8 23:24:19.378289 systemd-networkd[975]: cali5ec59c6bf6e: Link UP Feb 8 23:24:19.382353 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 8 23:24:19.382528 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 8 23:24:19.382836 systemd-networkd[975]: cali5ec59c6bf6e: Gained carrier Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.153 [INFO][3202] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.245-k8s-test--pod--1-eth0 default 4b438716-00ac-4542-bd52-1dc597c974e2 1279 0 2024-02-08 23:23:40 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.245 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.245-k8s-test--pod--1-" Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.153 [INFO][3202] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.245-k8s-test--pod--1-eth0" Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.256 [INFO][3214] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" HandleID="k8s-pod-network.6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" Workload="172.24.4.245-k8s-test--pod--1-eth0" Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.298 [INFO][3214] ipam_plugin.go 268: Auto assigning IP ContainerID="6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" HandleID="k8s-pod-network.6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" Workload="172.24.4.245-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051d20), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.245", "pod":"test-pod-1", "timestamp":"2024-02-08 23:24:19.25628912 +0000 UTC"}, Hostname:"172.24.4.245", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.299 [INFO][3214] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.299 [INFO][3214] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.299 [INFO][3214] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.245' Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.302 [INFO][3214] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" host="172.24.4.245" Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.308 [INFO][3214] ipam.go 372: Looking up existing affinities for host host="172.24.4.245" Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.331 [INFO][3214] ipam.go 489: Trying affinity for 192.168.89.64/26 host="172.24.4.245" Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.338 [INFO][3214] ipam.go 155: Attempting to load block cidr=192.168.89.64/26 host="172.24.4.245" Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.346 [INFO][3214] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.89.64/26 host="172.24.4.245" Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.346 [INFO][3214] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.89.64/26 handle="k8s-pod-network.6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" host="172.24.4.245" Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.348 [INFO][3214] ipam.go 1682: Creating new handle: k8s-pod-network.6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4 Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.355 [INFO][3214] ipam.go 1203: Writing block in order to claim IPs block=192.168.89.64/26 handle="k8s-pod-network.6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" host="172.24.4.245" Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.365 [INFO][3214] ipam.go 1216: Successfully claimed IPs: [192.168.89.69/26] block=192.168.89.64/26 handle="k8s-pod-network.6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" host="172.24.4.245" Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.365 [INFO][3214] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.89.69/26] handle="k8s-pod-network.6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" host="172.24.4.245" Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.366 [INFO][3214] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.366 [INFO][3214] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.89.69/26] IPv6=[] ContainerID="6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" HandleID="k8s-pod-network.6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" Workload="172.24.4.245-k8s-test--pod--1-eth0" Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.369 [INFO][3202] k8s.go 385: Populated endpoint ContainerID="6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.245-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4b438716-00ac-4542-bd52-1dc597c974e2", ResourceVersion:"1279", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:24:19.413530 env[1057]: 2024-02-08 23:24:19.370 [INFO][3202] k8s.go 386: Calico CNI using IPs: [192.168.89.69/32] ContainerID="6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.245-k8s-test--pod--1-eth0" Feb 8 23:24:19.414913 env[1057]: 2024-02-08 23:24:19.370 [INFO][3202] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.245-k8s-test--pod--1-eth0" Feb 8 23:24:19.414913 env[1057]: 2024-02-08 23:24:19.383 [INFO][3202] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.245-k8s-test--pod--1-eth0" Feb 8 23:24:19.414913 env[1057]: 2024-02-08 23:24:19.384 [INFO][3202] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.245-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.245-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4b438716-00ac-4542-bd52-1dc597c974e2", ResourceVersion:"1279", Generation:0, CreationTimestamp:time.Date(2024, time.February, 8, 23, 23, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.245", ContainerID:"6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.89.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"42:f8:c3:19:59:59", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 8 23:24:19.414913 env[1057]: 2024-02-08 23:24:19.401 [INFO][3202] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.245-k8s-test--pod--1-eth0" Feb 8 23:24:19.428000 audit[3241]: NETFILTER_CFG table=filter:96 family=2 entries=38 op=nft_register_chain pid=3241 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 8 23:24:19.428000 audit[3241]: SYSCALL arch=c000003e syscall=46 success=yes exit=19064 a0=3 a1=7fffd7b7aba0 a2=0 a3=7fffd7b7ab8c items=0 ppid=2185 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:19.428000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 8 23:24:19.486486 env[1057]: time="2024-02-08T23:24:19.486175695Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 8 23:24:19.486486 env[1057]: time="2024-02-08T23:24:19.486222443Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 8 23:24:19.486486 env[1057]: time="2024-02-08T23:24:19.486238503Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 8 23:24:19.486486 env[1057]: time="2024-02-08T23:24:19.486363247Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4 pid=3262 runtime=io.containerd.runc.v2 Feb 8 23:24:19.504286 systemd[1]: Started cri-containerd-6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4.scope. Feb 8 23:24:19.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.521000 audit: BPF prog-id=119 op=LOAD Feb 8 23:24:19.523000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.523000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3262 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:19.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333866306532373532316633316130663935663233646663636439 Feb 8 23:24:19.523000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.523000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3262 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:19.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333866306532373532316633316130663935663233646663636439 Feb 8 23:24:19.524000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.524000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.524000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.524000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.524000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.524000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.524000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.524000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.524000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.524000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.524000 audit: BPF prog-id=120 op=LOAD Feb 8 23:24:19.524000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003e8a50 items=0 ppid=3262 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:19.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333866306532373532316633316130663935663233646663636439 Feb 8 23:24:19.525000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.525000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.525000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.525000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.525000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.525000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.525000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.525000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.525000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.525000 audit: BPF prog-id=121 op=LOAD Feb 8 23:24:19.525000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003e8a98 items=0 ppid=3262 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:19.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333866306532373532316633316130663935663233646663636439 Feb 8 23:24:19.526000 audit: BPF prog-id=121 op=UNLOAD Feb 8 23:24:19.526000 audit: BPF prog-id=120 op=UNLOAD Feb 8 23:24:19.526000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.526000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.526000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.526000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.526000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.526000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.526000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.526000 audit[3270]: AVC avc: denied { perfmon } for pid=3270 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.526000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.526000 audit[3270]: AVC avc: denied { bpf } for pid=3270 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:19.526000 audit: BPF prog-id=122 op=LOAD Feb 8 23:24:19.526000 audit[3270]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003e8ea8 items=0 ppid=3262 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:19.526000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635333866306532373532316633316130663935663233646663636439 Feb 8 23:24:19.566034 env[1057]: time="2024-02-08T23:24:19.565984843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4b438716-00ac-4542-bd52-1dc597c974e2,Namespace:default,Attempt:0,} returns sandbox id \"6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4\"" Feb 8 23:24:19.568332 env[1057]: time="2024-02-08T23:24:19.568305658Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 8 23:24:19.666531 kubelet[1378]: E0208 23:24:19.665311 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:19.762269 kubelet[1378]: E0208 23:24:19.762010 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:20.089716 env[1057]: time="2024-02-08T23:24:20.089646881Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:20.094146 env[1057]: time="2024-02-08T23:24:20.094094499Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:20.098730 env[1057]: time="2024-02-08T23:24:20.098650729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:20.102721 env[1057]: time="2024-02-08T23:24:20.102662308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 8 23:24:20.104775 env[1057]: time="2024-02-08T23:24:20.104717395Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 8 23:24:20.111297 env[1057]: time="2024-02-08T23:24:20.111204449Z" level=info msg="CreateContainer within sandbox \"6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 8 23:24:20.150879 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1947596643.mount: Deactivated successfully. Feb 8 23:24:20.168330 env[1057]: time="2024-02-08T23:24:20.168211466Z" level=info msg="CreateContainer within sandbox \"6538f0e27521f31a0f95f23dfccd912b1f78bef40009cbee6e434b3d438da3c4\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"5239d2d4bab64896468d848d0b785e60d50d2c9f8657ec210a38fe3573109e64\"" Feb 8 23:24:20.170111 env[1057]: time="2024-02-08T23:24:20.170048163Z" level=info msg="StartContainer for \"5239d2d4bab64896468d848d0b785e60d50d2c9f8657ec210a38fe3573109e64\"" Feb 8 23:24:20.213564 systemd[1]: Started cri-containerd-5239d2d4bab64896468d848d0b785e60d50d2c9f8657ec210a38fe3573109e64.scope. Feb 8 23:24:20.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.231000 audit: BPF prog-id=123 op=LOAD Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3262 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:20.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333964326434626162363438393634363864383438643062373835 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3262 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:20.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333964326434626162363438393634363864383438643062373835 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit: BPF prog-id=124 op=LOAD Feb 8 23:24:20.232000 audit[3304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000286df0 items=0 ppid=3262 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:20.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333964326434626162363438393634363864383438643062373835 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit: BPF prog-id=125 op=LOAD Feb 8 23:24:20.232000 audit[3304]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000286e38 items=0 ppid=3262 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:20.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333964326434626162363438393634363864383438643062373835 Feb 8 23:24:20.232000 audit: BPF prog-id=125 op=UNLOAD Feb 8 23:24:20.232000 audit: BPF prog-id=124 op=UNLOAD Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { perfmon } for pid=3304 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit[3304]: AVC avc: denied { bpf } for pid=3304 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 8 23:24:20.232000 audit: BPF prog-id=126 op=LOAD Feb 8 23:24:20.232000 audit[3304]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000287248 items=0 ppid=3262 pid=3304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 8 23:24:20.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333964326434626162363438393634363864383438643062373835 Feb 8 23:24:20.336105 env[1057]: time="2024-02-08T23:24:20.336062496Z" level=info msg="StartContainer for \"5239d2d4bab64896468d848d0b785e60d50d2c9f8657ec210a38fe3573109e64\" returns successfully" Feb 8 23:24:20.448997 kubelet[1378]: I0208 23:24:20.447646 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=39.910150388 podCreationTimestamp="2024-02-08 23:23:40 +0000 UTC" firstStartedPulling="2024-02-08 23:24:19.568000494 +0000 UTC m=+100.677300622" lastFinishedPulling="2024-02-08 23:24:20.105340333 +0000 UTC m=+101.214640501" observedRunningTime="2024-02-08 23:24:20.447266015 +0000 UTC m=+101.556566183" watchObservedRunningTime="2024-02-08 23:24:20.447490267 +0000 UTC m=+101.556790435" Feb 8 23:24:20.763045 kubelet[1378]: E0208 23:24:20.762929 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:21.005806 systemd-networkd[975]: cali5ec59c6bf6e: Gained IPv6LL Feb 8 23:24:21.763945 kubelet[1378]: E0208 23:24:21.763895 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:22.765771 kubelet[1378]: E0208 23:24:22.765667 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:23.766336 kubelet[1378]: E0208 23:24:23.766164 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:24.766501 kubelet[1378]: E0208 23:24:24.766405 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:25.767715 kubelet[1378]: E0208 23:24:25.767619 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:26.769643 kubelet[1378]: E0208 23:24:26.769600 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:27.771405 kubelet[1378]: E0208 23:24:27.771350 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:28.773077 kubelet[1378]: E0208 23:24:28.772976 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:29.774666 kubelet[1378]: E0208 23:24:29.774577 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:30.775242 kubelet[1378]: E0208 23:24:30.775170 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:31.776103 kubelet[1378]: E0208 23:24:31.776020 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 8 23:24:32.777080 kubelet[1378]: E0208 23:24:32.776981 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"