Feb 9 19:33:40.022201 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:33:40.022223 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:33:40.022234 kernel: BIOS-provided physical RAM map: Feb 9 19:33:40.022241 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 9 19:33:40.022248 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 9 19:33:40.022254 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 9 19:33:40.022262 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Feb 9 19:33:40.022269 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Feb 9 19:33:40.022277 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 9 19:33:40.022284 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 9 19:33:40.022290 kernel: NX (Execute Disable) protection: active Feb 9 19:33:40.022297 kernel: SMBIOS 2.8 present. Feb 9 19:33:40.022303 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Feb 9 19:33:40.022310 kernel: Hypervisor detected: KVM Feb 9 19:33:40.022318 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 19:33:40.022327 kernel: kvm-clock: cpu 0, msr 21faa001, primary cpu clock Feb 9 19:33:40.022334 kernel: kvm-clock: using sched offset of 9205969611 cycles Feb 9 19:33:40.022341 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 19:33:40.022349 kernel: tsc: Detected 1996.249 MHz processor Feb 9 19:33:40.022356 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:33:40.022364 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:33:40.022371 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Feb 9 19:33:40.022378 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:33:40.022387 kernel: ACPI: Early table checksum verification disabled Feb 9 19:33:40.022394 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Feb 9 19:33:40.022401 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:33:40.022409 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:33:40.022416 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:33:40.022423 kernel: ACPI: FACS 0x000000007FFE0000 000040 Feb 9 19:33:40.022430 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:33:40.022437 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:33:40.022444 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Feb 9 19:33:40.022453 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Feb 9 19:33:40.022460 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Feb 9 19:33:40.022467 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Feb 9 19:33:40.022474 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Feb 9 19:33:40.022481 kernel: No NUMA configuration found Feb 9 19:33:40.022489 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Feb 9 19:33:40.022496 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Feb 9 19:33:40.022503 kernel: Zone ranges: Feb 9 19:33:40.022515 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:33:40.022523 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Feb 9 19:33:40.022530 kernel: Normal empty Feb 9 19:33:40.022538 kernel: Movable zone start for each node Feb 9 19:33:40.022545 kernel: Early memory node ranges Feb 9 19:33:40.022553 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 9 19:33:40.022562 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Feb 9 19:33:40.022569 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Feb 9 19:33:40.022577 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:33:40.022584 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 9 19:33:40.022592 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Feb 9 19:33:40.022599 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 9 19:33:40.022607 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 19:33:40.022614 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:33:40.022622 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 19:33:40.022631 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 19:33:40.022638 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:33:40.022646 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 19:33:40.022653 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 19:33:40.022661 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:33:40.022668 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:33:40.022676 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Feb 9 19:33:40.022683 kernel: Booting paravirtualized kernel on KVM Feb 9 19:33:40.022691 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:33:40.022700 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:33:40.022707 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:33:40.022715 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:33:40.022722 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:33:40.022730 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Feb 9 19:33:40.022737 kernel: kvm-guest: PV spinlocks disabled, no host support Feb 9 19:33:40.022745 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Feb 9 19:33:40.022752 kernel: Policy zone: DMA32 Feb 9 19:33:40.022761 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:33:40.022784 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:33:40.022792 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 19:33:40.022799 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:33:40.022807 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:33:40.022815 kernel: Memory: 1975340K/2096620K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121020K reserved, 0K cma-reserved) Feb 9 19:33:40.022823 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:33:40.022830 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:33:40.022837 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:33:40.022847 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:33:40.022856 kernel: rcu: RCU event tracing is enabled. Feb 9 19:33:40.022864 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:33:40.022871 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:33:40.022879 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:33:40.022887 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:33:40.022894 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:33:40.022902 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 19:33:40.022909 kernel: Console: colour VGA+ 80x25 Feb 9 19:33:40.022918 kernel: printk: console [tty0] enabled Feb 9 19:33:40.022926 kernel: printk: console [ttyS0] enabled Feb 9 19:33:40.022933 kernel: ACPI: Core revision 20210730 Feb 9 19:33:40.022941 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:33:40.022948 kernel: x2apic enabled Feb 9 19:33:40.022956 kernel: Switched APIC routing to physical x2apic. Feb 9 19:33:40.022963 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 19:33:40.022971 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 9 19:33:40.022978 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Feb 9 19:33:40.022988 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Feb 9 19:33:40.022996 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Feb 9 19:33:40.023003 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:33:40.023011 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 19:33:40.023018 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:33:40.023026 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:33:40.023034 kernel: Speculative Store Bypass: Vulnerable Feb 9 19:33:40.023041 kernel: x86/fpu: x87 FPU will use FXSAVE Feb 9 19:33:40.023049 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:33:40.023057 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:33:40.023065 kernel: LSM: Security Framework initializing Feb 9 19:33:40.023072 kernel: SELinux: Initializing. Feb 9 19:33:40.023080 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 19:33:40.023087 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 19:33:40.023095 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Feb 9 19:33:40.023103 kernel: Performance Events: AMD PMU driver. Feb 9 19:33:40.023110 kernel: ... version: 0 Feb 9 19:33:40.023118 kernel: ... bit width: 48 Feb 9 19:33:40.023127 kernel: ... generic registers: 4 Feb 9 19:33:40.023140 kernel: ... value mask: 0000ffffffffffff Feb 9 19:33:40.023148 kernel: ... max period: 00007fffffffffff Feb 9 19:33:40.023157 kernel: ... fixed-purpose events: 0 Feb 9 19:33:40.023165 kernel: ... event mask: 000000000000000f Feb 9 19:33:40.023172 kernel: signal: max sigframe size: 1440 Feb 9 19:33:40.023180 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:33:40.023188 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:33:40.023196 kernel: x86: Booting SMP configuration: Feb 9 19:33:40.023205 kernel: .... node #0, CPUs: #1 Feb 9 19:33:40.023213 kernel: kvm-clock: cpu 1, msr 21faa041, secondary cpu clock Feb 9 19:33:40.023221 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Feb 9 19:33:40.023229 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:33:40.023237 kernel: smpboot: Max logical packages: 2 Feb 9 19:33:40.023245 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Feb 9 19:33:40.023253 kernel: devtmpfs: initialized Feb 9 19:33:40.023260 kernel: x86/mm: Memory block size: 128MB Feb 9 19:33:40.023268 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:33:40.023278 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:33:40.023286 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:33:40.023294 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:33:40.023302 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:33:40.023310 kernel: audit: type=2000 audit(1707507219.186:1): state=initialized audit_enabled=0 res=1 Feb 9 19:33:40.023318 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:33:40.023326 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:33:40.023333 kernel: cpuidle: using governor menu Feb 9 19:33:40.023343 kernel: ACPI: bus type PCI registered Feb 9 19:33:40.023351 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:33:40.023359 kernel: dca service started, version 1.12.1 Feb 9 19:33:40.023367 kernel: PCI: Using configuration type 1 for base access Feb 9 19:33:40.023375 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:33:40.023383 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:33:40.023391 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:33:40.023399 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:33:40.023407 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:33:40.023415 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:33:40.023425 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:33:40.023432 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:33:40.023440 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:33:40.023448 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 19:33:40.023456 kernel: ACPI: Interpreter enabled Feb 9 19:33:40.023464 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 19:33:40.023472 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:33:40.023480 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:33:40.023488 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 9 19:33:40.023497 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 19:33:40.023652 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:33:40.023738 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 19:33:40.023750 kernel: acpiphp: Slot [3] registered Feb 9 19:33:40.023758 kernel: acpiphp: Slot [4] registered Feb 9 19:33:40.023766 kernel: acpiphp: Slot [5] registered Feb 9 19:33:40.024233 kernel: acpiphp: Slot [6] registered Feb 9 19:33:40.024246 kernel: acpiphp: Slot [7] registered Feb 9 19:33:40.024254 kernel: acpiphp: Slot [8] registered Feb 9 19:33:40.024262 kernel: acpiphp: Slot [9] registered Feb 9 19:33:40.024272 kernel: acpiphp: Slot [10] registered Feb 9 19:33:40.024293 kernel: acpiphp: Slot [11] registered Feb 9 19:33:40.024310 kernel: acpiphp: Slot [12] registered Feb 9 19:33:40.024322 kernel: acpiphp: Slot [13] registered Feb 9 19:33:40.024334 kernel: acpiphp: Slot [14] registered Feb 9 19:33:40.024349 kernel: acpiphp: Slot [15] registered Feb 9 19:33:40.024361 kernel: acpiphp: Slot [16] registered Feb 9 19:33:40.024370 kernel: acpiphp: Slot [17] registered Feb 9 19:33:40.024379 kernel: acpiphp: Slot [18] registered Feb 9 19:33:40.024387 kernel: acpiphp: Slot [19] registered Feb 9 19:33:40.024396 kernel: acpiphp: Slot [20] registered Feb 9 19:33:40.024405 kernel: acpiphp: Slot [21] registered Feb 9 19:33:40.024413 kernel: acpiphp: Slot [22] registered Feb 9 19:33:40.024423 kernel: acpiphp: Slot [23] registered Feb 9 19:33:40.024435 kernel: acpiphp: Slot [24] registered Feb 9 19:33:40.024448 kernel: acpiphp: Slot [25] registered Feb 9 19:33:40.024466 kernel: acpiphp: Slot [26] registered Feb 9 19:33:40.024477 kernel: acpiphp: Slot [27] registered Feb 9 19:33:40.024486 kernel: acpiphp: Slot [28] registered Feb 9 19:33:40.024495 kernel: acpiphp: Slot [29] registered Feb 9 19:33:40.024505 kernel: acpiphp: Slot [30] registered Feb 9 19:33:40.024515 kernel: acpiphp: Slot [31] registered Feb 9 19:33:40.024529 kernel: PCI host bridge to bus 0000:00 Feb 9 19:33:40.024645 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 19:33:40.024725 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 19:33:40.026443 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 19:33:40.026524 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 9 19:33:40.026597 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 9 19:33:40.026668 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 19:33:40.026782 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 19:33:40.026883 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 19:33:40.026994 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 9 19:33:40.027079 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Feb 9 19:33:40.027164 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 9 19:33:40.027244 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 9 19:33:40.027325 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 9 19:33:40.027406 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 9 19:33:40.027504 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 19:33:40.027589 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 9 19:33:40.027670 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 9 19:33:40.027808 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 9 19:33:40.027932 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 9 19:33:40.028020 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 9 19:33:40.028116 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Feb 9 19:33:40.028209 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Feb 9 19:33:40.028295 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 19:33:40.028431 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 9 19:33:40.028539 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Feb 9 19:33:40.028629 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Feb 9 19:33:40.028726 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 9 19:33:40.031899 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Feb 9 19:33:40.032007 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 9 19:33:40.032110 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 9 19:33:40.032229 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Feb 9 19:33:40.032334 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 9 19:33:40.032433 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Feb 9 19:33:40.032521 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Feb 9 19:33:40.032607 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 9 19:33:40.032704 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 19:33:40.032812 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Feb 9 19:33:40.032902 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 9 19:33:40.032914 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 19:33:40.032924 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 19:33:40.032933 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 19:33:40.032941 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 19:33:40.032950 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 19:33:40.032968 kernel: iommu: Default domain type: Translated Feb 9 19:33:40.032977 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:33:40.033063 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 9 19:33:40.033147 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 19:33:40.033233 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 9 19:33:40.033245 kernel: vgaarb: loaded Feb 9 19:33:40.033254 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:33:40.033263 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:33:40.033272 kernel: PTP clock support registered Feb 9 19:33:40.033284 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:33:40.033292 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 19:33:40.033301 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 9 19:33:40.033309 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Feb 9 19:33:40.033318 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 19:33:40.033327 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:33:40.033335 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:33:40.033344 kernel: pnp: PnP ACPI init Feb 9 19:33:40.033439 kernel: pnp 00:03: [dma 2] Feb 9 19:33:40.033458 kernel: pnp: PnP ACPI: found 5 devices Feb 9 19:33:40.033466 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:33:40.033475 kernel: NET: Registered PF_INET protocol family Feb 9 19:33:40.033483 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 19:33:40.033492 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 9 19:33:40.033501 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:33:40.033510 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:33:40.033519 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 19:33:40.033529 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 9 19:33:40.033538 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 19:33:40.033547 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 19:33:40.033555 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:33:40.033564 kernel: NET: Registered PF_XDP protocol family Feb 9 19:33:40.033658 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 19:33:40.033752 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 19:33:40.036914 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 19:33:40.037005 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 9 19:33:40.037082 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 9 19:33:40.037175 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 9 19:33:40.037265 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 19:33:40.037352 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 19:33:40.037365 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:33:40.037375 kernel: Initialise system trusted keyrings Feb 9 19:33:40.037384 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 9 19:33:40.037396 kernel: Key type asymmetric registered Feb 9 19:33:40.037405 kernel: Asymmetric key parser 'x509' registered Feb 9 19:33:40.037414 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:33:40.037422 kernel: io scheduler mq-deadline registered Feb 9 19:33:40.037431 kernel: io scheduler kyber registered Feb 9 19:33:40.037439 kernel: io scheduler bfq registered Feb 9 19:33:40.037448 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:33:40.037457 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 9 19:33:40.037466 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 19:33:40.037477 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 9 19:33:40.037486 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 19:33:40.037494 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:33:40.037503 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:33:40.037512 kernel: random: crng init done Feb 9 19:33:40.037520 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 19:33:40.037529 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 19:33:40.037537 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 19:33:40.037653 kernel: rtc_cmos 00:04: RTC can wake from S4 Feb 9 19:33:40.037682 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 19:33:40.037755 kernel: rtc_cmos 00:04: registered as rtc0 Feb 9 19:33:40.037853 kernel: rtc_cmos 00:04: setting system clock to 2024-02-09T19:33:39 UTC (1707507219) Feb 9 19:33:40.037959 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Feb 9 19:33:40.037978 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:33:40.037987 kernel: Segment Routing with IPv6 Feb 9 19:33:40.037995 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:33:40.038003 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:33:40.038014 kernel: Key type dns_resolver registered Feb 9 19:33:40.038022 kernel: IPI shorthand broadcast: enabled Feb 9 19:33:40.038030 kernel: sched_clock: Marking stable (689873526, 123156308)->(843295711, -30265877) Feb 9 19:33:40.038038 kernel: registered taskstats version 1 Feb 9 19:33:40.038046 kernel: Loading compiled-in X.509 certificates Feb 9 19:33:40.038054 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:33:40.038062 kernel: Key type .fscrypt registered Feb 9 19:33:40.038070 kernel: Key type fscrypt-provisioning registered Feb 9 19:33:40.038078 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 19:33:40.038088 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:33:40.038096 kernel: ima: No architecture policies found Feb 9 19:33:40.038104 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:33:40.038112 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:33:40.038120 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:33:40.038128 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:33:40.038136 kernel: Run /init as init process Feb 9 19:33:40.038144 kernel: with arguments: Feb 9 19:33:40.038151 kernel: /init Feb 9 19:33:40.038161 kernel: with environment: Feb 9 19:33:40.038169 kernel: HOME=/ Feb 9 19:33:40.038176 kernel: TERM=linux Feb 9 19:33:40.038184 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:33:40.038195 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:33:40.038206 systemd[1]: Detected virtualization kvm. Feb 9 19:33:40.038215 systemd[1]: Detected architecture x86-64. Feb 9 19:33:40.038225 systemd[1]: Running in initrd. Feb 9 19:33:40.038234 systemd[1]: No hostname configured, using default hostname. Feb 9 19:33:40.038242 systemd[1]: Hostname set to . Feb 9 19:33:40.038251 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:33:40.038260 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:33:40.038268 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:33:40.038277 systemd[1]: Reached target cryptsetup.target. Feb 9 19:33:40.038285 systemd[1]: Reached target paths.target. Feb 9 19:33:40.038294 systemd[1]: Reached target slices.target. Feb 9 19:33:40.038305 systemd[1]: Reached target swap.target. Feb 9 19:33:40.038313 systemd[1]: Reached target timers.target. Feb 9 19:33:40.038322 systemd[1]: Listening on iscsid.socket. Feb 9 19:33:40.038331 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:33:40.038339 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:33:40.038348 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:33:40.038356 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:33:40.038367 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:33:40.038375 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:33:40.038384 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:33:40.038392 systemd[1]: Reached target sockets.target. Feb 9 19:33:40.038401 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:33:40.038417 systemd[1]: Finished network-cleanup.service. Feb 9 19:33:40.038428 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:33:40.038438 systemd[1]: Starting systemd-journald.service... Feb 9 19:33:40.038447 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:33:40.038456 systemd[1]: Starting systemd-resolved.service... Feb 9 19:33:40.038465 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:33:40.038474 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:33:40.038482 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:33:40.038496 systemd-journald[185]: Journal started Feb 9 19:33:40.038548 systemd-journald[185]: Runtime Journal (/run/log/journal/78f8c1c1020e45fe8e2414688cdf2834) is 4.9M, max 39.5M, 34.5M free. Feb 9 19:33:40.024825 systemd-modules-load[186]: Inserted module 'overlay' Feb 9 19:33:40.067977 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:33:40.068023 kernel: Bridge firewalling registered Feb 9 19:33:40.068036 systemd[1]: Started systemd-journald.service. Feb 9 19:33:40.068049 kernel: audit: type=1130 audit(1707507220.062:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.038361 systemd-resolved[187]: Positive Trust Anchors: Feb 9 19:33:40.072308 kernel: audit: type=1130 audit(1707507220.067:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.038376 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:33:40.076975 kernel: audit: type=1130 audit(1707507220.071:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.038415 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:33:40.084047 kernel: audit: type=1130 audit(1707507220.076:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.043684 systemd-resolved[187]: Defaulting to hostname 'linux'. Feb 9 19:33:40.061849 systemd-modules-load[186]: Inserted module 'br_netfilter' Feb 9 19:33:40.068499 systemd[1]: Started systemd-resolved.service. Feb 9 19:33:40.073020 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:33:40.077680 systemd[1]: Reached target nss-lookup.target. Feb 9 19:33:40.089039 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:33:40.090793 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:33:40.105227 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:33:40.106806 kernel: SCSI subsystem initialized Feb 9 19:33:40.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.111795 kernel: audit: type=1130 audit(1707507220.107:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.111895 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:33:40.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.117793 kernel: audit: type=1130 audit(1707507220.112:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.118458 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:33:40.124595 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:33:40.124697 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:33:40.124727 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:33:40.130859 systemd-modules-load[186]: Inserted module 'dm_multipath' Feb 9 19:33:40.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.132449 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:33:40.138150 kernel: audit: type=1130 audit(1707507220.132:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.138171 dracut-cmdline[201]: dracut-dracut-053 Feb 9 19:33:40.138171 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:33:40.140883 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:33:40.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.144810 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:33:40.149204 kernel: audit: type=1130 audit(1707507220.144:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.230845 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:33:40.244848 kernel: iscsi: registered transport (tcp) Feb 9 19:33:40.272161 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:33:40.272278 kernel: QLogic iSCSI HBA Driver Feb 9 19:33:40.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.328470 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:33:40.337464 kernel: audit: type=1130 audit(1707507220.328:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.331572 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:33:40.431912 kernel: raid6: sse2x4 gen() 5286 MB/s Feb 9 19:33:40.448895 kernel: raid6: sse2x4 xor() 4872 MB/s Feb 9 19:33:40.465885 kernel: raid6: sse2x2 gen() 13577 MB/s Feb 9 19:33:40.482972 kernel: raid6: sse2x2 xor() 8448 MB/s Feb 9 19:33:40.499870 kernel: raid6: sse2x1 gen() 10639 MB/s Feb 9 19:33:40.517672 kernel: raid6: sse2x1 xor() 6577 MB/s Feb 9 19:33:40.517745 kernel: raid6: using algorithm sse2x2 gen() 13577 MB/s Feb 9 19:33:40.517810 kernel: raid6: .... xor() 8448 MB/s, rmw enabled Feb 9 19:33:40.518544 kernel: raid6: using ssse3x2 recovery algorithm Feb 9 19:33:40.533868 kernel: xor: measuring software checksum speed Feb 9 19:33:40.536335 kernel: prefetch64-sse : 18381 MB/sec Feb 9 19:33:40.536378 kernel: generic_sse : 16820 MB/sec Feb 9 19:33:40.536404 kernel: xor: using function: prefetch64-sse (18381 MB/sec) Feb 9 19:33:40.658827 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:33:40.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.669000 audit: BPF prog-id=7 op=LOAD Feb 9 19:33:40.669000 audit: BPF prog-id=8 op=LOAD Feb 9 19:33:40.669075 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:33:40.670936 systemd[1]: Starting systemd-udevd.service... Feb 9 19:33:40.687260 systemd-udevd[385]: Using default interface naming scheme 'v252'. Feb 9 19:33:40.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.692491 systemd[1]: Started systemd-udevd.service. Feb 9 19:33:40.695457 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:33:40.715850 dracut-pre-trigger[398]: rd.md=0: removing MD RAID activation Feb 9 19:33:40.769569 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:33:40.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.771216 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:33:40.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:40.813906 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:33:40.900815 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Feb 9 19:33:40.929798 kernel: libata version 3.00 loaded. Feb 9 19:33:40.933108 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 9 19:33:40.934799 kernel: scsi host0: ata_piix Feb 9 19:33:40.937811 kernel: scsi host1: ata_piix Feb 9 19:33:40.938019 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Feb 9 19:33:40.938035 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Feb 9 19:33:40.992492 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:33:40.992641 kernel: GPT:17805311 != 41943039 Feb 9 19:33:40.992670 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:33:40.992695 kernel: GPT:17805311 != 41943039 Feb 9 19:33:40.993189 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:33:40.994158 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:33:41.213851 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (437) Feb 9 19:33:41.237687 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:33:41.417223 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:33:41.430868 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:33:41.440466 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:33:41.443479 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:33:41.448867 systemd[1]: Starting disk-uuid.service... Feb 9 19:33:41.500963 disk-uuid[461]: Primary Header is updated. Feb 9 19:33:41.500963 disk-uuid[461]: Secondary Entries is updated. Feb 9 19:33:41.500963 disk-uuid[461]: Secondary Header is updated. Feb 9 19:33:41.512915 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:33:41.523833 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:33:42.606838 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:33:42.608495 disk-uuid[462]: The operation has completed successfully. Feb 9 19:33:42.828559 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:33:42.830553 systemd[1]: Finished disk-uuid.service. Feb 9 19:33:42.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:42.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:42.840267 systemd[1]: Starting verity-setup.service... Feb 9 19:33:42.862833 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Feb 9 19:33:42.988050 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:33:42.994906 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:33:43.005094 systemd[1]: Finished verity-setup.service. Feb 9 19:33:43.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:43.172829 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:33:43.173914 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:33:43.174540 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:33:43.175355 systemd[1]: Starting ignition-setup.service... Feb 9 19:33:43.178652 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:33:43.194555 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:33:43.194632 kernel: BTRFS info (device vda6): using free space tree Feb 9 19:33:43.194645 kernel: BTRFS info (device vda6): has skinny extents Feb 9 19:33:43.212653 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:33:43.226868 systemd[1]: Finished ignition-setup.service. Feb 9 19:33:43.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:43.228522 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:33:43.301372 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:33:43.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:43.303000 audit: BPF prog-id=9 op=LOAD Feb 9 19:33:43.305971 systemd[1]: Starting systemd-networkd.service... Feb 9 19:33:43.345843 systemd-networkd[632]: lo: Link UP Feb 9 19:33:43.346688 systemd-networkd[632]: lo: Gained carrier Feb 9 19:33:43.347809 systemd-networkd[632]: Enumeration completed Feb 9 19:33:43.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:43.348430 systemd[1]: Started systemd-networkd.service. Feb 9 19:33:43.349009 systemd[1]: Reached target network.target. Feb 9 19:33:43.350626 systemd[1]: Starting iscsiuio.service... Feb 9 19:33:43.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:43.353836 systemd-networkd[632]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:33:43.371401 iscsid[637]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:33:43.371401 iscsid[637]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 19:33:43.371401 iscsid[637]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:33:43.371401 iscsid[637]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:33:43.371401 iscsid[637]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:33:43.371401 iscsid[637]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:33:43.371401 iscsid[637]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:33:43.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:43.359150 systemd[1]: Started iscsiuio.service. Feb 9 19:33:43.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:43.362221 systemd[1]: Starting iscsid.service... Feb 9 19:33:43.362507 systemd-networkd[632]: eth0: Link UP Feb 9 19:33:43.362518 systemd-networkd[632]: eth0: Gained carrier Feb 9 19:33:43.368247 systemd[1]: Started iscsid.service. Feb 9 19:33:43.372794 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:33:43.385075 systemd-networkd[632]: eth0: DHCPv4 address 172.24.4.56/24, gateway 172.24.4.1 acquired from 172.24.4.1 Feb 9 19:33:43.386683 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:33:43.387648 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:33:43.389650 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:33:43.391323 systemd[1]: Reached target remote-fs.target. Feb 9 19:33:43.394059 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:33:43.405707 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:33:43.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:43.679572 ignition[566]: Ignition 2.14.0 Feb 9 19:33:43.679602 ignition[566]: Stage: fetch-offline Feb 9 19:33:43.679715 ignition[566]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:33:43.679812 ignition[566]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:33:43.682317 ignition[566]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:33:43.682543 ignition[566]: parsed url from cmdline: "" Feb 9 19:33:43.686152 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:33:43.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:43.682553 ignition[566]: no config URL provided Feb 9 19:33:43.682566 ignition[566]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:33:43.690600 systemd[1]: Starting ignition-fetch.service... Feb 9 19:33:43.682594 ignition[566]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:33:43.682607 ignition[566]: failed to fetch config: resource requires networking Feb 9 19:33:43.683489 ignition[566]: Ignition finished successfully Feb 9 19:33:43.709901 ignition[656]: Ignition 2.14.0 Feb 9 19:33:43.709929 ignition[656]: Stage: fetch Feb 9 19:33:43.710201 ignition[656]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:33:43.710246 ignition[656]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:33:43.712438 ignition[656]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:33:43.712661 ignition[656]: parsed url from cmdline: "" Feb 9 19:33:43.712670 ignition[656]: no config URL provided Feb 9 19:33:43.712683 ignition[656]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:33:43.712702 ignition[656]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:33:43.717145 ignition[656]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Feb 9 19:33:43.717182 ignition[656]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Feb 9 19:33:43.720602 ignition[656]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Feb 9 19:33:44.056673 ignition[656]: GET result: OK Feb 9 19:33:44.056943 ignition[656]: parsing config with SHA512: 8e6a0726b3bf666f8bd9dd71367ad2e10b04fc24058b77d7305b5f1019dc59f60a95a3169f740e70022003bde5eec696e3adf3c95160762eed01113ef5180f4d Feb 9 19:33:44.116629 unknown[656]: fetched base config from "system" Feb 9 19:33:44.116668 unknown[656]: fetched base config from "system" Feb 9 19:33:44.117850 ignition[656]: fetch: fetch complete Feb 9 19:33:44.116688 unknown[656]: fetched user config from "openstack" Feb 9 19:33:44.117865 ignition[656]: fetch: fetch passed Feb 9 19:33:44.121823 systemd[1]: Finished ignition-fetch.service. Feb 9 19:33:44.137421 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 9 19:33:44.137503 kernel: audit: type=1130 audit(1707507224.122:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.117954 ignition[656]: Ignition finished successfully Feb 9 19:33:44.128558 systemd[1]: Starting ignition-kargs.service... Feb 9 19:33:44.154860 ignition[662]: Ignition 2.14.0 Feb 9 19:33:44.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.154875 ignition[662]: Stage: kargs Feb 9 19:33:44.171209 kernel: audit: type=1130 audit(1707507224.166:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.165684 systemd[1]: Finished ignition-kargs.service. Feb 9 19:33:44.155030 ignition[662]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:33:44.168730 systemd[1]: Starting ignition-disks.service... Feb 9 19:33:44.155056 ignition[662]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:33:44.156212 ignition[662]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:33:44.157508 ignition[662]: kargs: kargs passed Feb 9 19:33:44.157554 ignition[662]: Ignition finished successfully Feb 9 19:33:44.188498 ignition[667]: Ignition 2.14.0 Feb 9 19:33:44.188527 ignition[667]: Stage: disks Feb 9 19:33:44.188839 ignition[667]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:33:44.188885 ignition[667]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:33:44.191172 ignition[667]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:33:44.193942 ignition[667]: disks: disks passed Feb 9 19:33:44.194052 ignition[667]: Ignition finished successfully Feb 9 19:33:44.205267 kernel: audit: type=1130 audit(1707507224.195:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.195189 systemd[1]: Finished ignition-disks.service. Feb 9 19:33:44.196259 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:33:44.205767 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:33:44.207302 systemd[1]: Reached target local-fs.target. Feb 9 19:33:44.208283 systemd[1]: Reached target sysinit.target. Feb 9 19:33:44.209238 systemd[1]: Reached target basic.target. Feb 9 19:33:44.211253 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:33:44.232363 systemd-fsck[674]: ROOT: clean, 602/1628000 files, 124051/1617920 blocks Feb 9 19:33:44.243433 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:33:44.254261 kernel: audit: type=1130 audit(1707507224.243:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.245485 systemd[1]: Mounting sysroot.mount... Feb 9 19:33:44.270885 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:33:44.272415 systemd[1]: Mounted sysroot.mount. Feb 9 19:33:44.273541 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:33:44.281397 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:33:44.282936 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:33:44.284130 systemd[1]: Starting flatcar-openstack-hostname.service... Feb 9 19:33:44.288956 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:33:44.289011 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:33:44.298949 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:33:44.306256 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:33:44.314068 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:33:44.327002 initrd-setup-root[686]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:33:44.343826 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (681) Feb 9 19:33:44.353502 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:33:44.353564 kernel: BTRFS info (device vda6): using free space tree Feb 9 19:33:44.353577 kernel: BTRFS info (device vda6): has skinny extents Feb 9 19:33:44.358506 initrd-setup-root[710]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:33:44.368412 initrd-setup-root[718]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:33:44.378387 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:33:44.379043 initrd-setup-root[728]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:33:44.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.694887 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:33:44.708551 kernel: audit: type=1130 audit(1707507224.695:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.698209 systemd[1]: Starting ignition-mount.service... Feb 9 19:33:44.709290 systemd[1]: Starting sysroot-boot.service... Feb 9 19:33:44.731692 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:33:44.731938 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:33:44.760749 ignition[749]: INFO : Ignition 2.14.0 Feb 9 19:33:44.764365 ignition[749]: INFO : Stage: mount Feb 9 19:33:44.765217 ignition[749]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:33:44.765962 ignition[749]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:33:44.767977 ignition[749]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:33:44.773765 ignition[749]: INFO : mount: mount passed Feb 9 19:33:44.774383 ignition[749]: INFO : Ignition finished successfully Feb 9 19:33:44.775893 systemd[1]: Finished ignition-mount.service. Feb 9 19:33:44.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.780816 kernel: audit: type=1130 audit(1707507224.775:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.787195 coreos-metadata[680]: Feb 09 19:33:44.787 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Feb 9 19:33:44.792167 kernel: audit: type=1130 audit(1707507224.787:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.787383 systemd[1]: Finished sysroot-boot.service. Feb 9 19:33:44.815757 coreos-metadata[680]: Feb 09 19:33:44.814 INFO Fetch successful Feb 9 19:33:44.815757 coreos-metadata[680]: Feb 09 19:33:44.814 INFO wrote hostname ci-3510-3-2-2-1358761224.novalocal to /sysroot/etc/hostname Feb 9 19:33:44.818359 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Feb 9 19:33:44.818477 systemd[1]: Finished flatcar-openstack-hostname.service. Feb 9 19:33:44.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.820715 systemd[1]: Starting ignition-files.service... Feb 9 19:33:44.829080 kernel: audit: type=1130 audit(1707507224.818:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.829105 kernel: audit: type=1131 audit(1707507224.818:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:44.833280 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:33:44.843811 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (758) Feb 9 19:33:44.854207 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:33:44.854243 kernel: BTRFS info (device vda6): using free space tree Feb 9 19:33:44.854260 kernel: BTRFS info (device vda6): has skinny extents Feb 9 19:33:44.866022 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:33:44.886008 ignition[777]: INFO : Ignition 2.14.0 Feb 9 19:33:44.886008 ignition[777]: INFO : Stage: files Feb 9 19:33:44.887306 ignition[777]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:33:44.887306 ignition[777]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:33:44.889160 ignition[777]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:33:44.892447 ignition[777]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:33:44.894326 ignition[777]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:33:44.894326 ignition[777]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:33:44.902563 ignition[777]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:33:44.903537 ignition[777]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:33:44.904557 unknown[777]: wrote ssh authorized keys file for user: core Feb 9 19:33:44.905382 ignition[777]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:33:44.906199 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:33:44.906199 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 9 19:33:45.351942 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:33:45.363028 systemd-networkd[632]: eth0: Gained IPv6LL Feb 9 19:33:46.056672 ignition[777]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 9 19:33:46.059315 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 9 19:33:46.059315 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:33:46.059315 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:33:46.382666 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:33:46.864400 ignition[777]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 9 19:33:46.864400 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 9 19:33:46.892723 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:33:46.893670 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:33:47.049071 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 19:33:48.017323 ignition[777]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 9 19:33:48.017323 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:33:48.017323 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:33:48.025054 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:33:48.172682 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 19:33:50.539843 ignition[777]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 9 19:33:50.541863 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:33:50.542853 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:33:50.544005 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:33:50.545226 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:33:50.545226 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:33:50.577332 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:33:50.579637 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:33:50.579637 ignition[777]: INFO : files: op(a): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:33:50.637761 ignition[777]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(a): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(c): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(c): op(d): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(c): op(d): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(c): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(e): [started] processing unit "prepare-critools.service" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(e): op(f): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(e): op(f): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(e): [finished] processing unit "prepare-critools.service" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(10): [started] processing unit "coreos-metadata.service" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(10): op(11): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(10): op(11): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(10): [finished] processing unit "coreos-metadata.service" Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(12): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(12): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:33:50.641978 ignition[777]: INFO : files: op(13): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:33:50.679405 ignition[777]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:33:50.679405 ignition[777]: INFO : files: op(14): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:33:50.679405 ignition[777]: INFO : files: op(14): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:33:50.722750 ignition[777]: INFO : files: createResultFile: createFiles: op(15): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:33:50.726914 ignition[777]: INFO : files: createResultFile: createFiles: op(15): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:33:50.726914 ignition[777]: INFO : files: files passed Feb 9 19:33:50.726914 ignition[777]: INFO : Ignition finished successfully Feb 9 19:33:50.746927 kernel: audit: type=1130 audit(1707507230.733:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:50.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:50.727504 systemd[1]: Finished ignition-files.service. Feb 9 19:33:50.739010 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:33:50.749368 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:33:50.751194 systemd[1]: Starting ignition-quench.service... Feb 9 19:33:50.844916 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:33:50.845147 systemd[1]: Finished ignition-quench.service. Feb 9 19:33:50.878026 kernel: audit: type=1130 audit(1707507230.847:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:50.878092 kernel: audit: type=1131 audit(1707507230.847:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:50.878123 kernel: audit: type=1130 audit(1707507230.866:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:50.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:50.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:50.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:50.878351 initrd-setup-root-after-ignition[802]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:33:50.866081 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:33:50.868007 systemd[1]: Reached target ignition-complete.target. Feb 9 19:33:50.880717 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:33:50.915050 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:33:50.915282 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:33:50.938840 kernel: audit: type=1130 audit(1707507230.917:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:50.938901 kernel: audit: type=1131 audit(1707507230.917:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:50.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:50.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:50.918566 systemd[1]: Reached target initrd-fs.target. Feb 9 19:33:50.939892 systemd[1]: Reached target initrd.target. Feb 9 19:33:50.942266 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:33:50.944458 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:33:50.977089 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:33:50.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:50.981411 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:33:50.991944 kernel: audit: type=1130 audit(1707507230.977:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.002476 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:33:51.003100 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:33:51.008875 systemd[1]: Stopped target timers.target. Feb 9 19:33:51.010740 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:33:51.023102 kernel: audit: type=1131 audit(1707507231.011:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.010897 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:33:51.012698 systemd[1]: Stopped target initrd.target. Feb 9 19:33:51.023743 systemd[1]: Stopped target basic.target. Feb 9 19:33:51.025744 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:33:51.028283 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:33:51.030562 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:33:51.032807 systemd[1]: Stopped target remote-fs.target. Feb 9 19:33:51.034899 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:33:51.037091 systemd[1]: Stopped target sysinit.target. Feb 9 19:33:51.039139 systemd[1]: Stopped target local-fs.target. Feb 9 19:33:51.041175 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:33:51.043464 systemd[1]: Stopped target swap.target. Feb 9 19:33:51.056983 kernel: audit: type=1131 audit(1707507231.046:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.045354 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:33:51.045760 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:33:51.069190 kernel: audit: type=1131 audit(1707507231.059:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.048042 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:33:51.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.058037 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:33:51.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.058306 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:33:51.060291 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:33:51.060564 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:33:51.070377 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:33:51.070634 systemd[1]: Stopped ignition-files.service. Feb 9 19:33:51.083463 iscsid[637]: iscsid shutting down. Feb 9 19:33:51.074063 systemd[1]: Stopping ignition-mount.service... Feb 9 19:33:51.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.084980 systemd[1]: Stopping iscsid.service... Feb 9 19:33:51.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.085415 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:33:51.085568 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:33:51.087061 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:33:51.087572 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:33:51.087709 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:33:51.088378 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:33:51.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.088496 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:33:51.091268 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:33:51.094348 systemd[1]: Stopped iscsid.service. Feb 9 19:33:51.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.097325 systemd[1]: Stopping iscsiuio.service... Feb 9 19:33:51.098547 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:33:51.098639 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:33:51.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.101534 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:33:51.101622 systemd[1]: Stopped iscsiuio.service. Feb 9 19:33:51.110425 ignition[815]: INFO : Ignition 2.14.0 Feb 9 19:33:51.110425 ignition[815]: INFO : Stage: umount Feb 9 19:33:51.111545 ignition[815]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:33:51.111545 ignition[815]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:33:51.113348 ignition[815]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:33:51.115066 ignition[815]: INFO : umount: umount passed Feb 9 19:33:51.116655 ignition[815]: INFO : Ignition finished successfully Feb 9 19:33:51.117078 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:33:51.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.117166 systemd[1]: Stopped ignition-mount.service. Feb 9 19:33:51.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.119977 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:33:51.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.120021 systemd[1]: Stopped ignition-disks.service. Feb 9 19:33:51.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.121512 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:33:51.121552 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:33:51.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.122890 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:33:51.122926 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:33:51.124442 systemd[1]: Stopped target network.target. Feb 9 19:33:51.128067 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:33:51.128109 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:33:51.129853 systemd[1]: Stopped target paths.target. Feb 9 19:33:51.131145 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:33:51.132808 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:33:51.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.133752 systemd[1]: Stopped target slices.target. Feb 9 19:33:51.135165 systemd[1]: Stopped target sockets.target. Feb 9 19:33:51.136959 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:33:51.136992 systemd[1]: Closed iscsid.socket. Feb 9 19:33:51.138349 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:33:51.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.138380 systemd[1]: Closed iscsiuio.socket. Feb 9 19:33:51.139680 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:33:51.139715 systemd[1]: Stopped ignition-setup.service. Feb 9 19:33:51.141332 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:33:51.142634 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:33:51.144827 systemd-networkd[632]: eth0: DHCPv6 lease lost Feb 9 19:33:51.152000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:33:51.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.146054 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:33:51.154000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.146142 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:33:51.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.148456 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:33:51.148517 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:33:51.149986 systemd[1]: Stopping network-cleanup.service... Feb 9 19:33:51.150424 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:33:51.150474 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:33:51.154007 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:33:51.154064 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:33:51.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.155443 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:33:51.155486 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:33:51.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.157028 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:33:51.159795 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:33:51.166000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:33:51.159880 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:33:51.160791 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:33:51.160951 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:33:51.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.163864 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:33:51.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.164033 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:33:51.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.167253 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:33:51.167288 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:33:51.170455 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:33:51.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.170502 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:33:51.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.171650 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:33:51.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.171729 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:33:51.172755 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:33:51.172820 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:33:51.173671 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:33:51.173716 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:33:51.175576 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:33:51.183341 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:33:51.183390 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:33:51.184702 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:33:51.184815 systemd[1]: Stopped network-cleanup.service. Feb 9 19:33:51.185723 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:33:51.185817 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:33:51.200864 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:33:51.200989 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:33:51.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.202121 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:33:51.202960 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:33:51.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:51.203004 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:33:51.204685 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:33:51.224194 systemd[1]: Switching root. Feb 9 19:33:51.244949 systemd-journald[185]: Journal stopped Feb 9 19:34:00.003220 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Feb 9 19:34:00.003317 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:34:00.003348 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:34:00.003370 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:34:00.003396 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:34:00.003429 kernel: SELinux: policy capability open_perms=1 Feb 9 19:34:00.003461 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:34:00.003497 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:34:00.003527 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:34:00.003554 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:34:00.003575 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:34:00.003594 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:34:00.003616 systemd[1]: Successfully loaded SELinux policy in 395.257ms. Feb 9 19:34:00.003659 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.439ms. Feb 9 19:34:00.003685 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:34:00.003711 systemd[1]: Detected virtualization kvm. Feb 9 19:34:00.003734 systemd[1]: Detected architecture x86-64. Feb 9 19:34:00.003755 systemd[1]: Detected first boot. Feb 9 19:34:00.003816 systemd[1]: Hostname set to . Feb 9 19:34:00.003840 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:34:00.003862 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:34:00.003883 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:34:00.003905 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:34:00.003933 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:34:00.003957 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:34:00.003986 kernel: kauditd_printk_skb: 48 callbacks suppressed Feb 9 19:34:00.004006 kernel: audit: type=1334 audit(1707507239.370:89): prog-id=12 op=LOAD Feb 9 19:34:00.004025 kernel: audit: type=1334 audit(1707507239.370:90): prog-id=3 op=UNLOAD Feb 9 19:34:00.004045 kernel: audit: type=1334 audit(1707507239.370:91): prog-id=13 op=LOAD Feb 9 19:34:00.004083 kernel: audit: type=1334 audit(1707507239.373:92): prog-id=14 op=LOAD Feb 9 19:34:00.004104 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:34:00.004128 kernel: audit: type=1334 audit(1707507239.373:93): prog-id=4 op=UNLOAD Feb 9 19:34:00.004148 kernel: audit: type=1334 audit(1707507239.373:94): prog-id=5 op=UNLOAD Feb 9 19:34:00.004169 kernel: audit: type=1131 audit(1707507239.374:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:00.004190 kernel: audit: type=1334 audit(1707507239.400:96): prog-id=12 op=UNLOAD Feb 9 19:34:00.004211 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:34:00.004233 kernel: audit: type=1130 audit(1707507239.404:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:00.004254 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:34:00.004276 kernel: audit: type=1131 audit(1707507239.404:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:00.004300 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:34:00.004325 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:34:00.004347 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 19:34:00.004369 systemd[1]: Created slice system-getty.slice. Feb 9 19:34:00.004396 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:34:00.004431 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:34:00.004473 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:34:00.004508 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:34:00.004530 systemd[1]: Created slice user.slice. Feb 9 19:34:00.004552 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:34:00.004573 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:34:00.004594 systemd[1]: Set up automount boot.automount. Feb 9 19:34:00.004615 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:34:00.004636 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:34:00.004657 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:34:00.004682 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:34:00.004703 systemd[1]: Reached target integritysetup.target. Feb 9 19:34:00.004724 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:34:00.004752 systemd[1]: Reached target remote-fs.target. Feb 9 19:34:00.004799 systemd[1]: Reached target slices.target. Feb 9 19:34:00.004824 systemd[1]: Reached target swap.target. Feb 9 19:34:00.004844 systemd[1]: Reached target torcx.target. Feb 9 19:34:00.004870 systemd[1]: Reached target veritysetup.target. Feb 9 19:34:00.004891 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:34:00.004923 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:34:00.004961 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:34:00.004987 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:34:00.005008 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:34:00.005029 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:34:00.005049 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:34:00.005071 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:34:00.005093 systemd[1]: Mounting media.mount... Feb 9 19:34:00.005115 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:34:00.005136 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:34:00.005162 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:34:00.005184 systemd[1]: Mounting tmp.mount... Feb 9 19:34:00.005205 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:34:00.005226 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:34:00.005247 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:34:00.005268 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:34:00.005289 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:34:00.005310 systemd[1]: Starting modprobe@drm.service... Feb 9 19:34:00.005331 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:34:00.005358 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:34:00.005379 systemd[1]: Starting modprobe@loop.service... Feb 9 19:34:00.005400 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:34:00.005423 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:34:00.005444 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:34:00.005465 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:34:00.005485 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:34:00.005506 systemd[1]: Stopped systemd-journald.service. Feb 9 19:34:00.005531 systemd[1]: Starting systemd-journald.service... Feb 9 19:34:00.005552 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:34:00.005573 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:34:00.005594 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:34:00.005615 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:34:00.005636 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:34:00.005657 systemd[1]: Stopped verity-setup.service. Feb 9 19:34:00.005678 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:34:00.005700 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:34:00.005720 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:34:00.005749 systemd[1]: Mounted media.mount. Feb 9 19:34:00.005804 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:34:00.005831 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:34:00.005854 systemd[1]: Mounted tmp.mount. Feb 9 19:34:00.005877 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:34:00.005898 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:34:00.005918 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:34:00.005939 systemd[1]: Finished modprobe@drm.service. Feb 9 19:34:00.005960 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:34:00.005986 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:34:00.006007 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:34:00.006038 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:34:00.006069 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:34:00.006108 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:34:00.006154 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:34:00.006185 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:34:00.006216 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:34:00.006250 systemd[1]: Reached target network-pre.target. Feb 9 19:34:00.006294 kernel: loop: module loaded Feb 9 19:34:00.006328 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:34:00.006360 systemd[1]: Finished modprobe@loop.service. Feb 9 19:34:00.006393 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:34:00.006425 systemd-journald[909]: Journal started Feb 9 19:34:00.006511 systemd-journald[909]: Runtime Journal (/run/log/journal/78f8c1c1020e45fe8e2414688cdf2834) is 4.9M, max 39.5M, 34.5M free. Feb 9 19:33:51.958000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:34:00.012362 systemd[1]: Started systemd-journald.service. Feb 9 19:33:52.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:33:52.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:33:52.934000 audit: BPF prog-id=10 op=LOAD Feb 9 19:33:52.934000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:33:52.934000 audit: BPF prog-id=11 op=LOAD Feb 9 19:33:52.934000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:33:54.567000 audit[847]: AVC avc: denied { associate } for pid=847 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:33:54.567000 audit[847]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0000247b2 a1=c00002aa68 a2=c000028c80 a3=32 items=0 ppid=830 pid=847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:54.567000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:33:54.573000 audit[847]: AVC avc: denied { associate } for pid=847 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:33:54.573000 audit[847]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000024889 a2=1ed a3=0 items=2 ppid=830 pid=847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:54.573000 audit: CWD cwd="/" Feb 9 19:33:54.573000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:33:54.573000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:33:54.573000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:33:59.370000 audit: BPF prog-id=12 op=LOAD Feb 9 19:33:59.370000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:33:59.370000 audit: BPF prog-id=13 op=LOAD Feb 9 19:33:59.373000 audit: BPF prog-id=14 op=LOAD Feb 9 19:33:59.373000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:33:59.373000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:33:59.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.400000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:33:59.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.683000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.687000 audit: BPF prog-id=15 op=LOAD Feb 9 19:33:59.687000 audit: BPF prog-id=16 op=LOAD Feb 9 19:33:59.688000 audit: BPF prog-id=17 op=LOAD Feb 9 19:33:59.688000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:33:59.688000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:33:59.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.816000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.996000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:33:59.996000 audit[909]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffee2d95550 a2=4000 a3=7ffee2d955ec items=0 ppid=1 pid=909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:59.996000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:34:00.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:59.368486 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:33:54.433309 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:33:59.368502 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 19:33:54.539213 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:33:59.375280 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:33:54.539359 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:34:00.010990 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:33:54.539474 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:33:54.539513 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:33:54.539607 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:33:54.539649 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:33:54.540278 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:33:54.540379 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:33:54.540415 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:33:54.561834 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:33:54.561938 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:33:54.562012 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:33:54.562055 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:33:54.562102 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:33:54.562144 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:33:58.918328 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:58Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:34:00.018650 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:34:00.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:00.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:58.919035 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:58Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:34:00.018873 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:33:58.919299 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:58Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:33:58.919709 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:58Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:33:58.919853 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:58Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:33:58.919978 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:33:58Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:34:00.021302 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:34:00.027236 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:34:00.062798 kernel: fuse: init (API version 7.34) Feb 9 19:34:00.063178 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:34:00.063535 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:34:00.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:00.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:00.067810 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:34:00.085096 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:34:00.116959 systemd-journald[909]: Time spent on flushing to /var/log/journal/78f8c1c1020e45fe8e2414688cdf2834 is 44.706ms for 1121 entries. Feb 9 19:34:00.116959 systemd-journald[909]: System Journal (/var/log/journal/78f8c1c1020e45fe8e2414688cdf2834) is 8.0M, max 584.8M, 576.8M free. Feb 9 19:34:00.320749 systemd-journald[909]: Received client request to flush runtime journal. Feb 9 19:34:00.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:00.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:00.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:00.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:00.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:00.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:00.125119 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:34:00.128546 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:34:00.323098 udevadm[941]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 19:34:00.145918 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:34:00.146529 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:34:00.172017 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:34:00.173852 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:34:00.204696 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:34:00.206599 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:34:00.278146 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:34:00.321640 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:34:00.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:00.622917 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:34:01.869300 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:34:01.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:01.872000 audit: BPF prog-id=18 op=LOAD Feb 9 19:34:01.872000 audit: BPF prog-id=19 op=LOAD Feb 9 19:34:01.872000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:34:01.872000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:34:01.874385 systemd[1]: Starting systemd-udevd.service... Feb 9 19:34:01.917684 systemd-udevd[958]: Using default interface naming scheme 'v252'. Feb 9 19:34:01.989845 systemd[1]: Started systemd-udevd.service. Feb 9 19:34:01.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:01.997000 audit: BPF prog-id=20 op=LOAD Feb 9 19:34:01.999465 systemd[1]: Starting systemd-networkd.service... Feb 9 19:34:02.019000 audit: BPF prog-id=21 op=LOAD Feb 9 19:34:02.020000 audit: BPF prog-id=22 op=LOAD Feb 9 19:34:02.020000 audit: BPF prog-id=23 op=LOAD Feb 9 19:34:02.023817 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:34:02.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:02.083703 systemd[1]: Started systemd-userdbd.service. Feb 9 19:34:02.086885 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:34:02.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:02.179517 systemd-networkd[970]: lo: Link UP Feb 9 19:34:02.179528 systemd-networkd[970]: lo: Gained carrier Feb 9 19:34:02.180036 systemd-networkd[970]: Enumeration completed Feb 9 19:34:02.180223 systemd[1]: Started systemd-networkd.service. Feb 9 19:34:02.182563 systemd-networkd[970]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:34:02.184584 systemd-networkd[970]: eth0: Link UP Feb 9 19:34:02.184591 systemd-networkd[970]: eth0: Gained carrier Feb 9 19:34:02.175000 audit[973]: AVC avc: denied { confidentiality } for pid=973 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:34:02.175000 audit[973]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5591c50fc800 a1=32194 a2=7f156ed7abc5 a3=5 items=108 ppid=958 pid=973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:02.193876 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 9 19:34:02.175000 audit: CWD cwd="/" Feb 9 19:34:02.175000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=1 name=(null) inode=14261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=2 name=(null) inode=14261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=3 name=(null) inode=14262 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=4 name=(null) inode=14261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=5 name=(null) inode=14263 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=6 name=(null) inode=14261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=7 name=(null) inode=14264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=8 name=(null) inode=14264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=9 name=(null) inode=14265 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=10 name=(null) inode=14264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=11 name=(null) inode=14266 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=12 name=(null) inode=14264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=13 name=(null) inode=14267 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=14 name=(null) inode=14264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=15 name=(null) inode=14268 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=16 name=(null) inode=14264 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=17 name=(null) inode=14269 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=18 name=(null) inode=14261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=19 name=(null) inode=14270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.195930 systemd-networkd[970]: eth0: DHCPv4 address 172.24.4.56/24, gateway 172.24.4.1 acquired from 172.24.4.1 Feb 9 19:34:02.175000 audit: PATH item=20 name=(null) inode=14270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=21 name=(null) inode=14271 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=22 name=(null) inode=14270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=23 name=(null) inode=14272 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=24 name=(null) inode=14270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=25 name=(null) inode=14273 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=26 name=(null) inode=14270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=27 name=(null) inode=14274 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=28 name=(null) inode=14270 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=29 name=(null) inode=14275 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=30 name=(null) inode=14261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=31 name=(null) inode=14276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=32 name=(null) inode=14276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=33 name=(null) inode=14277 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=34 name=(null) inode=14276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=35 name=(null) inode=14278 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=36 name=(null) inode=14276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=37 name=(null) inode=14279 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=38 name=(null) inode=14276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=39 name=(null) inode=14280 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=40 name=(null) inode=14276 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=41 name=(null) inode=14281 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=42 name=(null) inode=14261 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=43 name=(null) inode=14282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=44 name=(null) inode=14282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=45 name=(null) inode=14283 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=46 name=(null) inode=14282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=47 name=(null) inode=14284 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=48 name=(null) inode=14282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=49 name=(null) inode=14285 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=50 name=(null) inode=14282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=51 name=(null) inode=14286 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=52 name=(null) inode=14282 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=53 name=(null) inode=14287 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=55 name=(null) inode=14288 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=56 name=(null) inode=14288 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=57 name=(null) inode=14289 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=58 name=(null) inode=14288 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=59 name=(null) inode=14290 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=60 name=(null) inode=14288 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=61 name=(null) inode=14291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=62 name=(null) inode=14291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=63 name=(null) inode=14292 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=64 name=(null) inode=14291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=65 name=(null) inode=14293 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=66 name=(null) inode=14291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=67 name=(null) inode=14294 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=68 name=(null) inode=14291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=69 name=(null) inode=14295 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=70 name=(null) inode=14291 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=71 name=(null) inode=14296 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=72 name=(null) inode=14288 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=73 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=74 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=75 name=(null) inode=14298 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=76 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=77 name=(null) inode=14299 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=78 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=79 name=(null) inode=14300 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=80 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=81 name=(null) inode=14301 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=82 name=(null) inode=14297 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=83 name=(null) inode=14302 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=84 name=(null) inode=14288 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=85 name=(null) inode=14303 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=86 name=(null) inode=14303 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=87 name=(null) inode=14304 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=88 name=(null) inode=14303 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=89 name=(null) inode=14305 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=90 name=(null) inode=14303 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=91 name=(null) inode=14306 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=92 name=(null) inode=14303 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=93 name=(null) inode=14307 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=94 name=(null) inode=14303 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=95 name=(null) inode=14308 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=96 name=(null) inode=14288 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=97 name=(null) inode=14309 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=98 name=(null) inode=14309 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=99 name=(null) inode=14310 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=100 name=(null) inode=14309 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=101 name=(null) inode=14311 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=102 name=(null) inode=14309 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=103 name=(null) inode=14312 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=104 name=(null) inode=14309 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=105 name=(null) inode=14313 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=106 name=(null) inode=14309 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PATH item=107 name=(null) inode=14314 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:02.175000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:34:02.213806 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 9 19:34:02.218828 kernel: ACPI: button: Power Button [PWRF] Feb 9 19:34:02.240135 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:34:02.247807 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Feb 9 19:34:02.254810 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:34:02.294410 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:34:02.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:02.296558 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:34:02.376165 lvm[987]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:34:02.418121 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:34:02.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:02.419585 systemd[1]: Reached target cryptsetup.target. Feb 9 19:34:02.423189 systemd[1]: Starting lvm2-activation.service... Feb 9 19:34:02.432542 lvm[988]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:34:02.471962 systemd[1]: Finished lvm2-activation.service. Feb 9 19:34:02.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:02.473415 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:34:02.474574 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:34:02.474639 systemd[1]: Reached target local-fs.target. Feb 9 19:34:02.475759 systemd[1]: Reached target machines.target. Feb 9 19:34:02.479565 systemd[1]: Starting ldconfig.service... Feb 9 19:34:02.516725 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:34:02.516883 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:34:02.519276 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:34:02.523927 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:34:02.527817 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:34:02.529244 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:34:02.529351 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:34:02.531649 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:34:02.562633 systemd[1]: boot.automount: Got automount request for /boot, triggered by 990 (bootctl) Feb 9 19:34:02.565517 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:34:02.653366 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:34:02.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:03.015576 systemd-tmpfiles[993]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:34:03.378003 systemd-tmpfiles[993]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:34:03.539325 systemd-networkd[970]: eth0: Gained IPv6LL Feb 9 19:34:03.618604 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:34:03.627393 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:34:03.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:03.649000 systemd-tmpfiles[993]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:34:04.295380 systemd-fsck[1000]: fsck.fat 4.2 (2021-01-31) Feb 9 19:34:04.295380 systemd-fsck[1000]: /dev/vda1: 789 files, 115339/258078 clusters Feb 9 19:34:04.300814 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:34:04.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:04.305505 systemd[1]: Mounting boot.mount... Feb 9 19:34:04.367686 systemd[1]: Mounted boot.mount. Feb 9 19:34:04.425094 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:34:04.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:04.429452 kernel: kauditd_printk_skb: 166 callbacks suppressed Feb 9 19:34:04.429640 kernel: audit: type=1130 audit(1707507244.425:152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:05.144231 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:34:05.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:05.156091 kernel: audit: type=1130 audit(1707507245.144:153): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:05.158393 systemd[1]: Starting audit-rules.service... Feb 9 19:34:05.162373 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:34:05.167074 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:34:05.181597 kernel: audit: type=1334 audit(1707507245.177:154): prog-id=24 op=LOAD Feb 9 19:34:05.177000 audit: BPF prog-id=24 op=LOAD Feb 9 19:34:05.182850 systemd[1]: Starting systemd-resolved.service... Feb 9 19:34:05.189000 audit: BPF prog-id=25 op=LOAD Feb 9 19:34:05.194140 kernel: audit: type=1334 audit(1707507245.189:155): prog-id=25 op=LOAD Feb 9 19:34:05.194426 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:34:05.201116 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:34:05.216086 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:34:05.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:05.216747 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:34:05.221813 kernel: audit: type=1130 audit(1707507245.215:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:05.222000 audit[1009]: SYSTEM_BOOT pid=1009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:34:05.229914 kernel: audit: type=1127 audit(1707507245.222:157): pid=1009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:34:05.232061 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:34:05.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:05.236849 kernel: audit: type=1130 audit(1707507245.231:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:05.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:05.319447 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:34:05.320146 systemd[1]: Reached target time-set.target. Feb 9 19:34:05.325685 kernel: audit: type=1130 audit(1707507245.319:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:05.342722 systemd-resolved[1007]: Positive Trust Anchors: Feb 9 19:34:05.342748 systemd-resolved[1007]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:34:05.342817 systemd-resolved[1007]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:34:05.350097 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:34:05.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:05.355067 kernel: audit: type=1130 audit(1707507245.349:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:05.386537 augenrules[1024]: No rules Feb 9 19:34:05.385000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:34:05.385000 audit[1024]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff74666870 a2=420 a3=0 items=0 ppid=1003 pid=1024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:05.391814 kernel: audit: type=1305 audit(1707507245.385:161): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:34:05.385000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:34:05.391679 systemd[1]: Finished audit-rules.service. Feb 9 19:34:05.402622 systemd-resolved[1007]: Using system hostname 'ci-3510-3-2-2-1358761224.novalocal'. Feb 9 19:34:05.405841 systemd[1]: Started systemd-resolved.service. Feb 9 19:34:05.407872 systemd-timesyncd[1008]: Contacted time server 92.243.6.5:123 (0.flatcar.pool.ntp.org). Feb 9 19:34:05.407986 systemd-timesyncd[1008]: Initial clock synchronization to Fri 2024-02-09 19:34:05.699872 UTC. Feb 9 19:34:05.413647 systemd[1]: Reached target network.target. Feb 9 19:34:05.414453 systemd[1]: Reached target nss-lookup.target. Feb 9 19:34:06.248129 ldconfig[989]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:34:06.411714 systemd[1]: Finished ldconfig.service. Feb 9 19:34:06.416268 systemd[1]: Starting systemd-update-done.service... Feb 9 19:34:06.440929 systemd[1]: Finished systemd-update-done.service. Feb 9 19:34:06.442305 systemd[1]: Reached target sysinit.target. Feb 9 19:34:06.443745 systemd[1]: Started motdgen.path. Feb 9 19:34:06.445104 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:34:06.446731 systemd[1]: Started logrotate.timer. Feb 9 19:34:06.448099 systemd[1]: Started mdadm.timer. Feb 9 19:34:06.449163 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:34:06.450308 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:34:06.450384 systemd[1]: Reached target paths.target. Feb 9 19:34:06.451469 systemd[1]: Reached target timers.target. Feb 9 19:34:06.453702 systemd[1]: Listening on dbus.socket. Feb 9 19:34:06.457395 systemd[1]: Starting docker.socket... Feb 9 19:34:06.481076 systemd[1]: Listening on sshd.socket. Feb 9 19:34:06.482943 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:34:06.484592 systemd[1]: Listening on docker.socket. Feb 9 19:34:06.486241 systemd[1]: Reached target sockets.target. Feb 9 19:34:06.487558 systemd[1]: Reached target basic.target. Feb 9 19:34:06.489045 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:34:06.489367 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:34:06.492664 systemd[1]: Starting containerd.service... Feb 9 19:34:06.497488 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 19:34:06.502052 systemd[1]: Starting dbus.service... Feb 9 19:34:06.508318 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:34:06.514357 systemd[1]: Starting extend-filesystems.service... Feb 9 19:34:06.516305 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:34:06.521377 systemd[1]: Starting motdgen.service... Feb 9 19:34:06.532601 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:34:06.591632 jq[1037]: false Feb 9 19:34:06.537064 systemd[1]: Starting prepare-critools.service... Feb 9 19:34:06.542071 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:34:06.549117 systemd[1]: Starting sshd-keygen.service... Feb 9 19:34:06.555509 systemd[1]: Starting systemd-logind.service... Feb 9 19:34:06.557983 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:34:06.558069 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 19:34:06.558543 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:34:06.605467 jq[1047]: true Feb 9 19:34:06.559313 systemd[1]: Starting update-engine.service... Feb 9 19:34:06.561775 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:34:06.613307 tar[1049]: crictl Feb 9 19:34:06.592475 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:34:06.592665 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:34:06.622335 tar[1050]: ./ Feb 9 19:34:06.622335 tar[1050]: ./macvlan Feb 9 19:34:06.594067 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:34:06.627957 jq[1052]: true Feb 9 19:34:06.594227 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:34:06.642640 extend-filesystems[1038]: Found vda Feb 9 19:34:06.643704 extend-filesystems[1038]: Found vda1 Feb 9 19:34:06.643704 extend-filesystems[1038]: Found vda2 Feb 9 19:34:06.643704 extend-filesystems[1038]: Found vda3 Feb 9 19:34:06.643704 extend-filesystems[1038]: Found usr Feb 9 19:34:06.643704 extend-filesystems[1038]: Found vda4 Feb 9 19:34:06.643704 extend-filesystems[1038]: Found vda6 Feb 9 19:34:06.643704 extend-filesystems[1038]: Found vda7 Feb 9 19:34:06.643704 extend-filesystems[1038]: Found vda9 Feb 9 19:34:06.643704 extend-filesystems[1038]: Checking size of /dev/vda9 Feb 9 19:34:06.670457 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:34:06.670649 systemd[1]: Finished motdgen.service. Feb 9 19:34:06.710697 dbus-daemon[1034]: [system] SELinux support is enabled Feb 9 19:34:06.715247 extend-filesystems[1038]: Resized partition /dev/vda9 Feb 9 19:34:06.711064 systemd[1]: Started dbus.service. Feb 9 19:34:06.713689 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:34:06.713716 systemd[1]: Reached target system-config.target. Feb 9 19:34:06.714256 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:34:06.714274 systemd[1]: Reached target user-config.target. Feb 9 19:34:06.727127 extend-filesystems[1089]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:34:06.769826 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Feb 9 19:34:06.770870 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:34:06.772007 bash[1086]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:34:06.772835 update_engine[1046]: I0209 19:34:06.771350 1046 main.cc:92] Flatcar Update Engine starting Feb 9 19:34:06.778300 systemd[1]: Started update-engine.service. Feb 9 19:34:06.782785 update_engine[1046]: I0209 19:34:06.778360 1046 update_check_scheduler.cc:74] Next update check in 3m6s Feb 9 19:34:06.781784 systemd[1]: Started locksmithd.service. Feb 9 19:34:06.803759 env[1051]: time="2024-02-09T19:34:06.803658029Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:34:06.809980 systemd-logind[1044]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 19:34:06.813576 systemd-logind[1044]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:34:06.813984 systemd-logind[1044]: New seat seat0. Feb 9 19:34:06.818161 systemd[1]: Started systemd-logind.service. Feb 9 19:34:06.824282 tar[1050]: ./static Feb 9 19:34:06.836978 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Feb 9 19:34:06.886494 extend-filesystems[1089]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 19:34:06.886494 extend-filesystems[1089]: old_desc_blocks = 1, new_desc_blocks = 3 Feb 9 19:34:06.886494 extend-filesystems[1089]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Feb 9 19:34:06.903912 coreos-metadata[1033]: Feb 09 19:34:06.867 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Feb 9 19:34:06.904365 extend-filesystems[1038]: Resized filesystem in /dev/vda9 Feb 9 19:34:06.887921 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:34:06.888231 systemd[1]: Finished extend-filesystems.service. Feb 9 19:34:06.922652 env[1051]: time="2024-02-09T19:34:06.922590946Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:34:06.922996 env[1051]: time="2024-02-09T19:34:06.922974124Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:34:06.924513 env[1051]: time="2024-02-09T19:34:06.924481015Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:34:06.931875 env[1051]: time="2024-02-09T19:34:06.931848331Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:34:06.932212 env[1051]: time="2024-02-09T19:34:06.932188162Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:34:06.932288 env[1051]: time="2024-02-09T19:34:06.932272382Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:34:06.932366 env[1051]: time="2024-02-09T19:34:06.932348357Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:34:06.932439 env[1051]: time="2024-02-09T19:34:06.932423865Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:34:06.932575 env[1051]: time="2024-02-09T19:34:06.932558119Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:34:06.933002 env[1051]: time="2024-02-09T19:34:06.932980904Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:34:06.934998 env[1051]: time="2024-02-09T19:34:06.934973002Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:34:06.935075 env[1051]: time="2024-02-09T19:34:06.935060203Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:34:06.935245 env[1051]: time="2024-02-09T19:34:06.935225083Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:34:06.935324 env[1051]: time="2024-02-09T19:34:06.935309750Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:34:06.945838 tar[1050]: ./vlan Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.949879149Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.949931021Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.949949495Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.949992467Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.950010599Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.950027702Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.950045668Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.950064630Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.950080997Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.950099617Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.950116949Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.950134333Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.950264465Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:34:06.950834 env[1051]: time="2024-02-09T19:34:06.950356754Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:34:06.951223 env[1051]: time="2024-02-09T19:34:06.950663354Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:34:06.951223 env[1051]: time="2024-02-09T19:34:06.950698226Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:34:06.951223 env[1051]: time="2024-02-09T19:34:06.950718113Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:34:06.951223 env[1051]: time="2024-02-09T19:34:06.950770940Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:34:06.951223 env[1051]: time="2024-02-09T19:34:06.950788189Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951376258Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951404774Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951425035Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951443894Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951459065Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951473967Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951493481Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951651153Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951672473Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951687011Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951703959Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951724365Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951738665Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:34:06.952665 env[1051]: time="2024-02-09T19:34:06.951764502Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:34:06.953146 env[1051]: time="2024-02-09T19:34:06.951828140Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:34:06.953175 env[1051]: time="2024-02-09T19:34:06.952071351Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:34:06.953175 env[1051]: time="2024-02-09T19:34:06.952143754Z" level=info msg="Connect containerd service" Feb 9 19:34:06.953175 env[1051]: time="2024-02-09T19:34:06.952194016Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:34:06.956263 env[1051]: time="2024-02-09T19:34:06.953475143Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:34:06.956263 env[1051]: time="2024-02-09T19:34:06.953763133Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:34:06.956263 env[1051]: time="2024-02-09T19:34:06.953827072Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:34:06.953977 systemd[1]: Started containerd.service. Feb 9 19:34:06.973603 env[1051]: time="2024-02-09T19:34:06.973542673Z" level=info msg="Start subscribing containerd event" Feb 9 19:34:06.986933 env[1051]: time="2024-02-09T19:34:06.986900772Z" level=info msg="Start recovering state" Feb 9 19:34:06.987143 env[1051]: time="2024-02-09T19:34:06.987125581Z" level=info msg="Start event monitor" Feb 9 19:34:06.987216 env[1051]: time="2024-02-09T19:34:06.987201432Z" level=info msg="Start snapshots syncer" Feb 9 19:34:06.987281 env[1051]: time="2024-02-09T19:34:06.987267395Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:34:06.987350 env[1051]: time="2024-02-09T19:34:06.987335644Z" level=info msg="Start streaming server" Feb 9 19:34:06.989664 env[1051]: time="2024-02-09T19:34:06.989641654Z" level=info msg="containerd successfully booted in 0.197240s" Feb 9 19:34:07.036286 tar[1050]: ./portmap Feb 9 19:34:07.098481 coreos-metadata[1033]: Feb 09 19:34:07.098 INFO Fetch successful Feb 9 19:34:07.098481 coreos-metadata[1033]: Feb 09 19:34:07.098 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 9 19:34:07.105077 tar[1050]: ./host-local Feb 9 19:34:07.115126 coreos-metadata[1033]: Feb 09 19:34:07.115 INFO Fetch successful Feb 9 19:34:07.126345 unknown[1033]: wrote ssh authorized keys file for user: core Feb 9 19:34:07.181044 tar[1050]: ./vrf Feb 9 19:34:07.189716 update-ssh-keys[1097]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:34:07.190155 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 19:34:07.225033 tar[1050]: ./bridge Feb 9 19:34:07.274670 tar[1050]: ./tuning Feb 9 19:34:07.318147 tar[1050]: ./firewall Feb 9 19:34:07.403547 tar[1050]: ./host-device Feb 9 19:34:07.450843 tar[1050]: ./sbr Feb 9 19:34:07.532007 tar[1050]: ./loopback Feb 9 19:34:07.597166 tar[1050]: ./dhcp Feb 9 19:34:07.689008 systemd[1]: Finished prepare-critools.service. Feb 9 19:34:07.736435 tar[1050]: ./ptp Feb 9 19:34:07.780674 tar[1050]: ./ipvlan Feb 9 19:34:07.821692 tar[1050]: ./bandwidth Feb 9 19:34:07.876452 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:34:07.978015 locksmithd[1092]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:34:08.432235 sshd_keygen[1065]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:34:08.461313 systemd[1]: Finished sshd-keygen.service. Feb 9 19:34:08.466030 systemd[1]: Starting issuegen.service... Feb 9 19:34:08.474253 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:34:08.474614 systemd[1]: Finished issuegen.service. Feb 9 19:34:08.479244 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:34:08.486365 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:34:08.492033 systemd[1]: Started getty@tty1.service. Feb 9 19:34:08.496049 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:34:08.497737 systemd[1]: Reached target getty.target. Feb 9 19:34:08.499207 systemd[1]: Reached target multi-user.target. Feb 9 19:34:08.506991 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:34:08.522524 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:34:08.522950 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:34:08.524488 systemd[1]: Startup finished in 947ms (kernel) + 11.728s (initrd) + 17.026s (userspace) = 29.703s. Feb 9 19:34:15.448230 systemd[1]: Created slice system-sshd.slice. Feb 9 19:34:15.451365 systemd[1]: Started sshd@0-172.24.4.56:22-172.24.4.1:42356.service. Feb 9 19:34:17.002438 sshd[1121]: Accepted publickey for core from 172.24.4.1 port 42356 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:34:17.007322 sshd[1121]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:34:17.034310 systemd[1]: Created slice user-500.slice. Feb 9 19:34:17.037777 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:34:17.046999 systemd-logind[1044]: New session 1 of user core. Feb 9 19:34:17.066389 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:34:17.072108 systemd[1]: Starting user@500.service... Feb 9 19:34:17.078922 (systemd)[1124]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:34:17.200999 systemd[1124]: Queued start job for default target default.target. Feb 9 19:34:17.201759 systemd[1124]: Reached target paths.target. Feb 9 19:34:17.201798 systemd[1124]: Reached target sockets.target. Feb 9 19:34:17.201816 systemd[1124]: Reached target timers.target. Feb 9 19:34:17.201831 systemd[1124]: Reached target basic.target. Feb 9 19:34:17.201957 systemd[1]: Started user@500.service. Feb 9 19:34:17.203237 systemd[1]: Started session-1.scope. Feb 9 19:34:17.203708 systemd[1124]: Reached target default.target. Feb 9 19:34:17.203908 systemd[1124]: Startup finished in 115ms. Feb 9 19:34:17.578914 systemd[1]: Started sshd@1-172.24.4.56:22-172.24.4.1:42362.service. Feb 9 19:34:18.937831 sshd[1133]: Accepted publickey for core from 172.24.4.1 port 42362 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:34:18.940607 sshd[1133]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:34:18.950914 systemd-logind[1044]: New session 2 of user core. Feb 9 19:34:18.954701 systemd[1]: Started session-2.scope. Feb 9 19:34:19.695342 sshd[1133]: pam_unix(sshd:session): session closed for user core Feb 9 19:34:19.701527 systemd[1]: Started sshd@2-172.24.4.56:22-172.24.4.1:42368.service. Feb 9 19:34:19.707454 systemd[1]: sshd@1-172.24.4.56:22-172.24.4.1:42362.service: Deactivated successfully. Feb 9 19:34:19.709038 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:34:19.712384 systemd-logind[1044]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:34:19.715347 systemd-logind[1044]: Removed session 2. Feb 9 19:34:21.054106 sshd[1138]: Accepted publickey for core from 172.24.4.1 port 42368 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:34:21.056172 sshd[1138]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:34:21.063666 systemd[1]: Started session-3.scope. Feb 9 19:34:21.064144 systemd-logind[1044]: New session 3 of user core. Feb 9 19:34:21.873137 sshd[1138]: pam_unix(sshd:session): session closed for user core Feb 9 19:34:21.882754 systemd[1]: Started sshd@3-172.24.4.56:22-172.24.4.1:42374.service. Feb 9 19:34:21.884493 systemd[1]: sshd@2-172.24.4.56:22-172.24.4.1:42368.service: Deactivated successfully. Feb 9 19:34:21.886398 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:34:21.892167 systemd-logind[1044]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:34:21.895710 systemd-logind[1044]: Removed session 3. Feb 9 19:34:23.152656 sshd[1144]: Accepted publickey for core from 172.24.4.1 port 42374 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:34:23.156062 sshd[1144]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:34:23.167159 systemd[1]: Started session-4.scope. Feb 9 19:34:23.168621 systemd-logind[1044]: New session 4 of user core. Feb 9 19:34:23.712605 sshd[1144]: pam_unix(sshd:session): session closed for user core Feb 9 19:34:23.717507 systemd[1]: Started sshd@4-172.24.4.56:22-172.24.4.1:42390.service. Feb 9 19:34:23.721564 systemd[1]: sshd@3-172.24.4.56:22-172.24.4.1:42374.service: Deactivated successfully. Feb 9 19:34:23.722611 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:34:23.724148 systemd-logind[1044]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:34:23.726213 systemd-logind[1044]: Removed session 4. Feb 9 19:34:24.976696 sshd[1150]: Accepted publickey for core from 172.24.4.1 port 42390 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:34:24.981001 sshd[1150]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:34:24.993562 systemd-logind[1044]: New session 5 of user core. Feb 9 19:34:24.993731 systemd[1]: Started session-5.scope. Feb 9 19:34:25.413293 sudo[1155]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:34:25.414261 sudo[1155]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:34:25.427173 dbus-daemon[1034]: \xd0혶\xd9U: received setenforce notice (enforcing=-1415830528) Feb 9 19:34:25.431137 sudo[1155]: pam_unix(sudo:session): session closed for user root Feb 9 19:34:25.701541 sshd[1150]: pam_unix(sshd:session): session closed for user core Feb 9 19:34:25.709630 systemd[1]: Started sshd@5-172.24.4.56:22-172.24.4.1:51012.service. Feb 9 19:34:25.712878 systemd[1]: sshd@4-172.24.4.56:22-172.24.4.1:42390.service: Deactivated successfully. Feb 9 19:34:25.714601 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:34:25.718215 systemd-logind[1044]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:34:25.720644 systemd-logind[1044]: Removed session 5. Feb 9 19:34:27.023111 sshd[1158]: Accepted publickey for core from 172.24.4.1 port 51012 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:34:27.025759 sshd[1158]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:34:27.035935 systemd-logind[1044]: New session 6 of user core. Feb 9 19:34:27.037592 systemd[1]: Started session-6.scope. Feb 9 19:34:27.564417 sudo[1163]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:34:27.564959 sudo[1163]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:34:27.571371 sudo[1163]: pam_unix(sudo:session): session closed for user root Feb 9 19:34:27.583756 sudo[1162]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:34:27.585241 sudo[1162]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:34:27.616242 systemd[1]: Stopping audit-rules.service... Feb 9 19:34:27.617000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:34:27.618489 auditctl[1166]: No rules Feb 9 19:34:27.622845 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 19:34:27.623011 kernel: audit: type=1305 audit(1707507267.617:162): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:34:27.619944 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:34:27.620343 systemd[1]: Stopped audit-rules.service. Feb 9 19:34:27.630397 kernel: audit: type=1300 audit(1707507267.617:162): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf3b25230 a2=420 a3=0 items=0 ppid=1 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:27.617000 audit[1166]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcf3b25230 a2=420 a3=0 items=0 ppid=1 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:27.624724 systemd[1]: Starting audit-rules.service... Feb 9 19:34:27.617000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:34:27.637061 kernel: audit: type=1327 audit(1707507267.617:162): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:34:27.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:27.643754 kernel: audit: type=1131 audit(1707507267.619:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:27.666274 augenrules[1183]: No rules Feb 9 19:34:27.668093 systemd[1]: Finished audit-rules.service. Feb 9 19:34:27.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:27.670387 sudo[1162]: pam_unix(sudo:session): session closed for user root Feb 9 19:34:27.668000 audit[1162]: USER_END pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:34:27.678247 kernel: audit: type=1130 audit(1707507267.667:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:27.678360 kernel: audit: type=1106 audit(1707507267.668:165): pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:34:27.678412 kernel: audit: type=1104 audit(1707507267.668:166): pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:34:27.668000 audit[1162]: CRED_DISP pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:34:27.877000 audit[1158]: USER_END pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:27.876658 sshd[1158]: pam_unix(sshd:session): session closed for user core Feb 9 19:34:27.887900 systemd[1]: Started sshd@6-172.24.4.56:22-172.24.4.1:51026.service. Feb 9 19:34:27.897259 kernel: audit: type=1106 audit(1707507267.877:167): pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:27.897422 kernel: audit: type=1104 audit(1707507267.878:168): pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:27.878000 audit[1158]: CRED_DISP pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:27.895065 systemd[1]: sshd@5-172.24.4.56:22-172.24.4.1:51012.service: Deactivated successfully. Feb 9 19:34:27.896516 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:34:27.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.56:22-172.24.4.1:51026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:27.917723 systemd-logind[1044]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:34:27.917980 kernel: audit: type=1130 audit(1707507267.893:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.56:22-172.24.4.1:51026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:27.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.56:22-172.24.4.1:51012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:27.920374 systemd-logind[1044]: Removed session 6. Feb 9 19:34:29.198000 audit[1188]: USER_ACCT pid=1188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:29.199759 sshd[1188]: Accepted publickey for core from 172.24.4.1 port 51026 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:34:29.201000 audit[1188]: CRED_ACQ pid=1188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:29.201000 audit[1188]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe793d10c0 a2=3 a3=0 items=0 ppid=1 pid=1188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:29.201000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:34:29.203335 sshd[1188]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:34:29.213908 systemd-logind[1044]: New session 7 of user core. Feb 9 19:34:29.215286 systemd[1]: Started session-7.scope. Feb 9 19:34:29.226000 audit[1188]: USER_START pid=1188 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:29.229000 audit[1191]: CRED_ACQ pid=1191 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:29.651000 audit[1192]: USER_ACCT pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:34:29.653684 sudo[1192]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:34:29.652000 audit[1192]: CRED_REFR pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:34:29.654607 sudo[1192]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:34:29.657000 audit[1192]: USER_START pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:34:30.310343 systemd[1]: Reloading. Feb 9 19:34:30.439402 /usr/lib/systemd/system-generators/torcx-generator[1221]: time="2024-02-09T19:34:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:34:30.445601 /usr/lib/systemd/system-generators/torcx-generator[1221]: time="2024-02-09T19:34:30Z" level=info msg="torcx already run" Feb 9 19:34:30.534445 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:34:30.534691 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:34:30.558984 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:34:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.640000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.640000 audit: BPF prog-id=31 op=LOAD Feb 9 19:34:30.640000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:34:30.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.642000 audit: BPF prog-id=32 op=LOAD Feb 9 19:34:30.642000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:34:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.643000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.643000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.644000 audit: BPF prog-id=33 op=LOAD Feb 9 19:34:30.644000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:34:30.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.645000 audit: BPF prog-id=34 op=LOAD Feb 9 19:34:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.645000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.645000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.645000 audit: BPF prog-id=35 op=LOAD Feb 9 19:34:30.645000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:34:30.645000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:34:30.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.646000 audit: BPF prog-id=36 op=LOAD Feb 9 19:34:30.646000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:34:30.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.648000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.649000 audit: BPF prog-id=37 op=LOAD Feb 9 19:34:30.649000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:34:30.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.650000 audit: BPF prog-id=38 op=LOAD Feb 9 19:34:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.650000 audit: BPF prog-id=39 op=LOAD Feb 9 19:34:30.651000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:34:30.651000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:34:30.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.653000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.653000 audit: BPF prog-id=40 op=LOAD Feb 9 19:34:30.653000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit: BPF prog-id=41 op=LOAD Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.656000 audit: BPF prog-id=42 op=LOAD Feb 9 19:34:30.656000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:34:30.656000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:34:30.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.659000 audit: BPF prog-id=43 op=LOAD Feb 9 19:34:30.659000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:34:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.659000 audit: BPF prog-id=44 op=LOAD Feb 9 19:34:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.661000 audit: BPF prog-id=45 op=LOAD Feb 9 19:34:30.661000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:34:30.661000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:34:30.677536 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:34:30.691879 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:34:30.692485 systemd[1]: Reached target network-online.target. Feb 9 19:34:30.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:30.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:30.695612 systemd[1]: Started kubelet.service. Feb 9 19:34:30.739262 systemd[1]: Starting coreos-metadata.service... Feb 9 19:34:30.776883 kubelet[1268]: E0209 19:34:30.776756 1268 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:34:30.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:34:30.779220 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:34:30.779352 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:34:30.798871 coreos-metadata[1275]: Feb 09 19:34:30.798 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Feb 9 19:34:31.016238 coreos-metadata[1275]: Feb 09 19:34:31.014 INFO Fetch successful Feb 9 19:34:31.016238 coreos-metadata[1275]: Feb 09 19:34:31.014 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Feb 9 19:34:31.029288 coreos-metadata[1275]: Feb 09 19:34:31.029 INFO Fetch successful Feb 9 19:34:31.029288 coreos-metadata[1275]: Feb 09 19:34:31.029 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Feb 9 19:34:31.044347 coreos-metadata[1275]: Feb 09 19:34:31.043 INFO Fetch successful Feb 9 19:34:31.044680 coreos-metadata[1275]: Feb 09 19:34:31.044 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Feb 9 19:34:31.055848 coreos-metadata[1275]: Feb 09 19:34:31.055 INFO Fetch successful Feb 9 19:34:31.055848 coreos-metadata[1275]: Feb 09 19:34:31.055 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Feb 9 19:34:31.070189 coreos-metadata[1275]: Feb 09 19:34:31.070 INFO Fetch successful Feb 9 19:34:31.090323 systemd[1]: Finished coreos-metadata.service. Feb 9 19:34:31.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:32.021322 systemd[1]: Stopped kubelet.service. Feb 9 19:34:32.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:32.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:32.070821 systemd[1]: Reloading. Feb 9 19:34:32.209992 /usr/lib/systemd/system-generators/torcx-generator[1338]: time="2024-02-09T19:34:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:34:32.210310 /usr/lib/systemd/system-generators/torcx-generator[1338]: time="2024-02-09T19:34:32Z" level=info msg="torcx already run" Feb 9 19:34:32.283189 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:34:32.283211 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:34:32.307552 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:34:32.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.378000 audit: BPF prog-id=46 op=LOAD Feb 9 19:34:32.378000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:34:32.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.379000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.379000 audit: BPF prog-id=47 op=LOAD Feb 9 19:34:32.379000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit: BPF prog-id=48 op=LOAD Feb 9 19:34:32.380000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit: BPF prog-id=49 op=LOAD Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit: BPF prog-id=50 op=LOAD Feb 9 19:34:32.380000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:34:32.380000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.381000 audit: BPF prog-id=51 op=LOAD Feb 9 19:34:32.381000 audit: BPF prog-id=36 op=UNLOAD Feb 9 19:34:32.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.382000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.382000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit: BPF prog-id=52 op=LOAD Feb 9 19:34:32.383000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit: BPF prog-id=53 op=LOAD Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.383000 audit: BPF prog-id=54 op=LOAD Feb 9 19:34:32.383000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:34:32.383000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:34:32.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.385000 audit: BPF prog-id=55 op=LOAD Feb 9 19:34:32.385000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit: BPF prog-id=56 op=LOAD Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.386000 audit: BPF prog-id=57 op=LOAD Feb 9 19:34:32.386000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:34:32.386000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:34:32.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.388000 audit: BPF prog-id=58 op=LOAD Feb 9 19:34:32.388000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:34:32.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit: BPF prog-id=59 op=LOAD Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:32.389000 audit: BPF prog-id=60 op=LOAD Feb 9 19:34:32.389000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:34:32.389000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:34:32.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:32.412711 systemd[1]: Started kubelet.service. Feb 9 19:34:32.486820 kubelet[1378]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:34:32.486820 kubelet[1378]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:34:32.487192 kubelet[1378]: I0209 19:34:32.486902 1378 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:34:32.489998 kubelet[1378]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:34:32.490093 kubelet[1378]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:34:33.092726 kubelet[1378]: I0209 19:34:33.092698 1378 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:34:33.092934 kubelet[1378]: I0209 19:34:33.092920 1378 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:34:33.093259 kubelet[1378]: I0209 19:34:33.093245 1378 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:34:33.099524 kubelet[1378]: I0209 19:34:33.099481 1378 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:34:33.105212 kubelet[1378]: I0209 19:34:33.105178 1378 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:34:33.105553 kubelet[1378]: I0209 19:34:33.105538 1378 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:34:33.105695 kubelet[1378]: I0209 19:34:33.105682 1378 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:34:33.105892 kubelet[1378]: I0209 19:34:33.105879 1378 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:34:33.105975 kubelet[1378]: I0209 19:34:33.105953 1378 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:34:33.106143 kubelet[1378]: I0209 19:34:33.106131 1378 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:34:33.112993 kubelet[1378]: I0209 19:34:33.112974 1378 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:34:33.113139 kubelet[1378]: I0209 19:34:33.113128 1378 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:34:33.113218 kubelet[1378]: I0209 19:34:33.113208 1378 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:34:33.113292 kubelet[1378]: I0209 19:34:33.113282 1378 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:34:33.113956 kubelet[1378]: E0209 19:34:33.113927 1378 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:33.114055 kubelet[1378]: E0209 19:34:33.114033 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:33.114912 kubelet[1378]: I0209 19:34:33.114881 1378 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:34:33.115428 kubelet[1378]: W0209 19:34:33.115403 1378 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:34:33.116304 kubelet[1378]: I0209 19:34:33.116273 1378 server.go:1186] "Started kubelet" Feb 9 19:34:33.116446 kubelet[1378]: I0209 19:34:33.116433 1378 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:34:33.117347 kubelet[1378]: I0209 19:34:33.117331 1378 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:34:33.118000 audit[1378]: AVC avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:33.119161 kubelet[1378]: I0209 19:34:33.119148 1378 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:34:33.119254 kubelet[1378]: I0209 19:34:33.119242 1378 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:34:33.119367 kubelet[1378]: I0209 19:34:33.119356 1378 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:34:33.119969 kubelet[1378]: E0209 19:34:33.119955 1378 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:34:33.120072 kubelet[1378]: E0209 19:34:33.120060 1378 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:34:33.129685 kernel: kauditd_printk_skb: 362 callbacks suppressed Feb 9 19:34:33.129918 kernel: audit: type=1400 audit(1707507273.118:530): avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:33.129980 kubelet[1378]: I0209 19:34:33.124154 1378 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:34:33.129980 kubelet[1378]: I0209 19:34:33.124236 1378 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:34:33.134832 kernel: audit: type=1401 audit(1707507273.118:530): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:34:33.118000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:34:33.118000 audit[1378]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a04780 a1=c0010a0d98 a2=c000a04750 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.147858 kernel: audit: type=1300 audit(1707507273.118:530): arch=c000003e syscall=188 success=no exit=-22 a0=c000a04780 a1=c0010a0d98 a2=c000a04750 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.118000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:34:33.159261 kubelet[1378]: E0209 19:34:33.159235 1378 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "172.24.4.56" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:34:33.159747 kubelet[1378]: W0209 19:34:33.159455 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:34:33.159896 kubelet[1378]: E0209 19:34:33.159883 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:34:33.159998 kubelet[1378]: W0209 19:34:33.159559 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.24.4.56" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:34:33.160091 kubelet[1378]: E0209 19:34:33.160078 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.56" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:34:33.160172 kubelet[1378]: E0209 19:34:33.159579 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d1717d2ddb", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 116233179, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 116233179, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:33.160491 kubelet[1378]: W0209 19:34:33.159688 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:34:33.160600 kubelet[1378]: E0209 19:34:33.160589 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:34:33.168324 kernel: audit: type=1327 audit(1707507273.118:530): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:34:33.169445 kubelet[1378]: E0209 19:34:33.169332 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d171b7575a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 120044890, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 120044890, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:33.118000 audit[1378]: AVC avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:33.185793 kernel: audit: type=1400 audit(1707507273.118:531): avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:33.185877 kernel: audit: type=1401 audit(1707507273.118:531): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:34:33.185899 kernel: audit: type=1300 audit(1707507273.118:531): arch=c000003e syscall=188 success=no exit=-22 a0=c0006f48c0 a1=c0010a0db0 a2=c000a04810 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.118000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:34:33.118000 audit[1378]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006f48c0 a1=c0010a0db0 a2=c000a04810 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.118000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:34:33.193492 kernel: audit: type=1327 audit(1707507273.118:531): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:34:33.193580 kubelet[1378]: I0209 19:34:33.193175 1378 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:34:33.193580 kubelet[1378]: I0209 19:34:33.193188 1378 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:34:33.193580 kubelet[1378]: I0209 19:34:33.193206 1378 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:34:33.197115 kubelet[1378]: E0209 19:34:33.193890 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d176059b91", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.56 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192283025, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192283025, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:33.197231 kubelet[1378]: E0209 19:34:33.194621 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605b56b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.56 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192289643, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192289643, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:33.197298 kubelet[1378]: E0209 19:34:33.196080 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605c494", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.56 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192293524, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192293524, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:33.199000 audit[1393]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.199000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffea3f51b60 a2=0 a3=7ffea3f51b4c items=0 ppid=1378 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.208955 kernel: audit: type=1325 audit(1707507273.199:532): table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.209007 kernel: audit: type=1300 audit(1707507273.199:532): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffea3f51b60 a2=0 a3=7ffea3f51b4c items=0 ppid=1378 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.199000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:34:33.202000 audit[1396]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.202000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe061f5a20 a2=0 a3=7ffe061f5a0c items=0 ppid=1378 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:34:33.213302 kubelet[1378]: I0209 19:34:33.213265 1378 policy_none.go:49] "None policy: Start" Feb 9 19:34:33.214391 kubelet[1378]: I0209 19:34:33.214362 1378 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:34:33.214488 kubelet[1378]: I0209 19:34:33.214474 1378 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:34:33.225347 kubelet[1378]: I0209 19:34:33.225315 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.56" Feb 9 19:34:33.229466 kubelet[1378]: E0209 19:34:33.229260 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.56" Feb 9 19:34:33.229466 kubelet[1378]: E0209 19:34:33.229341 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d176059b91", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.56 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192283025, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 225271410, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d176059b91" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:33.210000 audit[1398]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.210000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcceb9beb0 a2=0 a3=7ffcceb9be9c items=0 ppid=1378 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:34:33.230514 kubelet[1378]: E0209 19:34:33.230366 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605b56b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.56 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192289643, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 225280607, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d17605b56b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:33.231813 kubelet[1378]: E0209 19:34:33.231123 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605c494", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.56 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192293524, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 225283756, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d17605c494" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:33.232355 systemd[1]: Created slice kubepods.slice. Feb 9 19:34:33.234000 audit[1403]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.234000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeed7e5a30 a2=0 a3=7ffeed7e5a1c items=0 ppid=1378 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:34:33.253807 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:34:33.258961 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:34:33.278819 kubelet[1378]: I0209 19:34:33.271168 1378 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:34:33.278000 audit[1378]: AVC avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:33.278000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:34:33.278000 audit[1378]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001156120 a1=c0011a0720 a2=c0011560f0 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.278000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:34:33.279400 kubelet[1378]: E0209 19:34:33.277878 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17b0add23", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 276513571, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 276513571, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:33.279609 kubelet[1378]: I0209 19:34:33.279572 1378 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:34:33.280308 kubelet[1378]: I0209 19:34:33.280297 1378 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:34:33.281597 kubelet[1378]: E0209 19:34:33.281568 1378 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.56\" not found" Feb 9 19:34:33.298000 audit[1408]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.298000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff140ec2a0 a2=0 a3=7fff140ec28c items=0 ppid=1378 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:34:33.299000 audit[1409]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.299000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe9b43c4f0 a2=0 a3=7ffe9b43c4dc items=0 ppid=1378 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:34:33.306000 audit[1412]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.306000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff0a97a340 a2=0 a3=7fff0a97a32c items=0 ppid=1378 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:34:33.311000 audit[1415]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.311000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffcdb034ef0 a2=0 a3=7ffcdb034edc items=0 ppid=1378 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.311000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:34:33.312000 audit[1416]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.312000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffce6d644c0 a2=0 a3=7ffce6d644ac items=0 ppid=1378 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.312000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:34:33.313000 audit[1417]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.313000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7f1fa860 a2=0 a3=7ffd7f1fa84c items=0 ppid=1378 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:34:33.316000 audit[1419]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.316000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc13fba5f0 a2=0 a3=7ffc13fba5dc items=0 ppid=1378 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.316000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:34:33.318000 audit[1421]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.318000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc28f99380 a2=0 a3=7ffc28f9936c items=0 ppid=1378 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.318000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:34:33.343000 audit[1424]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.343000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fff1cc69460 a2=0 a3=7fff1cc6944c items=0 ppid=1378 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:34:33.350000 audit[1426]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.350000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffed6ab2a60 a2=0 a3=7ffed6ab2a4c items=0 ppid=1378 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.350000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:34:33.362380 kubelet[1378]: E0209 19:34:33.362352 1378 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "172.24.4.56" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:34:33.362000 audit[1429]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.362000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7ffdab7801b0 a2=0 a3=7ffdab78019c items=0 ppid=1378 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:34:33.365292 kubelet[1378]: I0209 19:34:33.365249 1378 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:34:33.364000 audit[1431]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.364000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7a9b3100 a2=0 a3=7fff7a9b30ec items=0 ppid=1378 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:34:33.365000 audit[1430]: NETFILTER_CFG table=mangle:18 family=10 entries=2 op=nft_register_chain pid=1430 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.365000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffd62be470 a2=0 a3=7fffd62be45c items=0 ppid=1378 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:34:33.367000 audit[1433]: NETFILTER_CFG table=nat:19 family=10 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.367000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdcd1ebb20 a2=0 a3=7ffdcd1ebb0c items=0 ppid=1378 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:34:33.367000 audit[1432]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.367000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe48417ae0 a2=0 a3=7ffe48417acc items=0 ppid=1378 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:34:33.369000 audit[1435]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:33.369000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf8767a90 a2=0 a3=7ffdf8767a7c items=0 ppid=1378 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:34:33.372000 audit[1436]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.372000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff40c62420 a2=0 a3=7fff40c6240c items=0 ppid=1378 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.372000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:34:33.373000 audit[1437]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=1437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.373000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffe484ce650 a2=0 a3=7ffe484ce63c items=0 ppid=1378 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.373000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:34:33.376000 audit[1439]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.376000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffe14ec2010 a2=0 a3=7ffe14ec1ffc items=0 ppid=1378 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.376000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:34:33.377000 audit[1440]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.377000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff05ed9890 a2=0 a3=7fff05ed987c items=0 ppid=1378 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.377000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:34:33.378000 audit[1441]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=1441 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.378000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd090c2750 a2=0 a3=7ffd090c273c items=0 ppid=1378 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.378000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:34:33.381000 audit[1443]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.381000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc256cf2a0 a2=0 a3=7ffc256cf28c items=0 ppid=1378 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:34:33.384000 audit[1445]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.384000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff337754f0 a2=0 a3=7fff337754dc items=0 ppid=1378 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.384000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:34:33.386000 audit[1447]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.386000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffdf2affa50 a2=0 a3=7ffdf2affa3c items=0 ppid=1378 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.386000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:34:33.390000 audit[1449]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.390000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffd9d28e140 a2=0 a3=7ffd9d28e12c items=0 ppid=1378 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.390000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:34:33.394000 audit[1451]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.394000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffe7ef15e90 a2=0 a3=7ffe7ef15e7c items=0 ppid=1378 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:34:33.396746 kubelet[1378]: I0209 19:34:33.396714 1378 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:34:33.396876 kubelet[1378]: I0209 19:34:33.396848 1378 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:34:33.396945 kubelet[1378]: I0209 19:34:33.396924 1378 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:34:33.397054 kubelet[1378]: E0209 19:34:33.397021 1378 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 19:34:33.396000 audit[1452]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1452 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.396000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2a6c2110 a2=0 a3=7ffe2a6c20fc items=0 ppid=1378 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.396000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:34:33.397000 audit[1453]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=1453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.397000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9bf0fe70 a2=0 a3=7ffc9bf0fe5c items=0 ppid=1378 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:34:33.398000 audit[1454]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:33.398000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe9642f5a0 a2=0 a3=7ffe9642f58c items=0 ppid=1378 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:33.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:34:33.401210 kubelet[1378]: W0209 19:34:33.401131 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:34:33.401280 kubelet[1378]: E0209 19:34:33.401223 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:34:33.431673 kubelet[1378]: I0209 19:34:33.431651 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.56" Feb 9 19:34:33.434896 kubelet[1378]: E0209 19:34:33.434873 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.56" Feb 9 19:34:33.435682 kubelet[1378]: E0209 19:34:33.435518 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d176059b91", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.56 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192283025, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 431590123, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d176059b91" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:33.437719 kubelet[1378]: E0209 19:34:33.437633 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605b56b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.56 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192289643, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 431605306, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d17605b56b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:33.520233 kubelet[1378]: E0209 19:34:33.519879 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605c494", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.56 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192293524, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 431620450, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d17605c494" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:33.777229 kubelet[1378]: E0209 19:34:33.772010 1378 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "172.24.4.56" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:34:33.837424 kubelet[1378]: I0209 19:34:33.837330 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.56" Feb 9 19:34:33.839262 kubelet[1378]: E0209 19:34:33.839219 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.56" Feb 9 19:34:33.839766 kubelet[1378]: E0209 19:34:33.839586 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d176059b91", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.56 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192283025, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 837248259, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d176059b91" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:33.919268 kubelet[1378]: E0209 19:34:33.919104 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605b56b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.56 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192289643, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 837259672, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d17605b56b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:34.115225 kubelet[1378]: E0209 19:34:34.115162 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:34.118196 kubelet[1378]: E0209 19:34:34.118111 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605c494", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.56 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192293524, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 837283179, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d17605c494" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:34.216179 kubelet[1378]: W0209 19:34:34.216142 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:34:34.216409 kubelet[1378]: E0209 19:34:34.216393 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:34:34.261242 kubelet[1378]: W0209 19:34:34.261206 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.24.4.56" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:34:34.261450 kubelet[1378]: E0209 19:34:34.261437 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.56" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:34:34.311783 kubelet[1378]: W0209 19:34:34.311675 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:34:34.311950 kubelet[1378]: E0209 19:34:34.311826 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:34:34.577240 kubelet[1378]: E0209 19:34:34.577146 1378 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "172.24.4.56" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:34:34.641833 kubelet[1378]: I0209 19:34:34.641726 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.56" Feb 9 19:34:34.643850 kubelet[1378]: E0209 19:34:34.643737 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.56" Feb 9 19:34:34.644109 kubelet[1378]: E0209 19:34:34.643763 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d176059b91", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.56 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192283025, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 34, 641587128, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d176059b91" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:34.645391 kubelet[1378]: E0209 19:34:34.645254 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605b56b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.56 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192289643, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 34, 641602449, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d17605b56b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:34.720387 kubelet[1378]: E0209 19:34:34.720188 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605c494", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.56 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192293524, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 34, 641633515, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d17605c494" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:34.982944 kubelet[1378]: W0209 19:34:34.982723 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:34:34.982944 kubelet[1378]: E0209 19:34:34.982825 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:34:35.116164 kubelet[1378]: E0209 19:34:35.116092 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:36.117136 kubelet[1378]: E0209 19:34:36.117056 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:36.180359 kubelet[1378]: E0209 19:34:36.180295 1378 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "172.24.4.56" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:34:36.246106 kubelet[1378]: I0209 19:34:36.246029 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.56" Feb 9 19:34:36.248880 kubelet[1378]: E0209 19:34:36.248843 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.56" Feb 9 19:34:36.249070 kubelet[1378]: E0209 19:34:36.248902 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d176059b91", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.56 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192283025, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 36, 245929925, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d176059b91" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:36.250541 kubelet[1378]: E0209 19:34:36.250378 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605b56b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.56 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192289643, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 36, 245945996, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d17605b56b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:36.252345 kubelet[1378]: E0209 19:34:36.252235 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605c494", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.56 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192293524, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 36, 245956263, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d17605c494" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:36.262139 kubelet[1378]: W0209 19:34:36.262066 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:34:36.263021 kubelet[1378]: E0209 19:34:36.262980 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:34:36.799009 kubelet[1378]: W0209 19:34:36.798939 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:34:36.799378 kubelet[1378]: E0209 19:34:36.799345 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:34:37.030685 kubelet[1378]: W0209 19:34:37.030556 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.24.4.56" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:34:37.030685 kubelet[1378]: E0209 19:34:37.030656 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.56" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:34:37.117709 kubelet[1378]: E0209 19:34:37.117600 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:37.121013 kubelet[1378]: W0209 19:34:37.120961 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:34:37.121250 kubelet[1378]: E0209 19:34:37.121223 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:34:38.118216 kubelet[1378]: E0209 19:34:38.118070 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:39.119099 kubelet[1378]: E0209 19:34:39.119028 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:39.382913 kubelet[1378]: E0209 19:34:39.382683 1378 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "172.24.4.56" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:34:39.451033 kubelet[1378]: I0209 19:34:39.450968 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.56" Feb 9 19:34:39.453838 kubelet[1378]: E0209 19:34:39.453630 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d176059b91", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.56 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192283025, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 39, 450902398, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d176059b91" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:39.454351 kubelet[1378]: E0209 19:34:39.454310 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.56" Feb 9 19:34:39.456218 kubelet[1378]: E0209 19:34:39.456063 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605b56b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.56 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192289643, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 39, 450913486, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d17605b56b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:39.458660 kubelet[1378]: E0209 19:34:39.458482 1378 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56.17b248d17605c494", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.56", UID:"172.24.4.56", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.56 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.56"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 34, 33, 192293524, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 34, 39, 450920313, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.56.17b248d17605c494" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:34:39.841566 kubelet[1378]: W0209 19:34:39.841503 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:34:39.841945 kubelet[1378]: E0209 19:34:39.841917 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:34:40.120661 kubelet[1378]: E0209 19:34:40.120458 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:41.121608 kubelet[1378]: E0209 19:34:41.121466 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:41.725464 kubelet[1378]: W0209 19:34:41.725348 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:34:41.725464 kubelet[1378]: E0209 19:34:41.725452 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:34:41.897334 kubelet[1378]: W0209 19:34:41.897219 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.24.4.56" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:34:41.897334 kubelet[1378]: E0209 19:34:41.897320 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.56" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:34:42.025565 kubelet[1378]: W0209 19:34:42.025382 1378 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:34:42.025565 kubelet[1378]: E0209 19:34:42.025448 1378 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:34:42.122840 kubelet[1378]: E0209 19:34:42.122583 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:43.097112 kubelet[1378]: I0209 19:34:43.097046 1378 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 19:34:43.123662 kubelet[1378]: E0209 19:34:43.123595 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:43.283570 kubelet[1378]: E0209 19:34:43.283482 1378 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.56\" not found" Feb 9 19:34:43.535866 kubelet[1378]: E0209 19:34:43.535636 1378 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.24.4.56" not found Feb 9 19:34:44.124967 kubelet[1378]: E0209 19:34:44.124895 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:44.566068 kubelet[1378]: E0209 19:34:44.565869 1378 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.24.4.56" not found Feb 9 19:34:45.126029 kubelet[1378]: E0209 19:34:45.125977 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:45.792246 kubelet[1378]: E0209 19:34:45.792204 1378 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.24.4.56\" not found" node="172.24.4.56" Feb 9 19:34:45.856146 kubelet[1378]: I0209 19:34:45.856094 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.56" Feb 9 19:34:45.967732 kubelet[1378]: I0209 19:34:45.967637 1378 kubelet_node_status.go:73] "Successfully registered node" node="172.24.4.56" Feb 9 19:34:45.987550 kubelet[1378]: E0209 19:34:45.987492 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:46.088825 kubelet[1378]: E0209 19:34:46.088685 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:46.127179 kubelet[1378]: E0209 19:34:46.126995 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:46.189818 kubelet[1378]: E0209 19:34:46.189687 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:46.290249 kubelet[1378]: E0209 19:34:46.290186 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:46.392637 kubelet[1378]: E0209 19:34:46.391691 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:46.447828 kernel: kauditd_printk_skb: 101 callbacks suppressed Feb 9 19:34:46.448182 kernel: audit: type=1106 audit(1707507286.442:566): pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:34:46.442000 audit[1192]: USER_END pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:34:46.444394 sudo[1192]: pam_unix(sudo:session): session closed for user root Feb 9 19:34:46.443000 audit[1192]: CRED_DISP pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:34:46.459290 kernel: audit: type=1104 audit(1707507286.443:567): pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:34:46.493866 kubelet[1378]: E0209 19:34:46.493806 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:46.594455 kubelet[1378]: E0209 19:34:46.594350 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:46.656237 sshd[1188]: pam_unix(sshd:session): session closed for user core Feb 9 19:34:46.655000 audit[1188]: USER_END pid=1188 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:46.663838 kernel: audit: type=1106 audit(1707507286.655:568): pid=1188 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:46.655000 audit[1188]: CRED_DISP pid=1188 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:46.665434 systemd[1]: sshd@6-172.24.4.56:22-172.24.4.1:51026.service: Deactivated successfully. Feb 9 19:34:46.667007 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:34:46.667810 systemd-logind[1044]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:34:46.669631 systemd-logind[1044]: Removed session 7. Feb 9 19:34:46.673867 kernel: audit: type=1104 audit(1707507286.655:569): pid=1188 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:34:46.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.56:22-172.24.4.1:51026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:46.683819 kernel: audit: type=1131 audit(1707507286.662:570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.56:22-172.24.4.1:51026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:34:46.695252 kubelet[1378]: E0209 19:34:46.695181 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:46.796437 kubelet[1378]: E0209 19:34:46.796365 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:46.896740 kubelet[1378]: E0209 19:34:46.896649 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:46.997173 kubelet[1378]: E0209 19:34:46.996910 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:47.097930 kubelet[1378]: E0209 19:34:47.097868 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:47.127435 kubelet[1378]: E0209 19:34:47.127373 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:47.199210 kubelet[1378]: E0209 19:34:47.199022 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:47.299709 kubelet[1378]: E0209 19:34:47.299342 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:47.400243 kubelet[1378]: E0209 19:34:47.400053 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:47.501203 kubelet[1378]: E0209 19:34:47.501096 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:47.602073 kubelet[1378]: E0209 19:34:47.601992 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:47.702982 kubelet[1378]: E0209 19:34:47.702890 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:47.803955 kubelet[1378]: E0209 19:34:47.803875 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:47.904948 kubelet[1378]: E0209 19:34:47.904729 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:48.005978 kubelet[1378]: E0209 19:34:48.005878 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:48.106352 kubelet[1378]: E0209 19:34:48.106279 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:48.128355 kubelet[1378]: E0209 19:34:48.128297 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:48.208119 kubelet[1378]: E0209 19:34:48.207847 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:48.308973 kubelet[1378]: E0209 19:34:48.308906 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:48.409495 kubelet[1378]: E0209 19:34:48.409378 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:48.511000 kubelet[1378]: E0209 19:34:48.510501 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:48.611099 kubelet[1378]: E0209 19:34:48.611039 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:48.712380 kubelet[1378]: E0209 19:34:48.712254 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:48.813912 kubelet[1378]: E0209 19:34:48.813202 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:48.914455 kubelet[1378]: E0209 19:34:48.914321 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.56\" not found" Feb 9 19:34:49.016432 kubelet[1378]: I0209 19:34:49.016337 1378 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 19:34:49.017723 env[1051]: time="2024-02-09T19:34:49.017549147Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:34:49.019264 kubelet[1378]: I0209 19:34:49.019226 1378 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 19:34:49.123808 kubelet[1378]: I0209 19:34:49.123720 1378 apiserver.go:52] "Watching apiserver" Feb 9 19:34:49.129397 kubelet[1378]: E0209 19:34:49.129229 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:49.132489 kubelet[1378]: I0209 19:34:49.132419 1378 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:34:49.132751 kubelet[1378]: I0209 19:34:49.132711 1378 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:34:49.133025 kubelet[1378]: I0209 19:34:49.132895 1378 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:34:49.133510 kubelet[1378]: E0209 19:34:49.133449 1378 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:34:49.150443 systemd[1]: Created slice kubepods-besteffort-pod0e1234a0_b47e_47c0_891d_654dfb4f3861.slice. Feb 9 19:34:49.183632 systemd[1]: Created slice kubepods-besteffort-pod44f87eaf_be97_4f2d_b4d0_6720230dc409.slice. Feb 9 19:34:49.227143 kubelet[1378]: I0209 19:34:49.227044 1378 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:34:49.233282 kubelet[1378]: I0209 19:34:49.233242 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/0e1234a0-b47e-47c0-891d-654dfb4f3861-flexvol-driver-host\") pod \"calico-node-959nk\" (UID: \"0e1234a0-b47e-47c0-891d-654dfb4f3861\") " pod="calico-system/calico-node-959nk" Feb 9 19:34:49.233550 kubelet[1378]: I0209 19:34:49.233524 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f865e0d7-fdde-4dc8-9458-d3929a654ddf-varrun\") pod \"csi-node-driver-rmxrz\" (UID: \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\") " pod="calico-system/csi-node-driver-rmxrz" Feb 9 19:34:49.233861 kubelet[1378]: I0209 19:34:49.233830 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/0e1234a0-b47e-47c0-891d-654dfb4f3861-node-certs\") pod \"calico-node-959nk\" (UID: \"0e1234a0-b47e-47c0-891d-654dfb4f3861\") " pod="calico-system/calico-node-959nk" Feb 9 19:34:49.234207 kubelet[1378]: I0209 19:34:49.234179 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/0e1234a0-b47e-47c0-891d-654dfb4f3861-cni-net-dir\") pod \"calico-node-959nk\" (UID: \"0e1234a0-b47e-47c0-891d-654dfb4f3861\") " pod="calico-system/calico-node-959nk" Feb 9 19:34:49.234501 kubelet[1378]: I0209 19:34:49.234422 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/0e1234a0-b47e-47c0-891d-654dfb4f3861-cni-log-dir\") pod \"calico-node-959nk\" (UID: \"0e1234a0-b47e-47c0-891d-654dfb4f3861\") " pod="calico-system/calico-node-959nk" Feb 9 19:34:49.234893 kubelet[1378]: I0209 19:34:49.234729 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/44f87eaf-be97-4f2d-b4d0-6720230dc409-lib-modules\") pod \"kube-proxy-pgsml\" (UID: \"44f87eaf-be97-4f2d-b4d0-6720230dc409\") " pod="kube-system/kube-proxy-pgsml" Feb 9 19:34:49.235245 kubelet[1378]: I0209 19:34:49.235217 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f865e0d7-fdde-4dc8-9458-d3929a654ddf-socket-dir\") pod \"csi-node-driver-rmxrz\" (UID: \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\") " pod="calico-system/csi-node-driver-rmxrz" Feb 9 19:34:49.235608 kubelet[1378]: I0209 19:34:49.235581 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8ww4s\" (UniqueName: \"kubernetes.io/projected/f865e0d7-fdde-4dc8-9458-d3929a654ddf-kube-api-access-8ww4s\") pod \"csi-node-driver-rmxrz\" (UID: \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\") " pod="calico-system/csi-node-driver-rmxrz" Feb 9 19:34:49.236007 kubelet[1378]: I0209 19:34:49.235882 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0e1234a0-b47e-47c0-891d-654dfb4f3861-xtables-lock\") pod \"calico-node-959nk\" (UID: \"0e1234a0-b47e-47c0-891d-654dfb4f3861\") " pod="calico-system/calico-node-959nk" Feb 9 19:34:49.236407 kubelet[1378]: I0209 19:34:49.236354 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/0e1234a0-b47e-47c0-891d-654dfb4f3861-var-run-calico\") pod \"calico-node-959nk\" (UID: \"0e1234a0-b47e-47c0-891d-654dfb4f3861\") " pod="calico-system/calico-node-959nk" Feb 9 19:34:49.236828 kubelet[1378]: I0209 19:34:49.236656 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/44f87eaf-be97-4f2d-b4d0-6720230dc409-kube-proxy\") pod \"kube-proxy-pgsml\" (UID: \"44f87eaf-be97-4f2d-b4d0-6720230dc409\") " pod="kube-system/kube-proxy-pgsml" Feb 9 19:34:49.237213 kubelet[1378]: I0209 19:34:49.237108 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5dbjg\" (UniqueName: \"kubernetes.io/projected/44f87eaf-be97-4f2d-b4d0-6720230dc409-kube-api-access-5dbjg\") pod \"kube-proxy-pgsml\" (UID: \"44f87eaf-be97-4f2d-b4d0-6720230dc409\") " pod="kube-system/kube-proxy-pgsml" Feb 9 19:34:49.237543 kubelet[1378]: I0209 19:34:49.237442 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/0e1234a0-b47e-47c0-891d-654dfb4f3861-policysync\") pod \"calico-node-959nk\" (UID: \"0e1234a0-b47e-47c0-891d-654dfb4f3861\") " pod="calico-system/calico-node-959nk" Feb 9 19:34:49.237899 kubelet[1378]: I0209 19:34:49.237872 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0e1234a0-b47e-47c0-891d-654dfb4f3861-tigera-ca-bundle\") pod \"calico-node-959nk\" (UID: \"0e1234a0-b47e-47c0-891d-654dfb4f3861\") " pod="calico-system/calico-node-959nk" Feb 9 19:34:49.238249 kubelet[1378]: I0209 19:34:49.238223 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/0e1234a0-b47e-47c0-891d-654dfb4f3861-cni-bin-dir\") pod \"calico-node-959nk\" (UID: \"0e1234a0-b47e-47c0-891d-654dfb4f3861\") " pod="calico-system/calico-node-959nk" Feb 9 19:34:49.238659 kubelet[1378]: I0209 19:34:49.238625 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-prknj\" (UniqueName: \"kubernetes.io/projected/0e1234a0-b47e-47c0-891d-654dfb4f3861-kube-api-access-prknj\") pod \"calico-node-959nk\" (UID: \"0e1234a0-b47e-47c0-891d-654dfb4f3861\") " pod="calico-system/calico-node-959nk" Feb 9 19:34:49.239182 kubelet[1378]: I0209 19:34:49.239147 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/44f87eaf-be97-4f2d-b4d0-6720230dc409-xtables-lock\") pod \"kube-proxy-pgsml\" (UID: \"44f87eaf-be97-4f2d-b4d0-6720230dc409\") " pod="kube-system/kube-proxy-pgsml" Feb 9 19:34:49.239634 kubelet[1378]: I0209 19:34:49.239591 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f865e0d7-fdde-4dc8-9458-d3929a654ddf-kubelet-dir\") pod \"csi-node-driver-rmxrz\" (UID: \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\") " pod="calico-system/csi-node-driver-rmxrz" Feb 9 19:34:49.240001 kubelet[1378]: I0209 19:34:49.239975 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f865e0d7-fdde-4dc8-9458-d3929a654ddf-registration-dir\") pod \"csi-node-driver-rmxrz\" (UID: \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\") " pod="calico-system/csi-node-driver-rmxrz" Feb 9 19:34:49.240341 kubelet[1378]: I0209 19:34:49.240240 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0e1234a0-b47e-47c0-891d-654dfb4f3861-lib-modules\") pod \"calico-node-959nk\" (UID: \"0e1234a0-b47e-47c0-891d-654dfb4f3861\") " pod="calico-system/calico-node-959nk" Feb 9 19:34:49.240689 kubelet[1378]: I0209 19:34:49.240589 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/0e1234a0-b47e-47c0-891d-654dfb4f3861-var-lib-calico\") pod \"calico-node-959nk\" (UID: \"0e1234a0-b47e-47c0-891d-654dfb4f3861\") " pod="calico-system/calico-node-959nk" Feb 9 19:34:49.240945 kubelet[1378]: I0209 19:34:49.240918 1378 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:34:49.348428 kubelet[1378]: E0209 19:34:49.348309 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.348428 kubelet[1378]: W0209 19:34:49.348359 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.348428 kubelet[1378]: E0209 19:34:49.348409 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.348937 kubelet[1378]: E0209 19:34:49.348693 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.348937 kubelet[1378]: W0209 19:34:49.348713 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.348937 kubelet[1378]: E0209 19:34:49.348740 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.349487 kubelet[1378]: E0209 19:34:49.349421 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.349487 kubelet[1378]: W0209 19:34:49.349476 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.349671 kubelet[1378]: E0209 19:34:49.349521 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.350064 kubelet[1378]: E0209 19:34:49.350014 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.350064 kubelet[1378]: W0209 19:34:49.350050 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.350238 kubelet[1378]: E0209 19:34:49.350080 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.350502 kubelet[1378]: E0209 19:34:49.350452 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.350606 kubelet[1378]: W0209 19:34:49.350514 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.350606 kubelet[1378]: E0209 19:34:49.350559 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.350972 kubelet[1378]: E0209 19:34:49.350916 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.350972 kubelet[1378]: W0209 19:34:49.350949 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.350972 kubelet[1378]: E0209 19:34:49.350977 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.351296 kubelet[1378]: E0209 19:34:49.351238 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.351296 kubelet[1378]: W0209 19:34:49.351271 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.351296 kubelet[1378]: E0209 19:34:49.351297 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.351700 kubelet[1378]: E0209 19:34:49.351657 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.351700 kubelet[1378]: W0209 19:34:49.351689 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.351903 kubelet[1378]: E0209 19:34:49.351721 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.352231 kubelet[1378]: E0209 19:34:49.352180 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.352231 kubelet[1378]: W0209 19:34:49.352214 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.352400 kubelet[1378]: E0209 19:34:49.352241 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.352541 kubelet[1378]: E0209 19:34:49.352499 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.352541 kubelet[1378]: W0209 19:34:49.352536 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.352728 kubelet[1378]: E0209 19:34:49.352563 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.352929 kubelet[1378]: E0209 19:34:49.352891 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.352929 kubelet[1378]: W0209 19:34:49.352924 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.353127 kubelet[1378]: E0209 19:34:49.352952 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.353357 kubelet[1378]: E0209 19:34:49.353316 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.353357 kubelet[1378]: W0209 19:34:49.353349 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.353512 kubelet[1378]: E0209 19:34:49.353377 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.365047 kubelet[1378]: E0209 19:34:49.364870 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.365047 kubelet[1378]: W0209 19:34:49.364906 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.365047 kubelet[1378]: E0209 19:34:49.364967 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.451004 kubelet[1378]: E0209 19:34:49.446257 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.451544 kubelet[1378]: W0209 19:34:49.451475 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.451747 kubelet[1378]: E0209 19:34:49.451722 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.452523 kubelet[1378]: E0209 19:34:49.452494 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.452699 kubelet[1378]: W0209 19:34:49.452673 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.452961 kubelet[1378]: E0209 19:34:49.452937 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.453617 kubelet[1378]: E0209 19:34:49.453591 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.453837 kubelet[1378]: W0209 19:34:49.453765 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.454012 kubelet[1378]: E0209 19:34:49.453989 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.565282 kubelet[1378]: E0209 19:34:49.565215 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.565641 kubelet[1378]: W0209 19:34:49.565606 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.565902 kubelet[1378]: E0209 19:34:49.565872 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.566530 kubelet[1378]: E0209 19:34:49.566503 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.566687 kubelet[1378]: W0209 19:34:49.566662 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.566896 kubelet[1378]: E0209 19:34:49.566871 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.567454 kubelet[1378]: E0209 19:34:49.567429 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.567623 kubelet[1378]: W0209 19:34:49.567597 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.567832 kubelet[1378]: E0209 19:34:49.567766 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.636144 kubelet[1378]: E0209 19:34:49.635454 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.636144 kubelet[1378]: W0209 19:34:49.635502 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.636144 kubelet[1378]: E0209 19:34:49.635545 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.669671 kubelet[1378]: E0209 19:34:49.669602 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.669671 kubelet[1378]: W0209 19:34:49.669658 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.670060 kubelet[1378]: E0209 19:34:49.669720 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.670242 kubelet[1378]: E0209 19:34:49.670201 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.670242 kubelet[1378]: W0209 19:34:49.670236 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.670405 kubelet[1378]: E0209 19:34:49.670265 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.773287 kubelet[1378]: E0209 19:34:49.771399 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.773287 kubelet[1378]: W0209 19:34:49.772302 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.773631 kubelet[1378]: E0209 19:34:49.773402 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.774018 kubelet[1378]: E0209 19:34:49.773965 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.774018 kubelet[1378]: W0209 19:34:49.774008 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.774179 kubelet[1378]: E0209 19:34:49.774042 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.783868 env[1051]: time="2024-02-09T19:34:49.782808263Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-959nk,Uid:0e1234a0-b47e-47c0-891d-654dfb4f3861,Namespace:calico-system,Attempt:0,}" Feb 9 19:34:49.838791 kubelet[1378]: E0209 19:34:49.838732 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.839133 kubelet[1378]: W0209 19:34:49.839100 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.839391 kubelet[1378]: E0209 19:34:49.839336 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.875609 kubelet[1378]: E0209 19:34:49.875466 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.875609 kubelet[1378]: W0209 19:34:49.875501 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.875609 kubelet[1378]: E0209 19:34:49.875539 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:49.977673 kubelet[1378]: E0209 19:34:49.977464 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:49.977673 kubelet[1378]: W0209 19:34:49.977506 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:49.977673 kubelet[1378]: E0209 19:34:49.977546 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:50.032768 kubelet[1378]: E0209 19:34:50.032643 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:34:50.033761 kubelet[1378]: W0209 19:34:50.033726 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:34:50.034046 kubelet[1378]: E0209 19:34:50.033996 1378 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:34:50.091242 env[1051]: time="2024-02-09T19:34:50.091122617Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pgsml,Uid:44f87eaf-be97-4f2d-b4d0-6720230dc409,Namespace:kube-system,Attempt:0,}" Feb 9 19:34:50.130288 kubelet[1378]: E0209 19:34:50.130168 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:50.669828 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3084680595.mount: Deactivated successfully. Feb 9 19:34:50.687525 env[1051]: time="2024-02-09T19:34:50.687417416Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:50.689741 env[1051]: time="2024-02-09T19:34:50.689637153Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:50.702328 env[1051]: time="2024-02-09T19:34:50.702221909Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:50.706884 env[1051]: time="2024-02-09T19:34:50.706809810Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:50.711955 env[1051]: time="2024-02-09T19:34:50.711903219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:50.717580 env[1051]: time="2024-02-09T19:34:50.717447554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:50.719335 env[1051]: time="2024-02-09T19:34:50.719273370Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:50.721835 env[1051]: time="2024-02-09T19:34:50.721662510Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:50.817210 env[1051]: time="2024-02-09T19:34:50.816818641Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:34:50.817210 env[1051]: time="2024-02-09T19:34:50.816902175Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:34:50.817210 env[1051]: time="2024-02-09T19:34:50.816937303Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:34:50.818009 env[1051]: time="2024-02-09T19:34:50.817868972Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c0a880e4700331de8b4adab95e259ecf25c968cd5e87cda2d848cad0eb3659a7 pid=1504 runtime=io.containerd.runc.v2 Feb 9 19:34:50.834601 env[1051]: time="2024-02-09T19:34:50.834434839Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:34:50.834601 env[1051]: time="2024-02-09T19:34:50.834537446Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:34:50.834601 env[1051]: time="2024-02-09T19:34:50.834552659Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:34:50.834905 env[1051]: time="2024-02-09T19:34:50.834864508Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b156c406fa33533f19bf9502abce02df0374ffe12bdb288721a3c6a825f69e02 pid=1502 runtime=io.containerd.runc.v2 Feb 9 19:34:50.843017 systemd[1]: Started cri-containerd-c0a880e4700331de8b4adab95e259ecf25c968cd5e87cda2d848cad0eb3659a7.scope. Feb 9 19:34:50.911992 kernel: audit: type=1400 audit(1707507290.903:571): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.912273 kernel: audit: type=1400 audit(1707507290.903:572): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.929247 kernel: audit: type=1400 audit(1707507290.903:573): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.930101 kernel: audit: type=1400 audit(1707507290.903:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.936167 kernel: audit: type=1400 audit(1707507290.903:575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.915000 audit: BPF prog-id=61 op=LOAD Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1504 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:50.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330613838306534373030333331646538623461646162393565323539 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1504 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:50.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330613838306534373030333331646538623461646162393565323539 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit: BPF prog-id=62 op=LOAD Feb 9 19:34:50.916000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00031aae0 items=0 ppid=1504 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:50.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330613838306534373030333331646538623461646162393565323539 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.916000 audit: BPF prog-id=63 op=LOAD Feb 9 19:34:50.916000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00031ab28 items=0 ppid=1504 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:50.916000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330613838306534373030333331646538623461646162393565323539 Feb 9 19:34:50.917000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:34:50.917000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:34:50.917000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.917000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.917000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.917000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.917000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.917000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.917000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.917000 audit[1517]: AVC avc: denied { perfmon } for pid=1517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.917000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.917000 audit[1517]: AVC avc: denied { bpf } for pid=1517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.917000 audit: BPF prog-id=64 op=LOAD Feb 9 19:34:50.917000 audit[1517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00031af38 items=0 ppid=1504 pid=1517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:50.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330613838306534373030333331646538623461646162393565323539 Feb 9 19:34:50.942622 systemd[1]: Started cri-containerd-b156c406fa33533f19bf9502abce02df0374ffe12bdb288721a3c6a825f69e02.scope. Feb 9 19:34:50.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.967000 audit: BPF prog-id=65 op=LOAD Feb 9 19:34:50.968000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.968000 audit[1533]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1502 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:50.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353663343036666133333533336631396266393530326162636530 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1502 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:50.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353663343036666133333533336631396266393530326162636530 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit: BPF prog-id=66 op=LOAD Feb 9 19:34:50.969000 audit[1533]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000344b60 items=0 ppid=1502 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:50.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353663343036666133333533336631396266393530326162636530 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit: BPF prog-id=67 op=LOAD Feb 9 19:34:50.969000 audit[1533]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000344ba8 items=0 ppid=1502 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:50.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353663343036666133333533336631396266393530326162636530 Feb 9 19:34:50.969000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:34:50.969000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { perfmon } for pid=1533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit[1533]: AVC avc: denied { bpf } for pid=1533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:50.969000 audit: BPF prog-id=68 op=LOAD Feb 9 19:34:50.969000 audit[1533]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000344fb8 items=0 ppid=1502 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:50.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231353663343036666133333533336631396266393530326162636530 Feb 9 19:34:50.981276 env[1051]: time="2024-02-09T19:34:50.981203912Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-959nk,Uid:0e1234a0-b47e-47c0-891d-654dfb4f3861,Namespace:calico-system,Attempt:0,} returns sandbox id \"c0a880e4700331de8b4adab95e259ecf25c968cd5e87cda2d848cad0eb3659a7\"" Feb 9 19:34:50.988062 env[1051]: time="2024-02-09T19:34:50.988000324Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:34:51.004606 env[1051]: time="2024-02-09T19:34:51.004543690Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pgsml,Uid:44f87eaf-be97-4f2d-b4d0-6720230dc409,Namespace:kube-system,Attempt:0,} returns sandbox id \"b156c406fa33533f19bf9502abce02df0374ffe12bdb288721a3c6a825f69e02\"" Feb 9 19:34:51.131280 kubelet[1378]: E0209 19:34:51.131184 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:51.398758 kubelet[1378]: E0209 19:34:51.398496 1378 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:34:51.822390 update_engine[1046]: I0209 19:34:51.821966 1046 update_attempter.cc:509] Updating boot flags... Feb 9 19:34:52.131634 kubelet[1378]: E0209 19:34:52.131459 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:52.585113 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1146199979.mount: Deactivated successfully. Feb 9 19:34:53.113732 kubelet[1378]: E0209 19:34:53.113656 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:53.132060 kubelet[1378]: E0209 19:34:53.131975 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:53.399080 kubelet[1378]: E0209 19:34:53.398154 1378 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:34:54.025158 env[1051]: time="2024-02-09T19:34:54.025022571Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:54.028114 env[1051]: time="2024-02-09T19:34:54.028055172Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:54.033571 env[1051]: time="2024-02-09T19:34:54.033510875Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:54.040733 env[1051]: time="2024-02-09T19:34:54.040697518Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:54.041484 env[1051]: time="2024-02-09T19:34:54.041283449Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:34:54.043350 env[1051]: time="2024-02-09T19:34:54.043327525Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 19:34:54.046319 env[1051]: time="2024-02-09T19:34:54.046256293Z" level=info msg="CreateContainer within sandbox \"c0a880e4700331de8b4adab95e259ecf25c968cd5e87cda2d848cad0eb3659a7\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:34:54.067404 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2430077358.mount: Deactivated successfully. Feb 9 19:34:54.095023 env[1051]: time="2024-02-09T19:34:54.094971272Z" level=info msg="CreateContainer within sandbox \"c0a880e4700331de8b4adab95e259ecf25c968cd5e87cda2d848cad0eb3659a7\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e62d775c4ffb6d078599d69373cdacad7986b97a3e2add3430f86c59e1d2b1c9\"" Feb 9 19:34:54.096650 env[1051]: time="2024-02-09T19:34:54.096603501Z" level=info msg="StartContainer for \"e62d775c4ffb6d078599d69373cdacad7986b97a3e2add3430f86c59e1d2b1c9\"" Feb 9 19:34:54.133252 kubelet[1378]: E0209 19:34:54.133152 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:54.185970 systemd[1]: run-containerd-runc-k8s.io-e62d775c4ffb6d078599d69373cdacad7986b97a3e2add3430f86c59e1d2b1c9-runc.EvXEyl.mount: Deactivated successfully. Feb 9 19:34:54.216373 systemd[1]: Started cri-containerd-e62d775c4ffb6d078599d69373cdacad7986b97a3e2add3430f86c59e1d2b1c9.scope. Feb 9 19:34:54.249000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.251182 kernel: kauditd_printk_skb: 109 callbacks suppressed Feb 9 19:34:54.251261 kernel: audit: type=1400 audit(1707507294.249:607): avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.259521 kernel: audit: type=1300 audit(1707507294.249:607): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1504 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:54.249000 audit[1593]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1504 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:54.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536326437373563346666623664303738353939643639333733636461 Feb 9 19:34:54.264208 kernel: audit: type=1327 audit(1707507294.249:607): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536326437373563346666623664303738353939643639333733636461 Feb 9 19:34:54.264289 kernel: audit: type=1400 audit(1707507294.253:608): avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.253000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.253000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.253000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.278663 kernel: audit: type=1400 audit(1707507294.253:608): avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.279560 kernel: audit: type=1400 audit(1707507294.253:608): avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.279603 kernel: audit: type=1400 audit(1707507294.253:608): avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.253000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.253000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.286709 kernel: audit: type=1400 audit(1707507294.253:608): avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.286870 kernel: audit: type=1400 audit(1707507294.253:608): avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.253000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.253000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.293016 kernel: audit: type=1400 audit(1707507294.253:608): avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.253000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.253000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.253000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.253000 audit: BPF prog-id=69 op=LOAD Feb 9 19:34:54.253000 audit[1593]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a0950 items=0 ppid=1504 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:54.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536326437373563346666623664303738353939643639333733636461 Feb 9 19:34:54.263000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.263000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.263000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.263000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.263000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.263000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.263000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.263000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.263000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.263000 audit: BPF prog-id=70 op=LOAD Feb 9 19:34:54.263000 audit[1593]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a0998 items=0 ppid=1504 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:54.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536326437373563346666623664303738353939643639333733636461 Feb 9 19:34:54.270000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:34:54.270000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:34:54.271000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.271000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.271000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.271000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.271000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.271000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.271000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.271000 audit[1593]: AVC avc: denied { perfmon } for pid=1593 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.271000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.271000 audit[1593]: AVC avc: denied { bpf } for pid=1593 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:54.271000 audit: BPF prog-id=71 op=LOAD Feb 9 19:34:54.271000 audit[1593]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a0a28 items=0 ppid=1504 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:54.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536326437373563346666623664303738353939643639333733636461 Feb 9 19:34:54.331521 env[1051]: time="2024-02-09T19:34:54.330220863Z" level=info msg="StartContainer for \"e62d775c4ffb6d078599d69373cdacad7986b97a3e2add3430f86c59e1d2b1c9\" returns successfully" Feb 9 19:34:54.355258 systemd[1]: cri-containerd-e62d775c4ffb6d078599d69373cdacad7986b97a3e2add3430f86c59e1d2b1c9.scope: Deactivated successfully. Feb 9 19:34:54.359000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:34:54.916044 env[1051]: time="2024-02-09T19:34:54.915950042Z" level=info msg="shim disconnected" id=e62d775c4ffb6d078599d69373cdacad7986b97a3e2add3430f86c59e1d2b1c9 Feb 9 19:34:54.916482 env[1051]: time="2024-02-09T19:34:54.916435085Z" level=warning msg="cleaning up after shim disconnected" id=e62d775c4ffb6d078599d69373cdacad7986b97a3e2add3430f86c59e1d2b1c9 namespace=k8s.io Feb 9 19:34:54.916651 env[1051]: time="2024-02-09T19:34:54.916617176Z" level=info msg="cleaning up dead shim" Feb 9 19:34:54.932433 env[1051]: time="2024-02-09T19:34:54.932292305Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:34:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1639 runtime=io.containerd.runc.v2\n" Feb 9 19:34:55.065596 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e62d775c4ffb6d078599d69373cdacad7986b97a3e2add3430f86c59e1d2b1c9-rootfs.mount: Deactivated successfully. Feb 9 19:34:55.134584 kubelet[1378]: E0209 19:34:55.134457 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:55.399429 kubelet[1378]: E0209 19:34:55.398979 1378 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:34:56.135790 kubelet[1378]: E0209 19:34:56.135637 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:56.747061 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2278435226.mount: Deactivated successfully. Feb 9 19:34:57.136361 kubelet[1378]: E0209 19:34:57.136270 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:57.401823 kubelet[1378]: E0209 19:34:57.401560 1378 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:34:57.637340 env[1051]: time="2024-02-09T19:34:57.637251766Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:57.640225 env[1051]: time="2024-02-09T19:34:57.640168785Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:57.642342 env[1051]: time="2024-02-09T19:34:57.642296604Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:57.645829 env[1051]: time="2024-02-09T19:34:57.645748183Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:57.649115 env[1051]: time="2024-02-09T19:34:57.649049083Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 9 19:34:57.651712 env[1051]: time="2024-02-09T19:34:57.651655174Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:34:57.653718 env[1051]: time="2024-02-09T19:34:57.653546444Z" level=info msg="CreateContainer within sandbox \"b156c406fa33533f19bf9502abce02df0374ffe12bdb288721a3c6a825f69e02\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:34:57.682144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3942485869.mount: Deactivated successfully. Feb 9 19:34:57.691723 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1237855248.mount: Deactivated successfully. Feb 9 19:34:57.698953 env[1051]: time="2024-02-09T19:34:57.698869976Z" level=info msg="CreateContainer within sandbox \"b156c406fa33533f19bf9502abce02df0374ffe12bdb288721a3c6a825f69e02\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2b90327db8bbdb2e53613bde53726872bfb07ffbe4c112bbae4da975dca0f17a\"" Feb 9 19:34:57.699883 env[1051]: time="2024-02-09T19:34:57.699832592Z" level=info msg="StartContainer for \"2b90327db8bbdb2e53613bde53726872bfb07ffbe4c112bbae4da975dca0f17a\"" Feb 9 19:34:57.753190 systemd[1]: Started cri-containerd-2b90327db8bbdb2e53613bde53726872bfb07ffbe4c112bbae4da975dca0f17a.scope. Feb 9 19:34:57.813000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.813000 audit[1660]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1502 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:57.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262393033323764623862626462326535333631336264653533373236 Feb 9 19:34:57.813000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.813000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.813000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.813000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.813000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.813000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.813000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.813000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.813000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.813000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.813000 audit: BPF prog-id=72 op=LOAD Feb 9 19:34:57.813000 audit[1660]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000309340 items=0 ppid=1502 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:57.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262393033323764623862626462326535333631336264653533373236 Feb 9 19:34:57.819000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.819000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.819000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.819000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.819000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.819000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.819000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.819000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.819000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.819000 audit: BPF prog-id=73 op=LOAD Feb 9 19:34:57.819000 audit[1660]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000309388 items=0 ppid=1502 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:57.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262393033323764623862626462326535333631336264653533373236 Feb 9 19:34:57.819000 audit: BPF prog-id=73 op=UNLOAD Feb 9 19:34:57.821000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:34:57.821000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.821000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.821000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.821000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.821000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.821000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.821000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.821000 audit[1660]: AVC avc: denied { perfmon } for pid=1660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.821000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.821000 audit[1660]: AVC avc: denied { bpf } for pid=1660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:57.821000 audit: BPF prog-id=74 op=LOAD Feb 9 19:34:57.821000 audit[1660]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000309418 items=0 ppid=1502 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:57.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262393033323764623862626462326535333631336264653533373236 Feb 9 19:34:57.885797 env[1051]: time="2024-02-09T19:34:57.885692457Z" level=info msg="StartContainer for \"2b90327db8bbdb2e53613bde53726872bfb07ffbe4c112bbae4da975dca0f17a\" returns successfully" Feb 9 19:34:57.954000 audit[1707]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:57.954000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7c4befd0 a2=0 a3=7fff7c4befbc items=0 ppid=1669 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:57.954000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:34:57.963000 audit[1710]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:57.963000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc5cc0e10 a2=0 a3=7fffc5cc0dfc items=0 ppid=1669 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:57.963000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:34:57.964000 audit[1708]: NETFILTER_CFG table=mangle:37 family=10 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:57.964000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc97c0f240 a2=0 a3=7ffc97c0f22c items=0 ppid=1669 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:57.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:34:57.967000 audit[1711]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:57.967000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe09820680 a2=0 a3=7ffe0982066c items=0 ppid=1669 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:57.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:34:57.970000 audit[1712]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:57.970000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4f9fa8a0 a2=0 a3=7fff4f9fa88c items=0 ppid=1669 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:57.970000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:34:57.972000 audit[1713]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:57.972000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcbcac510 a2=0 a3=7fffcbcac4fc items=0 ppid=1669 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:57.972000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:34:58.066000 audit[1714]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.066000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd49de6300 a2=0 a3=7ffd49de62ec items=0 ppid=1669 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:34:58.076000 audit[1716]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.076000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc67e6fa30 a2=0 a3=7ffc67e6fa1c items=0 ppid=1669 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.076000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:34:58.086000 audit[1719]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.086000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc028c4e70 a2=0 a3=7ffc028c4e5c items=0 ppid=1669 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.086000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:34:58.090000 audit[1720]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.090000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6a4912f0 a2=0 a3=7ffc6a4912dc items=0 ppid=1669 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:34:58.100000 audit[1722]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.100000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffec05bbf00 a2=0 a3=7ffec05bbeec items=0 ppid=1669 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:34:58.103000 audit[1723]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.103000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd71d4b40 a2=0 a3=7ffcd71d4b2c items=0 ppid=1669 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:34:58.111000 audit[1725]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.111000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffda0d6d3c0 a2=0 a3=7ffda0d6d3ac items=0 ppid=1669 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:34:58.120000 audit[1728]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.120000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd3fdad370 a2=0 a3=7ffd3fdad35c items=0 ppid=1669 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:34:58.123000 audit[1729]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.123000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2a5b22b0 a2=0 a3=7ffc2a5b229c items=0 ppid=1669 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:34:58.130000 audit[1731]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.130000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff48381920 a2=0 a3=7fff4838190c items=0 ppid=1669 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:34:58.133000 audit[1732]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.133000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe69251ec0 a2=0 a3=7ffe69251eac items=0 ppid=1669 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:34:58.137139 kubelet[1378]: E0209 19:34:58.137010 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:58.141000 audit[1734]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.141000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1384d3f0 a2=0 a3=7ffd1384d3dc items=0 ppid=1669 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:34:58.151000 audit[1737]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.151000 audit[1737]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff5c5518f0 a2=0 a3=7fff5c5518dc items=0 ppid=1669 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:34:58.164000 audit[1740]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.164000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5428d0e0 a2=0 a3=7ffc5428d0cc items=0 ppid=1669 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:34:58.168000 audit[1741]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.168000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe528ee460 a2=0 a3=7ffe528ee44c items=0 ppid=1669 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:34:58.182000 audit[1743]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.182000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc59a40fb0 a2=0 a3=7ffc59a40f9c items=0 ppid=1669 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:34:58.191000 audit[1746]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:34:58.191000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe56cf7a50 a2=0 a3=7ffe56cf7a3c items=0 ppid=1669 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:34:58.218000 audit[1750]: NETFILTER_CFG table=filter:58 family=2 entries=4 op=nft_register_rule pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:58.218000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffee3c70360 a2=0 a3=7ffee3c7034c items=0 ppid=1669 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:58.260000 audit[1750]: NETFILTER_CFG table=nat:59 family=2 entries=57 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:58.260000 audit[1750]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffee3c70360 a2=0 a3=7ffee3c7034c items=0 ppid=1669 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.260000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:58.288000 audit[1758]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.288000 audit[1758]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc2e5cb310 a2=0 a3=7ffc2e5cb2fc items=0 ppid=1669 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:34:58.298000 audit[1760]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.298000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe88032780 a2=0 a3=7ffe8803276c items=0 ppid=1669 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:34:58.302000 audit[1763]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.302000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe7457e880 a2=0 a3=7ffe7457e86c items=0 ppid=1669 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.302000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:34:58.303000 audit[1764]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.303000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff178a7470 a2=0 a3=7fff178a745c items=0 ppid=1669 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:34:58.306000 audit[1766]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.306000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe0c969d80 a2=0 a3=7ffe0c969d6c items=0 ppid=1669 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:34:58.307000 audit[1767]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.307000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeee2ed7d0 a2=0 a3=7ffeee2ed7bc items=0 ppid=1669 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:34:58.310000 audit[1769]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.310000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc0a35b760 a2=0 a3=7ffc0a35b74c items=0 ppid=1669 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:34:58.315000 audit[1772]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.315000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc874d6a80 a2=0 a3=7ffc874d6a6c items=0 ppid=1669 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:34:58.317000 audit[1773]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.317000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcbe7c79f0 a2=0 a3=7ffcbe7c79dc items=0 ppid=1669 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:34:58.320000 audit[1775]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.320000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd24533000 a2=0 a3=7ffd24532fec items=0 ppid=1669 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:34:58.321000 audit[1776]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.321000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe8f49ccf0 a2=0 a3=7ffe8f49ccdc items=0 ppid=1669 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:34:58.324000 audit[1778]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.324000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd0e50c440 a2=0 a3=7ffd0e50c42c items=0 ppid=1669 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:34:58.328000 audit[1781]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=1781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.328000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffefd7334a0 a2=0 a3=7ffefd73348c items=0 ppid=1669 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:34:58.332000 audit[1784]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.332000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9ea32000 a2=0 a3=7ffd9ea31fec items=0 ppid=1669 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.332000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:34:58.333000 audit[1785]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=1785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.333000 audit[1785]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffef2b6a730 a2=0 a3=7ffef2b6a71c items=0 ppid=1669 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:34:58.336000 audit[1787]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=1787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.336000 audit[1787]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc78bc77c0 a2=0 a3=7ffc78bc77ac items=0 ppid=1669 pid=1787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:34:58.340000 audit[1790]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:34:58.340000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffeeac6d200 a2=0 a3=7ffeeac6d1ec items=0 ppid=1669 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:34:58.348000 audit[1794]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:34:58.348000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcdda8ef30 a2=0 a3=7ffcdda8ef1c items=0 ppid=1669 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.348000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:58.349000 audit[1794]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:34:58.349000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffcdda8ef30 a2=0 a3=7ffcdda8ef1c items=0 ppid=1669 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:58.349000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:58.546844 kubelet[1378]: I0209 19:34:58.543409 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-pgsml" podStartSLOduration=-9.223372024311497e+09 pod.CreationTimestamp="2024-02-09 19:34:46 +0000 UTC" firstStartedPulling="2024-02-09 19:34:51.006033218 +0000 UTC m=+18.586142719" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:34:58.54187401 +0000 UTC m=+26.121983582" watchObservedRunningTime="2024-02-09 19:34:58.543278244 +0000 UTC m=+26.123387806" Feb 9 19:34:59.137730 kubelet[1378]: E0209 19:34:59.137651 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:59.398821 kubelet[1378]: E0209 19:34:59.397700 1378 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:34:59.585000 audit[1820]: NETFILTER_CFG table=filter:79 family=2 entries=7 op=nft_register_rule pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.590158 kernel: kauditd_printk_skb: 209 callbacks suppressed Feb 9 19:34:59.590265 kernel: audit: type=1325 audit(1707507299.585:664): table=filter:79 family=2 entries=7 op=nft_register_rule pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.585000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffec0ee01d0 a2=0 a3=7ffec0ee01bc items=0 ppid=1669 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.585000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.619670 kernel: audit: type=1300 audit(1707507299.585:664): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffec0ee01d0 a2=0 a3=7ffec0ee01bc items=0 ppid=1669 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.620096 kernel: audit: type=1327 audit(1707507299.585:664): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.620137 kernel: audit: type=1325 audit(1707507299.588:665): table=nat:80 family=2 entries=85 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.588000 audit[1820]: NETFILTER_CFG table=nat:80 family=2 entries=85 op=nft_register_chain pid=1820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.588000 audit[1820]: SYSCALL arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7ffec0ee01d0 a2=0 a3=7ffec0ee01bc items=0 ppid=1669 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.634702 kernel: audit: type=1300 audit(1707507299.588:665): arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7ffec0ee01d0 a2=0 a3=7ffec0ee01bc items=0 ppid=1669 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.634870 kernel: audit: type=1327 audit(1707507299.588:665): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.588000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.668000 audit[1846]: NETFILTER_CFG table=filter:81 family=2 entries=6 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.668000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdcadf50e0 a2=0 a3=7ffdcadf50cc items=0 ppid=1669 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.679789 kernel: audit: type=1325 audit(1707507299.668:666): table=filter:81 family=2 entries=6 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.679955 kernel: audit: type=1300 audit(1707507299.668:666): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdcadf50e0 a2=0 a3=7ffdcadf50cc items=0 ppid=1669 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.668000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.682920 kernel: audit: type=1327 audit(1707507299.668:666): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.683012 kernel: audit: type=1325 audit(1707507299.680:667): table=nat:82 family=2 entries=92 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.680000 audit[1846]: NETFILTER_CFG table=nat:82 family=2 entries=92 op=nft_register_chain pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:59.680000 audit[1846]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffdcadf50e0 a2=0 a3=7ffdcadf50cc items=0 ppid=1669 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:59.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:59.827309 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2142825377.mount: Deactivated successfully. Feb 9 19:35:00.138325 kubelet[1378]: E0209 19:35:00.138191 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:01.138842 kubelet[1378]: E0209 19:35:01.138724 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:01.398653 kubelet[1378]: E0209 19:35:01.398174 1378 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:35:02.140141 kubelet[1378]: E0209 19:35:02.140023 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:03.140706 kubelet[1378]: E0209 19:35:03.140614 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:03.398765 kubelet[1378]: E0209 19:35:03.398323 1378 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:35:04.140927 kubelet[1378]: E0209 19:35:04.140868 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:05.141467 kubelet[1378]: E0209 19:35:05.141372 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:05.400751 kubelet[1378]: E0209 19:35:05.400423 1378 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:35:06.141942 kubelet[1378]: E0209 19:35:06.141890 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:07.142623 kubelet[1378]: E0209 19:35:07.142431 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:07.401882 kubelet[1378]: E0209 19:35:07.401544 1378 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:35:07.522003 env[1051]: time="2024-02-09T19:35:07.521931996Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:35:07.527362 env[1051]: time="2024-02-09T19:35:07.527335651Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:35:07.536143 env[1051]: time="2024-02-09T19:35:07.536116469Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:35:07.541189 env[1051]: time="2024-02-09T19:35:07.541163319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:35:07.545910 env[1051]: time="2024-02-09T19:35:07.545826819Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:35:07.550228 env[1051]: time="2024-02-09T19:35:07.550194657Z" level=info msg="CreateContainer within sandbox \"c0a880e4700331de8b4adab95e259ecf25c968cd5e87cda2d848cad0eb3659a7\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:35:07.573811 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2457552284.mount: Deactivated successfully. Feb 9 19:35:07.581696 env[1051]: time="2024-02-09T19:35:07.581649615Z" level=info msg="CreateContainer within sandbox \"c0a880e4700331de8b4adab95e259ecf25c968cd5e87cda2d848cad0eb3659a7\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a202819cdbcb14fb62891ea9b174f5a48c75572674345a7713d6c55dfe4ad3ab\"" Feb 9 19:35:07.582976 env[1051]: time="2024-02-09T19:35:07.582916743Z" level=info msg="StartContainer for \"a202819cdbcb14fb62891ea9b174f5a48c75572674345a7713d6c55dfe4ad3ab\"" Feb 9 19:35:07.641548 systemd[1]: Started cri-containerd-a202819cdbcb14fb62891ea9b174f5a48c75572674345a7713d6c55dfe4ad3ab.scope. Feb 9 19:35:07.710982 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 9 19:35:07.711162 kernel: audit: type=1400 audit(1707507307.697:668): avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.711199 kernel: audit: type=1300 audit(1707507307.697:668): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1504 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:07.697000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.697000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1504 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:07.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303238313963646263623134666236323839316561396231373466 Feb 9 19:35:07.697000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.721161 kernel: audit: type=1327 audit(1707507307.697:668): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303238313963646263623134666236323839316561396231373466 Feb 9 19:35:07.721227 kernel: audit: type=1400 audit(1707507307.697:669): avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.697000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.697000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.729218 kernel: audit: type=1400 audit(1707507307.697:669): avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.729305 kernel: audit: type=1400 audit(1707507307.697:669): avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.733087 kernel: audit: type=1400 audit(1707507307.697:669): avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.697000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.736518 kernel: audit: type=1400 audit(1707507307.697:669): avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.697000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.697000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.740008 kernel: audit: type=1400 audit(1707507307.697:669): avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.697000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.746896 kernel: audit: type=1400 audit(1707507307.697:669): avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.697000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.697000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.697000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.697000 audit: BPF prog-id=75 op=LOAD Feb 9 19:35:07.697000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000e1be0 items=0 ppid=1504 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:07.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303238313963646263623134666236323839316561396231373466 Feb 9 19:35:07.701000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.701000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.701000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.701000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.701000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.701000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.701000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.701000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.701000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.701000 audit: BPF prog-id=76 op=LOAD Feb 9 19:35:07.701000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000e1c28 items=0 ppid=1504 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:07.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303238313963646263623134666236323839316561396231373466 Feb 9 19:35:07.710000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:35:07.710000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:35:07.710000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.710000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.710000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.710000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.710000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.710000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.710000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.710000 audit[1856]: AVC avc: denied { perfmon } for pid=1856 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.710000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.710000 audit[1856]: AVC avc: denied { bpf } for pid=1856 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:07.710000 audit: BPF prog-id=77 op=LOAD Feb 9 19:35:07.710000 audit[1856]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000e1cb8 items=0 ppid=1504 pid=1856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:07.710000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132303238313963646263623134666236323839316561396231373466 Feb 9 19:35:07.753237 env[1051]: time="2024-02-09T19:35:07.753177337Z" level=info msg="StartContainer for \"a202819cdbcb14fb62891ea9b174f5a48c75572674345a7713d6c55dfe4ad3ab\" returns successfully" Feb 9 19:35:08.143256 kubelet[1378]: E0209 19:35:08.143219 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:09.144391 kubelet[1378]: E0209 19:35:09.144316 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:09.392739 env[1051]: time="2024-02-09T19:35:09.392488538Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:35:09.400357 kubelet[1378]: E0209 19:35:09.400230 1378 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:35:09.402652 systemd[1]: cri-containerd-a202819cdbcb14fb62891ea9b174f5a48c75572674345a7713d6c55dfe4ad3ab.scope: Deactivated successfully. Feb 9 19:35:09.403117 systemd[1]: cri-containerd-a202819cdbcb14fb62891ea9b174f5a48c75572674345a7713d6c55dfe4ad3ab.scope: Consumed 1.182s CPU time. Feb 9 19:35:09.405000 audit: BPF prog-id=77 op=UNLOAD Feb 9 19:35:09.458845 kubelet[1378]: I0209 19:35:09.456546 1378 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:35:09.500176 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a202819cdbcb14fb62891ea9b174f5a48c75572674345a7713d6c55dfe4ad3ab-rootfs.mount: Deactivated successfully. Feb 9 19:35:10.144700 kubelet[1378]: E0209 19:35:10.144612 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:10.455984 env[1051]: time="2024-02-09T19:35:10.455305532Z" level=info msg="shim disconnected" id=a202819cdbcb14fb62891ea9b174f5a48c75572674345a7713d6c55dfe4ad3ab Feb 9 19:35:10.456956 env[1051]: time="2024-02-09T19:35:10.456904059Z" level=warning msg="cleaning up after shim disconnected" id=a202819cdbcb14fb62891ea9b174f5a48c75572674345a7713d6c55dfe4ad3ab namespace=k8s.io Feb 9 19:35:10.457130 env[1051]: time="2024-02-09T19:35:10.457092851Z" level=info msg="cleaning up dead shim" Feb 9 19:35:10.488299 env[1051]: time="2024-02-09T19:35:10.488199428Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:35:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1904 runtime=io.containerd.runc.v2\n" Feb 9 19:35:10.566957 env[1051]: time="2024-02-09T19:35:10.566851009Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:35:11.145906 kubelet[1378]: E0209 19:35:11.145739 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:11.410764 systemd[1]: Created slice kubepods-besteffort-podf865e0d7_fdde_4dc8_9458_d3929a654ddf.slice. Feb 9 19:35:11.417079 env[1051]: time="2024-02-09T19:35:11.416995921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rmxrz,Uid:f865e0d7-fdde-4dc8-9458-d3929a654ddf,Namespace:calico-system,Attempt:0,}" Feb 9 19:35:11.586514 env[1051]: time="2024-02-09T19:35:11.586361144Z" level=error msg="Failed to destroy network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:11.588155 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c-shm.mount: Deactivated successfully. Feb 9 19:35:11.590263 env[1051]: time="2024-02-09T19:35:11.590199648Z" level=error msg="encountered an error cleaning up failed sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:11.590442 env[1051]: time="2024-02-09T19:35:11.590395904Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rmxrz,Uid:f865e0d7-fdde-4dc8-9458-d3929a654ddf,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:11.591305 kubelet[1378]: E0209 19:35:11.590797 1378 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:11.591305 kubelet[1378]: E0209 19:35:11.590935 1378 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rmxrz" Feb 9 19:35:11.591305 kubelet[1378]: E0209 19:35:11.590980 1378 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rmxrz" Feb 9 19:35:11.591470 kubelet[1378]: E0209 19:35:11.591055 1378 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-rmxrz_calico-system(f865e0d7-fdde-4dc8-9458-d3929a654ddf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-rmxrz_calico-system(f865e0d7-fdde-4dc8-9458-d3929a654ddf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:35:12.147144 kubelet[1378]: E0209 19:35:12.147033 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:12.572211 kubelet[1378]: I0209 19:35:12.570331 1378 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:35:12.572451 env[1051]: time="2024-02-09T19:35:12.572078832Z" level=info msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\"" Feb 9 19:35:12.647040 env[1051]: time="2024-02-09T19:35:12.646920252Z" level=error msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\" failed" error="failed to destroy network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:12.648226 kubelet[1378]: E0209 19:35:12.648160 1378 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:35:12.648419 kubelet[1378]: E0209 19:35:12.648288 1378 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c} Feb 9 19:35:12.648419 kubelet[1378]: E0209 19:35:12.648388 1378 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:35:12.648659 kubelet[1378]: E0209 19:35:12.648512 1378 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:35:13.113896 kubelet[1378]: E0209 19:35:13.113845 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:13.147314 kubelet[1378]: E0209 19:35:13.147262 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:14.147854 kubelet[1378]: E0209 19:35:14.147734 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:15.148723 kubelet[1378]: E0209 19:35:15.148614 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:15.235277 kubelet[1378]: I0209 19:35:15.234998 1378 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:35:15.249324 systemd[1]: Created slice kubepods-besteffort-podde207a3e_27b3_4ae9_9f49_87ccb6b58864.slice. Feb 9 19:35:15.295809 kubelet[1378]: I0209 19:35:15.295731 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6t7w7\" (UniqueName: \"kubernetes.io/projected/de207a3e-27b3-4ae9-9f49-87ccb6b58864-kube-api-access-6t7w7\") pod \"nginx-deployment-8ffc5cf85-gvw7v\" (UID: \"de207a3e-27b3-4ae9-9f49-87ccb6b58864\") " pod="default/nginx-deployment-8ffc5cf85-gvw7v" Feb 9 19:35:15.557460 env[1051]: time="2024-02-09T19:35:15.556387321Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-gvw7v,Uid:de207a3e-27b3-4ae9-9f49-87ccb6b58864,Namespace:default,Attempt:0,}" Feb 9 19:35:15.705765 env[1051]: time="2024-02-09T19:35:15.705649472Z" level=error msg="Failed to destroy network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:15.708957 env[1051]: time="2024-02-09T19:35:15.707743829Z" level=error msg="encountered an error cleaning up failed sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:15.708957 env[1051]: time="2024-02-09T19:35:15.707829401Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-gvw7v,Uid:de207a3e-27b3-4ae9-9f49-87ccb6b58864,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:15.708923 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5-shm.mount: Deactivated successfully. Feb 9 19:35:15.710382 kubelet[1378]: E0209 19:35:15.710333 1378 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:15.710469 kubelet[1378]: E0209 19:35:15.710454 1378 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-gvw7v" Feb 9 19:35:15.710614 kubelet[1378]: E0209 19:35:15.710578 1378 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-gvw7v" Feb 9 19:35:15.710763 kubelet[1378]: E0209 19:35:15.710725 1378 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-gvw7v_default(de207a3e-27b3-4ae9-9f49-87ccb6b58864)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-gvw7v_default(de207a3e-27b3-4ae9-9f49-87ccb6b58864)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-gvw7v" podUID=de207a3e-27b3-4ae9-9f49-87ccb6b58864 Feb 9 19:35:16.149436 kubelet[1378]: E0209 19:35:16.149336 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:16.585350 kubelet[1378]: I0209 19:35:16.584076 1378 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:35:16.585908 env[1051]: time="2024-02-09T19:35:16.585649619Z" level=info msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\"" Feb 9 19:35:16.658989 env[1051]: time="2024-02-09T19:35:16.658851731Z" level=error msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\" failed" error="failed to destroy network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:16.659986 kubelet[1378]: E0209 19:35:16.659573 1378 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:35:16.659986 kubelet[1378]: E0209 19:35:16.659665 1378 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5} Feb 9 19:35:16.659986 kubelet[1378]: E0209 19:35:16.659830 1378 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"de207a3e-27b3-4ae9-9f49-87ccb6b58864\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:35:16.659986 kubelet[1378]: E0209 19:35:16.659921 1378 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"de207a3e-27b3-4ae9-9f49-87ccb6b58864\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-gvw7v" podUID=de207a3e-27b3-4ae9-9f49-87ccb6b58864 Feb 9 19:35:17.150368 kubelet[1378]: E0209 19:35:17.150245 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:18.151222 kubelet[1378]: E0209 19:35:18.151137 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:19.151972 kubelet[1378]: E0209 19:35:19.151885 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:20.152946 kubelet[1378]: E0209 19:35:20.152833 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:21.153723 kubelet[1378]: E0209 19:35:21.153605 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:22.154634 kubelet[1378]: E0209 19:35:22.154545 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:23.155307 kubelet[1378]: E0209 19:35:23.155209 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:24.156513 kubelet[1378]: E0209 19:35:24.156340 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:25.157744 kubelet[1378]: E0209 19:35:25.157590 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:26.158800 kubelet[1378]: E0209 19:35:26.158687 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:27.159971 kubelet[1378]: E0209 19:35:27.159881 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:27.401047 env[1051]: time="2024-02-09T19:35:27.400931844Z" level=info msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\"" Feb 9 19:35:27.539514 env[1051]: time="2024-02-09T19:35:27.538982973Z" level=error msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\" failed" error="failed to destroy network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:27.539880 kubelet[1378]: E0209 19:35:27.539716 1378 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:35:27.540044 kubelet[1378]: E0209 19:35:27.540021 1378 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c} Feb 9 19:35:27.540354 kubelet[1378]: E0209 19:35:27.540329 1378 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:35:27.540529 kubelet[1378]: E0209 19:35:27.540461 1378 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:35:28.161129 kubelet[1378]: E0209 19:35:28.161046 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:29.162402 kubelet[1378]: E0209 19:35:29.162275 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:30.164203 kubelet[1378]: E0209 19:35:30.163385 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:30.403600 env[1051]: time="2024-02-09T19:35:30.403480153Z" level=info msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\"" Feb 9 19:35:30.483408 env[1051]: time="2024-02-09T19:35:30.481318591Z" level=error msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\" failed" error="failed to destroy network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:30.483682 kubelet[1378]: E0209 19:35:30.483340 1378 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:35:30.483682 kubelet[1378]: E0209 19:35:30.483488 1378 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5} Feb 9 19:35:30.483682 kubelet[1378]: E0209 19:35:30.483631 1378 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"de207a3e-27b3-4ae9-9f49-87ccb6b58864\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:35:30.484213 kubelet[1378]: E0209 19:35:30.483727 1378 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"de207a3e-27b3-4ae9-9f49-87ccb6b58864\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-gvw7v" podUID=de207a3e-27b3-4ae9-9f49-87ccb6b58864 Feb 9 19:35:31.165549 kubelet[1378]: E0209 19:35:31.164605 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:32.165985 kubelet[1378]: E0209 19:35:32.165870 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:33.114175 kubelet[1378]: E0209 19:35:33.114090 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:33.166726 kubelet[1378]: E0209 19:35:33.166624 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:34.167219 kubelet[1378]: E0209 19:35:34.167125 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:35.168220 kubelet[1378]: E0209 19:35:35.168110 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:36.169172 kubelet[1378]: E0209 19:35:36.169087 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:37.170005 kubelet[1378]: E0209 19:35:37.169888 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:38.171117 kubelet[1378]: E0209 19:35:38.171029 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:38.399472 env[1051]: time="2024-02-09T19:35:38.399317810Z" level=info msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\"" Feb 9 19:35:38.492590 env[1051]: time="2024-02-09T19:35:38.492347281Z" level=error msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\" failed" error="failed to destroy network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:38.493375 kubelet[1378]: E0209 19:35:38.493339 1378 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:35:38.493538 kubelet[1378]: E0209 19:35:38.493410 1378 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c} Feb 9 19:35:38.493538 kubelet[1378]: E0209 19:35:38.493472 1378 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:35:38.493538 kubelet[1378]: E0209 19:35:38.493516 1378 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:35:39.172217 kubelet[1378]: E0209 19:35:39.172098 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:40.173078 kubelet[1378]: E0209 19:35:40.172992 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:41.173437 kubelet[1378]: E0209 19:35:41.173320 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:42.174444 kubelet[1378]: E0209 19:35:42.174300 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:42.406192 env[1051]: time="2024-02-09T19:35:42.406089509Z" level=info msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\"" Feb 9 19:35:42.466430 env[1051]: time="2024-02-09T19:35:42.466213381Z" level=error msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\" failed" error="failed to destroy network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:42.467840 kubelet[1378]: E0209 19:35:42.467333 1378 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:35:42.467840 kubelet[1378]: E0209 19:35:42.467457 1378 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5} Feb 9 19:35:42.467840 kubelet[1378]: E0209 19:35:42.467624 1378 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"de207a3e-27b3-4ae9-9f49-87ccb6b58864\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:35:42.467840 kubelet[1378]: E0209 19:35:42.467739 1378 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"de207a3e-27b3-4ae9-9f49-87ccb6b58864\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-gvw7v" podUID=de207a3e-27b3-4ae9-9f49-87ccb6b58864 Feb 9 19:35:43.176155 kubelet[1378]: E0209 19:35:43.176036 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:44.177205 kubelet[1378]: E0209 19:35:44.177068 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:45.180045 kubelet[1378]: E0209 19:35:45.179293 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:46.180243 kubelet[1378]: E0209 19:35:46.180164 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:47.181139 kubelet[1378]: E0209 19:35:47.181022 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:48.182078 kubelet[1378]: E0209 19:35:48.182005 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:49.182639 kubelet[1378]: E0209 19:35:49.182572 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:49.401477 env[1051]: time="2024-02-09T19:35:49.401344486Z" level=info msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\"" Feb 9 19:35:49.517794 env[1051]: time="2024-02-09T19:35:49.516941179Z" level=error msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\" failed" error="failed to destroy network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:49.518020 kubelet[1378]: E0209 19:35:49.517582 1378 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:35:49.518020 kubelet[1378]: E0209 19:35:49.517709 1378 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c} Feb 9 19:35:49.518020 kubelet[1378]: E0209 19:35:49.517918 1378 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:35:49.518394 kubelet[1378]: E0209 19:35:49.518095 1378 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:35:50.182975 kubelet[1378]: E0209 19:35:50.182886 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:51.183818 kubelet[1378]: E0209 19:35:51.183682 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:52.184564 kubelet[1378]: E0209 19:35:52.184392 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:53.113733 kubelet[1378]: E0209 19:35:53.113647 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:53.185346 kubelet[1378]: E0209 19:35:53.185261 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:54.186532 kubelet[1378]: E0209 19:35:54.186416 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:55.187658 kubelet[1378]: E0209 19:35:55.187575 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:56.188443 kubelet[1378]: E0209 19:35:56.188330 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:56.403953 env[1051]: time="2024-02-09T19:35:56.403682190Z" level=info msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\"" Feb 9 19:35:56.446426 env[1051]: time="2024-02-09T19:35:56.446251367Z" level=error msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\" failed" error="failed to destroy network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:35:56.447566 kubelet[1378]: E0209 19:35:56.447335 1378 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:35:56.447566 kubelet[1378]: E0209 19:35:56.447387 1378 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5} Feb 9 19:35:56.447566 kubelet[1378]: E0209 19:35:56.447474 1378 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"de207a3e-27b3-4ae9-9f49-87ccb6b58864\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:35:56.447566 kubelet[1378]: E0209 19:35:56.447541 1378 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"de207a3e-27b3-4ae9-9f49-87ccb6b58864\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-gvw7v" podUID=de207a3e-27b3-4ae9-9f49-87ccb6b58864 Feb 9 19:35:57.189690 kubelet[1378]: E0209 19:35:57.189602 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:58.190501 kubelet[1378]: E0209 19:35:58.190380 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:59.191316 kubelet[1378]: E0209 19:35:59.191194 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:00.192097 kubelet[1378]: E0209 19:36:00.191983 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:01.192749 kubelet[1378]: E0209 19:36:01.192624 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:02.193703 kubelet[1378]: E0209 19:36:02.193531 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:03.194131 kubelet[1378]: E0209 19:36:03.194018 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:04.194968 kubelet[1378]: E0209 19:36:04.194898 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:04.399936 env[1051]: time="2024-02-09T19:36:04.399385101Z" level=info msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\"" Feb 9 19:36:04.482246 env[1051]: time="2024-02-09T19:36:04.481828182Z" level=error msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\" failed" error="failed to destroy network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:36:04.483390 kubelet[1378]: E0209 19:36:04.483285 1378 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:04.483599 kubelet[1378]: E0209 19:36:04.483501 1378 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c} Feb 9 19:36:04.483894 kubelet[1378]: E0209 19:36:04.483840 1378 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:36:04.484231 kubelet[1378]: E0209 19:36:04.484142 1378 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:36:05.196243 kubelet[1378]: E0209 19:36:05.196120 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:06.196337 kubelet[1378]: E0209 19:36:06.196257 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:07.197120 kubelet[1378]: E0209 19:36:07.197042 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:08.198235 kubelet[1378]: E0209 19:36:08.198170 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:09.199188 kubelet[1378]: E0209 19:36:09.199089 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:10.199965 kubelet[1378]: E0209 19:36:10.199867 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:11.200391 kubelet[1378]: E0209 19:36:11.200317 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:11.401353 env[1051]: time="2024-02-09T19:36:11.401286420Z" level=info msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\"" Feb 9 19:36:11.500044 env[1051]: time="2024-02-09T19:36:11.499305569Z" level=error msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\" failed" error="failed to destroy network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:36:11.501513 kubelet[1378]: E0209 19:36:11.500972 1378 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:36:11.501513 kubelet[1378]: E0209 19:36:11.501124 1378 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5} Feb 9 19:36:11.501513 kubelet[1378]: E0209 19:36:11.501275 1378 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"de207a3e-27b3-4ae9-9f49-87ccb6b58864\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:36:11.501513 kubelet[1378]: E0209 19:36:11.501424 1378 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"de207a3e-27b3-4ae9-9f49-87ccb6b58864\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-gvw7v" podUID=de207a3e-27b3-4ae9-9f49-87ccb6b58864 Feb 9 19:36:12.201352 kubelet[1378]: E0209 19:36:12.201288 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:13.114165 kubelet[1378]: E0209 19:36:13.114059 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:13.203468 kubelet[1378]: E0209 19:36:13.203395 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:14.204009 kubelet[1378]: E0209 19:36:14.203892 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:15.204431 kubelet[1378]: E0209 19:36:15.204198 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:16.205342 kubelet[1378]: E0209 19:36:16.205278 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:17.205755 kubelet[1378]: E0209 19:36:17.205624 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:17.401037 env[1051]: time="2024-02-09T19:36:17.400915114Z" level=info msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\"" Feb 9 19:36:17.513099 env[1051]: time="2024-02-09T19:36:17.512636907Z" level=error msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\" failed" error="failed to destroy network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:36:17.513794 kubelet[1378]: E0209 19:36:17.513551 1378 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:17.513794 kubelet[1378]: E0209 19:36:17.513629 1378 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c} Feb 9 19:36:17.513794 kubelet[1378]: E0209 19:36:17.513701 1378 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:36:17.513794 kubelet[1378]: E0209 19:36:17.513760 1378 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f865e0d7-fdde-4dc8-9458-d3929a654ddf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rmxrz" podUID=f865e0d7-fdde-4dc8-9458-d3929a654ddf Feb 9 19:36:18.206349 kubelet[1378]: E0209 19:36:18.206290 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:19.207248 kubelet[1378]: E0209 19:36:19.207164 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:20.207458 kubelet[1378]: E0209 19:36:20.207373 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:21.208288 kubelet[1378]: E0209 19:36:21.208225 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:21.771814 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount601678792.mount: Deactivated successfully. Feb 9 19:36:22.173313 env[1051]: time="2024-02-09T19:36:22.173088402Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:22.176573 env[1051]: time="2024-02-09T19:36:22.176515262Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:22.180232 env[1051]: time="2024-02-09T19:36:22.180133926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:22.183390 env[1051]: time="2024-02-09T19:36:22.183311595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:22.185057 env[1051]: time="2024-02-09T19:36:22.184990660Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:36:22.215846 kubelet[1378]: E0209 19:36:22.214952 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:22.234193 env[1051]: time="2024-02-09T19:36:22.234102390Z" level=info msg="CreateContainer within sandbox \"c0a880e4700331de8b4adab95e259ecf25c968cd5e87cda2d848cad0eb3659a7\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:36:22.263670 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2505707024.mount: Deactivated successfully. Feb 9 19:36:22.278110 env[1051]: time="2024-02-09T19:36:22.277928372Z" level=info msg="CreateContainer within sandbox \"c0a880e4700331de8b4adab95e259ecf25c968cd5e87cda2d848cad0eb3659a7\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"a0a538b586a08e513ea320e9c6842ec32d30e2214885c10eac328ffc16223900\"" Feb 9 19:36:22.279825 env[1051]: time="2024-02-09T19:36:22.279616445Z" level=info msg="StartContainer for \"a0a538b586a08e513ea320e9c6842ec32d30e2214885c10eac328ffc16223900\"" Feb 9 19:36:22.328827 systemd[1]: Started cri-containerd-a0a538b586a08e513ea320e9c6842ec32d30e2214885c10eac328ffc16223900.scope. Feb 9 19:36:22.360000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.363167 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:36:22.363285 kernel: audit: type=1400 audit(1707507382.360:675): avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.360000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1504 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:22.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130613533386235383661303865353133656133323065396336383432 Feb 9 19:36:22.376826 kernel: audit: type=1300 audit(1707507382.360:675): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1504 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:22.376940 kernel: audit: type=1327 audit(1707507382.360:675): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130613533386235383661303865353133656133323065396336383432 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.380893 kernel: audit: type=1400 audit(1707507382.365:676): avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.385091 kernel: audit: type=1400 audit(1707507382.365:676): avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.385811 kernel: audit: type=1400 audit(1707507382.365:676): avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.392566 kernel: audit: type=1400 audit(1707507382.365:676): avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.392680 kernel: audit: type=1400 audit(1707507382.365:676): avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.399315 kernel: audit: type=1400 audit(1707507382.365:676): avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.399399 kernel: audit: type=1400 audit(1707507382.365:676): avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit: BPF prog-id=78 op=LOAD Feb 9 19:36:22.365000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000369eb0 items=0 ppid=1504 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:22.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130613533386235383661303865353133656133323065396336383432 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit: BPF prog-id=79 op=LOAD Feb 9 19:36:22.365000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000369ef8 items=0 ppid=1504 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:22.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130613533386235383661303865353133656133323065396336383432 Feb 9 19:36:22.365000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:36:22.365000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { perfmon } for pid=2207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit[2207]: AVC avc: denied { bpf } for pid=2207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:22.365000 audit: BPF prog-id=80 op=LOAD Feb 9 19:36:22.365000 audit[2207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000369f88 items=0 ppid=1504 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:22.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130613533386235383661303865353133656133323065396336383432 Feb 9 19:36:22.413891 env[1051]: time="2024-02-09T19:36:22.413824325Z" level=info msg="StartContainer for \"a0a538b586a08e513ea320e9c6842ec32d30e2214885c10eac328ffc16223900\" returns successfully" Feb 9 19:36:22.516877 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:36:22.517189 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:36:22.820681 kubelet[1378]: I0209 19:36:22.820584 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-959nk" podStartSLOduration=-9.223371940034357e+09 pod.CreationTimestamp="2024-02-09 19:34:46 +0000 UTC" firstStartedPulling="2024-02-09 19:34:50.985866759 +0000 UTC m=+18.565976330" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:36:22.819630697 +0000 UTC m=+110.399740248" watchObservedRunningTime="2024-02-09 19:36:22.820419428 +0000 UTC m=+110.400528979" Feb 9 19:36:22.869201 systemd[1]: run-containerd-runc-k8s.io-a0a538b586a08e513ea320e9c6842ec32d30e2214885c10eac328ffc16223900-runc.fGaInx.mount: Deactivated successfully. Feb 9 19:36:23.216179 kubelet[1378]: E0209 19:36:23.216084 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:23.833716 systemd[1]: run-containerd-runc-k8s.io-a0a538b586a08e513ea320e9c6842ec32d30e2214885c10eac328ffc16223900-runc.rJSyzD.mount: Deactivated successfully. Feb 9 19:36:23.987000 audit[2337]: AVC avc: denied { write } for pid=2337 comm="tee" name="fd" dev="proc" ino=19978 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:36:23.987000 audit[2337]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd9cbf4978 a2=241 a3=1b6 items=1 ppid=2315 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:23.987000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:36:23.987000 audit: PATH item=0 name="/dev/fd/63" inode=19965 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:23.987000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:36:24.008000 audit[2353]: AVC avc: denied { write } for pid=2353 comm="tee" name="fd" dev="proc" ino=19993 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:36:24.008000 audit[2353]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe25374978 a2=241 a3=1b6 items=1 ppid=2318 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.008000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:36:24.008000 audit: PATH item=0 name="/dev/fd/63" inode=19990 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:24.008000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:36:24.017000 audit[2349]: AVC avc: denied { write } for pid=2349 comm="tee" name="fd" dev="proc" ino=19009 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:36:24.017000 audit[2349]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8fb0a97a a2=241 a3=1b6 items=1 ppid=2320 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.017000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:36:24.017000 audit: PATH item=0 name="/dev/fd/63" inode=19982 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:24.017000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:36:24.028000 audit[2367]: AVC avc: denied { write } for pid=2367 comm="tee" name="fd" dev="proc" ino=19023 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:36:24.033000 audit[2372]: AVC avc: denied { write } for pid=2372 comm="tee" name="fd" dev="proc" ino=19029 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:36:24.035000 audit[2370]: AVC avc: denied { write } for pid=2370 comm="tee" name="fd" dev="proc" ino=20004 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:36:24.035000 audit[2370]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe08e4a978 a2=241 a3=1b6 items=1 ppid=2332 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.035000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:36:24.035000 audit: PATH item=0 name="/dev/fd/63" inode=20001 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:24.035000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:36:24.028000 audit[2367]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff81cb2969 a2=241 a3=1b6 items=1 ppid=2317 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.028000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:36:24.028000 audit: PATH item=0 name="/dev/fd/63" inode=19012 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:24.028000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:36:24.033000 audit[2372]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff14c88979 a2=241 a3=1b6 items=1 ppid=2324 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.033000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:36:24.033000 audit: PATH item=0 name="/dev/fd/63" inode=19020 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:24.033000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:36:24.042000 audit[2381]: AVC avc: denied { write } for pid=2381 comm="tee" name="fd" dev="proc" ino=19040 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:36:24.042000 audit[2381]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5c440968 a2=241 a3=1b6 items=1 ppid=2328 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.042000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:36:24.042000 audit: PATH item=0 name="/dev/fd/63" inode=19026 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:36:24.042000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:36:24.216827 kubelet[1378]: E0209 19:36:24.216602 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:24.306028 kernel: Initializing XFRM netlink socket Feb 9 19:36:24.513000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.513000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.513000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.513000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.513000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.513000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.513000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.513000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.513000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.513000 audit: BPF prog-id=81 op=LOAD Feb 9 19:36:24.513000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff20045610 a2=70 a3=7fcee7119000 items=0 ppid=2333 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.513000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:36:24.517000 audit: BPF prog-id=81 op=UNLOAD Feb 9 19:36:24.517000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.517000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.517000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.517000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.517000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.517000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.517000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.517000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.517000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.517000 audit: BPF prog-id=82 op=LOAD Feb 9 19:36:24.517000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff20045610 a2=70 a3=6e items=0 ppid=2333 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.517000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:36:24.518000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:36:24.518000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.518000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff200455c0 a2=70 a3=470860 items=0 ppid=2333 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.518000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:36:24.518000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.518000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.518000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.518000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.518000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.518000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.518000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.518000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.518000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.518000 audit: BPF prog-id=83 op=LOAD Feb 9 19:36:24.518000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff200455a0 a2=70 a3=7fff20045610 items=0 ppid=2333 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.518000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:36:24.518000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:36:24.518000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.518000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff20045680 a2=70 a3=0 items=0 ppid=2333 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.518000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:36:24.518000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.518000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff20045670 a2=70 a3=0 items=0 ppid=2333 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.518000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:36:24.519000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.519000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff200456b0 a2=70 a3=fe00 items=0 ppid=2333 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.519000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:36:24.519000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.519000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.519000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.519000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.519000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.519000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.519000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.519000 audit[2454]: AVC avc: denied { perfmon } for pid=2454 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.519000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.519000 audit[2454]: AVC avc: denied { bpf } for pid=2454 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.519000 audit: BPF prog-id=84 op=LOAD Feb 9 19:36:24.519000 audit[2454]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff200455d0 a2=70 a3=ffffffff items=0 ppid=2333 pid=2454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.519000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:36:24.526000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.526000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb10909f0 a2=70 a3=ffff items=0 ppid=2333 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.526000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:36:24.526000 audit[2458]: AVC avc: denied { bpf } for pid=2458 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:24.526000 audit[2458]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb10908c0 a2=70 a3=3 items=0 ppid=2333 pid=2458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.526000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:36:24.517000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:36:24.517000 audit[2456]: SYSCALL arch=c000003e syscall=59 success=yes exit=0 a0=5591c50eb200 a1=5591c50a5780 a2=5591c50ed3e0 a3=7ffe32bb6770 items=0 ppid=2453 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-sysctl" exe="/usr/lib/systemd/systemd-sysctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.517000 audit: EXECVE argc=5 a0="/usr/lib/systemd/systemd-sysctl" a1="--prefix=/net/ipv4/conf/calico_tmp_A" a2="--prefix=/net/ipv4/neigh/calico_tmp_A" a3="--prefix=/net/ipv6/conf/calico_tmp_A" a4="--prefix=/net/ipv6/neigh/calico_tmp_A" Feb 9 19:36:24.517000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D642D73797363746C002D2D7072656669783D2F6E65742F697076342F636F6E662F63616C69636F5F746D705F41002D2D7072656669783D2F6E65742F697076342F6E656967682F63616C69636F5F746D705F41002D2D7072656669783D2F6E65742F697076362F636F Feb 9 19:36:24.669000 audit[2481]: NETFILTER_CFG table=mangle:83 family=2 entries=19 op=nft_register_chain pid=2481 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:36:24.669000 audit[2481]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffe04c725c0 a2=0 a3=7ffe04c725ac items=0 ppid=2333 pid=2481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.669000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:36:24.670000 audit[2480]: NETFILTER_CFG table=raw:84 family=2 entries=19 op=nft_register_chain pid=2480 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:36:24.670000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fffe495e1a0 a2=0 a3=0 items=0 ppid=2333 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.670000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:36:24.678000 audit[2482]: NETFILTER_CFG table=nat:85 family=2 entries=16 op=nft_register_chain pid=2482 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:36:24.678000 audit[2482]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffe0d31adb0 a2=0 a3=7ffe0d31ad9c items=0 ppid=2333 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.678000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:36:24.679000 audit[2486]: NETFILTER_CFG table=filter:86 family=2 entries=39 op=nft_register_chain pid=2486 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:36:24.679000 audit[2486]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffecf4fd220 a2=0 a3=0 items=0 ppid=2333 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:24.679000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:36:25.217674 kubelet[1378]: E0209 19:36:25.217553 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:25.338920 systemd-networkd[970]: vxlan.calico: Link UP Feb 9 19:36:25.338940 systemd-networkd[970]: vxlan.calico: Gained carrier Feb 9 19:36:25.401869 env[1051]: time="2024-02-09T19:36:25.401299699Z" level=info msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\"" Feb 9 19:36:25.834515 env[1051]: 2024-02-09 19:36:25.575 [INFO][2509] k8s.go 578: Cleaning up netns ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:36:25.834515 env[1051]: 2024-02-09 19:36:25.576 [INFO][2509] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" iface="eth0" netns="/var/run/netns/cni-1a34d32e-fc3c-3d75-af34-4462e991e62d" Feb 9 19:36:25.834515 env[1051]: 2024-02-09 19:36:25.577 [INFO][2509] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" iface="eth0" netns="/var/run/netns/cni-1a34d32e-fc3c-3d75-af34-4462e991e62d" Feb 9 19:36:25.834515 env[1051]: 2024-02-09 19:36:25.586 [INFO][2509] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" iface="eth0" netns="/var/run/netns/cni-1a34d32e-fc3c-3d75-af34-4462e991e62d" Feb 9 19:36:25.834515 env[1051]: 2024-02-09 19:36:25.586 [INFO][2509] k8s.go 585: Releasing IP address(es) ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:36:25.834515 env[1051]: 2024-02-09 19:36:25.586 [INFO][2509] utils.go 188: Calico CNI releasing IP address ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:36:25.834515 env[1051]: 2024-02-09 19:36:25.803 [INFO][2517] ipam_plugin.go 415: Releasing address using handleID ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" HandleID="k8s-pod-network.482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Workload="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:25.834515 env[1051]: 2024-02-09 19:36:25.804 [INFO][2517] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:36:25.834515 env[1051]: 2024-02-09 19:36:25.804 [INFO][2517] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:36:25.834515 env[1051]: 2024-02-09 19:36:25.825 [WARNING][2517] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" HandleID="k8s-pod-network.482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Workload="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:25.834515 env[1051]: 2024-02-09 19:36:25.825 [INFO][2517] ipam_plugin.go 443: Releasing address using workloadID ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" HandleID="k8s-pod-network.482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Workload="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:25.834515 env[1051]: 2024-02-09 19:36:25.829 [INFO][2517] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:36:25.834515 env[1051]: 2024-02-09 19:36:25.832 [INFO][2509] k8s.go 591: Teardown processing complete. ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:36:25.840473 systemd[1]: run-netns-cni\x2d1a34d32e\x2dfc3c\x2d3d75\x2daf34\x2d4462e991e62d.mount: Deactivated successfully. Feb 9 19:36:25.842190 env[1051]: time="2024-02-09T19:36:25.842027750Z" level=info msg="TearDown network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\" successfully" Feb 9 19:36:25.842527 env[1051]: time="2024-02-09T19:36:25.842446773Z" level=info msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\" returns successfully" Feb 9 19:36:25.851688 env[1051]: time="2024-02-09T19:36:25.851622168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-gvw7v,Uid:de207a3e-27b3-4ae9-9f49-87ccb6b58864,Namespace:default,Attempt:1,}" Feb 9 19:36:26.091334 systemd-networkd[970]: cali8adc103ae59: Link UP Feb 9 19:36:26.099906 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:36:26.100036 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8adc103ae59: link becomes ready Feb 9 19:36:26.098627 systemd-networkd[970]: cali8adc103ae59: Gained carrier Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:25.953 [INFO][2523] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0 nginx-deployment-8ffc5cf85- default de207a3e-27b3-4ae9-9f49-87ccb6b58864 1238 0 2024-02-09 19:35:15 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.56 nginx-deployment-8ffc5cf85-gvw7v eth0 default [] [] [kns.default ksa.default.default] cali8adc103ae59 [] []}} ContainerID="aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gvw7v" WorkloadEndpoint="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-" Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:25.954 [INFO][2523] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gvw7v" WorkloadEndpoint="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:25.996 [INFO][2536] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" HandleID="k8s-pod-network.aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" Workload="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.017 [INFO][2536] ipam_plugin.go 268: Auto assigning IP ContainerID="aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" HandleID="k8s-pod-network.aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" Workload="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d7b0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.56", "pod":"nginx-deployment-8ffc5cf85-gvw7v", "timestamp":"2024-02-09 19:36:25.996278906 +0000 UTC"}, Hostname:"172.24.4.56", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.017 [INFO][2536] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.017 [INFO][2536] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.017 [INFO][2536] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.56' Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.021 [INFO][2536] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" host="172.24.4.56" Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.034 [INFO][2536] ipam.go 372: Looking up existing affinities for host host="172.24.4.56" Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.043 [INFO][2536] ipam.go 489: Trying affinity for 192.168.62.192/26 host="172.24.4.56" Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.048 [INFO][2536] ipam.go 155: Attempting to load block cidr=192.168.62.192/26 host="172.24.4.56" Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.053 [INFO][2536] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.192/26 host="172.24.4.56" Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.053 [INFO][2536] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.192/26 handle="k8s-pod-network.aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" host="172.24.4.56" Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.057 [INFO][2536] ipam.go 1682: Creating new handle: k8s-pod-network.aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9 Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.071 [INFO][2536] ipam.go 1203: Writing block in order to claim IPs block=192.168.62.192/26 handle="k8s-pod-network.aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" host="172.24.4.56" Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.082 [INFO][2536] ipam.go 1216: Successfully claimed IPs: [192.168.62.193/26] block=192.168.62.192/26 handle="k8s-pod-network.aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" host="172.24.4.56" Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.082 [INFO][2536] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.193/26] handle="k8s-pod-network.aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" host="172.24.4.56" Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.082 [INFO][2536] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:36:26.133090 env[1051]: 2024-02-09 19:36:26.082 [INFO][2536] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.62.193/26] IPv6=[] ContainerID="aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" HandleID="k8s-pod-network.aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" Workload="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:26.134953 env[1051]: 2024-02-09 19:36:26.086 [INFO][2523] k8s.go 385: Populated endpoint ContainerID="aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gvw7v" WorkloadEndpoint="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"de207a3e-27b3-4ae9-9f49-87ccb6b58864", ResourceVersion:"1238", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 35, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.56", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-gvw7v", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8adc103ae59", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:36:26.134953 env[1051]: 2024-02-09 19:36:26.087 [INFO][2523] k8s.go 386: Calico CNI using IPs: [192.168.62.193/32] ContainerID="aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gvw7v" WorkloadEndpoint="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:26.134953 env[1051]: 2024-02-09 19:36:26.087 [INFO][2523] dataplane_linux.go 68: Setting the host side veth name to cali8adc103ae59 ContainerID="aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gvw7v" WorkloadEndpoint="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:26.134953 env[1051]: 2024-02-09 19:36:26.099 [INFO][2523] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gvw7v" WorkloadEndpoint="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:26.134953 env[1051]: 2024-02-09 19:36:26.100 [INFO][2523] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gvw7v" WorkloadEndpoint="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"de207a3e-27b3-4ae9-9f49-87ccb6b58864", ResourceVersion:"1238", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 35, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.56", ContainerID:"aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9", Pod:"nginx-deployment-8ffc5cf85-gvw7v", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8adc103ae59", MAC:"ce:1d:31:82:54:90", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:36:26.134953 env[1051]: 2024-02-09 19:36:26.121 [INFO][2523] k8s.go 491: Wrote updated endpoint to datastore ContainerID="aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gvw7v" WorkloadEndpoint="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:26.161439 env[1051]: time="2024-02-09T19:36:26.161325012Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:36:26.161439 env[1051]: time="2024-02-09T19:36:26.161388843Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:36:26.161880 env[1051]: time="2024-02-09T19:36:26.161827986Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:36:26.162208 env[1051]: time="2024-02-09T19:36:26.162145397Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9 pid=2564 runtime=io.containerd.runc.v2 Feb 9 19:36:26.175000 audit[2577]: NETFILTER_CFG table=filter:87 family=2 entries=36 op=nft_register_chain pid=2577 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:36:26.175000 audit[2577]: SYSCALL arch=c000003e syscall=46 success=yes exit=19876 a0=3 a1=7ffd52e56980 a2=0 a3=7ffd52e5696c items=0 ppid=2333 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:26.175000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:36:26.193383 systemd[1]: Started cri-containerd-aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9.scope. Feb 9 19:36:26.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.212000 audit: BPF prog-id=85 op=LOAD Feb 9 19:36:26.213000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.213000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2564 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:26.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166663966333862646433353238376263363366626262343434373935 Feb 9 19:36:26.214000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.214000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2564 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:26.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166663966333862646433353238376263363366626262343434373935 Feb 9 19:36:26.214000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.214000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.214000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.214000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.214000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.214000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.214000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.214000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.214000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.214000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.214000 audit: BPF prog-id=86 op=LOAD Feb 9 19:36:26.214000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020e9e0 items=0 ppid=2564 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:26.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166663966333862646433353238376263363366626262343434373935 Feb 9 19:36:26.215000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.215000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.215000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.215000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.215000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.215000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.215000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.215000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.215000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.215000 audit: BPF prog-id=87 op=LOAD Feb 9 19:36:26.215000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020ea28 items=0 ppid=2564 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:26.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166663966333862646433353238376263363366626262343434373935 Feb 9 19:36:26.216000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:36:26.216000 audit: BPF prog-id=86 op=UNLOAD Feb 9 19:36:26.216000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.216000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.216000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.216000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.216000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.216000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.216000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.216000 audit[2576]: AVC avc: denied { perfmon } for pid=2576 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.216000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.218203 kubelet[1378]: E0209 19:36:26.218150 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:26.216000 audit[2576]: AVC avc: denied { bpf } for pid=2576 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:26.216000 audit: BPF prog-id=88 op=LOAD Feb 9 19:36:26.216000 audit[2576]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00020ee38 items=0 ppid=2564 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:26.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166663966333862646433353238376263363366626262343434373935 Feb 9 19:36:26.256787 env[1051]: time="2024-02-09T19:36:26.256686957Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-gvw7v,Uid:de207a3e-27b3-4ae9-9f49-87ccb6b58864,Namespace:default,Attempt:1,} returns sandbox id \"aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9\"" Feb 9 19:36:26.259742 env[1051]: time="2024-02-09T19:36:26.259708064Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:36:26.712716 systemd-networkd[970]: vxlan.calico: Gained IPv6LL Feb 9 19:36:26.840470 systemd[1]: run-containerd-runc-k8s.io-aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9-runc.IOtJFS.mount: Deactivated successfully. Feb 9 19:36:27.218556 kubelet[1378]: E0209 19:36:27.218381 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:27.924730 systemd-networkd[970]: cali8adc103ae59: Gained IPv6LL Feb 9 19:36:28.219266 kubelet[1378]: E0209 19:36:28.219135 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:29.219724 kubelet[1378]: E0209 19:36:29.219666 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:30.220106 kubelet[1378]: E0209 19:36:30.220047 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:30.858715 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3303491364.mount: Deactivated successfully. Feb 9 19:36:31.221063 kubelet[1378]: E0209 19:36:31.220925 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:32.221343 kubelet[1378]: E0209 19:36:32.221264 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:32.352687 env[1051]: time="2024-02-09T19:36:32.352526625Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:32.356559 env[1051]: time="2024-02-09T19:36:32.356507135Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:32.366213 env[1051]: time="2024-02-09T19:36:32.365840956Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:32.370091 env[1051]: time="2024-02-09T19:36:32.370029560Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:32.371251 env[1051]: time="2024-02-09T19:36:32.371195408Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:36:32.375051 env[1051]: time="2024-02-09T19:36:32.374929138Z" level=info msg="CreateContainer within sandbox \"aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 19:36:32.400434 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1618321861.mount: Deactivated successfully. Feb 9 19:36:32.402074 env[1051]: time="2024-02-09T19:36:32.402008133Z" level=info msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\"" Feb 9 19:36:32.415838 env[1051]: time="2024-02-09T19:36:32.415684993Z" level=info msg="CreateContainer within sandbox \"aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"3c671d85a966685f0a9da70b04309eacf12a6817b27413cb8a461813317e7971\"" Feb 9 19:36:32.418206 env[1051]: time="2024-02-09T19:36:32.418108791Z" level=info msg="StartContainer for \"3c671d85a966685f0a9da70b04309eacf12a6817b27413cb8a461813317e7971\"" Feb 9 19:36:32.458560 systemd[1]: Started cri-containerd-3c671d85a966685f0a9da70b04309eacf12a6817b27413cb8a461813317e7971.scope. Feb 9 19:36:32.486625 kernel: kauditd_printk_skb: 214 callbacks suppressed Feb 9 19:36:32.486940 kernel: audit: type=1400 audit(1707507392.478:725): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.486993 kernel: audit: type=1400 audit(1707507392.478:726): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494836 kernel: audit: type=1400 audit(1707507392.478:727): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494895 kernel: audit: type=1400 audit(1707507392.478:728): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.514217 kernel: audit: type=1400 audit(1707507392.478:729): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.514528 kernel: audit: type=1400 audit(1707507392.478:730): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.518811 kernel: audit: type=1400 audit(1707507392.478:731): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.531492 kernel: audit: type=1400 audit(1707507392.478:732): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.531546 kernel: audit: type=1400 audit(1707507392.478:733): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.535803 kernel: audit: type=1400 audit(1707507392.482:734): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.482000 audit: BPF prog-id=89 op=LOAD Feb 9 19:36:32.487000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.487000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2564 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:32.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363731643835613936363638356630613964613730623034333039 Feb 9 19:36:32.487000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.487000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2564 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:32.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363731643835613936363638356630613964613730623034333039 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit: BPF prog-id=90 op=LOAD Feb 9 19:36:32.494000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025020 items=0 ppid=2564 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:32.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363731643835613936363638356630613964613730623034333039 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.494000 audit: BPF prog-id=91 op=LOAD Feb 9 19:36:32.494000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025068 items=0 ppid=2564 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:32.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363731643835613936363638356630613964613730623034333039 Feb 9 19:36:32.517000 audit: BPF prog-id=91 op=UNLOAD Feb 9 19:36:32.517000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:36:32.517000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.517000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.517000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.517000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.517000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.517000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.517000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.517000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.517000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.517000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:32.517000 audit: BPF prog-id=92 op=LOAD Feb 9 19:36:32.517000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025478 items=0 ppid=2564 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:32.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363363731643835613936363638356630613964613730623034333039 Feb 9 19:36:32.561574 env[1051]: time="2024-02-09T19:36:32.561510034Z" level=info msg="StartContainer for \"3c671d85a966685f0a9da70b04309eacf12a6817b27413cb8a461813317e7971\" returns successfully" Feb 9 19:36:32.638582 env[1051]: 2024-02-09 19:36:32.576 [INFO][2636] k8s.go 578: Cleaning up netns ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:32.638582 env[1051]: 2024-02-09 19:36:32.576 [INFO][2636] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" iface="eth0" netns="/var/run/netns/cni-346a46b1-5e74-ac30-bcf5-9c2a5765f410" Feb 9 19:36:32.638582 env[1051]: 2024-02-09 19:36:32.577 [INFO][2636] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" iface="eth0" netns="/var/run/netns/cni-346a46b1-5e74-ac30-bcf5-9c2a5765f410" Feb 9 19:36:32.638582 env[1051]: 2024-02-09 19:36:32.577 [INFO][2636] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" iface="eth0" netns="/var/run/netns/cni-346a46b1-5e74-ac30-bcf5-9c2a5765f410" Feb 9 19:36:32.638582 env[1051]: 2024-02-09 19:36:32.577 [INFO][2636] k8s.go 585: Releasing IP address(es) ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:32.638582 env[1051]: 2024-02-09 19:36:32.577 [INFO][2636] utils.go 188: Calico CNI releasing IP address ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:32.638582 env[1051]: 2024-02-09 19:36:32.615 [INFO][2680] ipam_plugin.go 415: Releasing address using handleID ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" HandleID="k8s-pod-network.a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Workload="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:32.638582 env[1051]: 2024-02-09 19:36:32.615 [INFO][2680] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:36:32.638582 env[1051]: 2024-02-09 19:36:32.616 [INFO][2680] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:36:32.638582 env[1051]: 2024-02-09 19:36:32.632 [WARNING][2680] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" HandleID="k8s-pod-network.a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Workload="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:32.638582 env[1051]: 2024-02-09 19:36:32.632 [INFO][2680] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" HandleID="k8s-pod-network.a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Workload="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:32.638582 env[1051]: 2024-02-09 19:36:32.634 [INFO][2680] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:36:32.638582 env[1051]: 2024-02-09 19:36:32.636 [INFO][2636] k8s.go 591: Teardown processing complete. ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:32.639142 env[1051]: time="2024-02-09T19:36:32.639068175Z" level=info msg="TearDown network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\" successfully" Feb 9 19:36:32.639177 env[1051]: time="2024-02-09T19:36:32.639136725Z" level=info msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\" returns successfully" Feb 9 19:36:32.640653 env[1051]: time="2024-02-09T19:36:32.640620888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rmxrz,Uid:f865e0d7-fdde-4dc8-9458-d3929a654ddf,Namespace:calico-system,Attempt:1,}" Feb 9 19:36:32.922543 systemd-networkd[970]: cali8c755cda6e7: Link UP Feb 9 19:36:32.930847 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:36:32.930987 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8c755cda6e7: link becomes ready Feb 9 19:36:32.931734 systemd-networkd[970]: cali8c755cda6e7: Gained carrier Feb 9 19:36:32.956634 kubelet[1378]: I0209 19:36:32.956329 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-gvw7v" podStartSLOduration=-9.22337195889857e+09 pod.CreationTimestamp="2024-02-09 19:35:15 +0000 UTC" firstStartedPulling="2024-02-09 19:36:26.258728156 +0000 UTC m=+113.838837668" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:36:32.848601539 +0000 UTC m=+120.428711090" watchObservedRunningTime="2024-02-09 19:36:32.956207611 +0000 UTC m=+120.536317162" Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.737 [INFO][2696] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.56-k8s-csi--node--driver--rmxrz-eth0 csi-node-driver- calico-system f865e0d7-fdde-4dc8-9458-d3929a654ddf 1263 0 2024-02-09 19:34:46 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.56 csi-node-driver-rmxrz eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali8c755cda6e7 [] []}} ContainerID="f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" Namespace="calico-system" Pod="csi-node-driver-rmxrz" WorkloadEndpoint="172.24.4.56-k8s-csi--node--driver--rmxrz-" Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.738 [INFO][2696] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" Namespace="calico-system" Pod="csi-node-driver-rmxrz" WorkloadEndpoint="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.803 [INFO][2707] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" HandleID="k8s-pod-network.f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" Workload="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.829 [INFO][2707] ipam_plugin.go 268: Auto assigning IP ContainerID="f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" HandleID="k8s-pod-network.f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" Workload="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000a8790), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.56", "pod":"csi-node-driver-rmxrz", "timestamp":"2024-02-09 19:36:32.803134446 +0000 UTC"}, Hostname:"172.24.4.56", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.829 [INFO][2707] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.829 [INFO][2707] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.829 [INFO][2707] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.56' Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.836 [INFO][2707] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" host="172.24.4.56" Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.845 [INFO][2707] ipam.go 372: Looking up existing affinities for host host="172.24.4.56" Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.858 [INFO][2707] ipam.go 489: Trying affinity for 192.168.62.192/26 host="172.24.4.56" Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.864 [INFO][2707] ipam.go 155: Attempting to load block cidr=192.168.62.192/26 host="172.24.4.56" Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.876 [INFO][2707] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.192/26 host="172.24.4.56" Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.876 [INFO][2707] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.192/26 handle="k8s-pod-network.f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" host="172.24.4.56" Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.881 [INFO][2707] ipam.go 1682: Creating new handle: k8s-pod-network.f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.892 [INFO][2707] ipam.go 1203: Writing block in order to claim IPs block=192.168.62.192/26 handle="k8s-pod-network.f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" host="172.24.4.56" Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.905 [INFO][2707] ipam.go 1216: Successfully claimed IPs: [192.168.62.194/26] block=192.168.62.192/26 handle="k8s-pod-network.f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" host="172.24.4.56" Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.905 [INFO][2707] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.194/26] handle="k8s-pod-network.f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" host="172.24.4.56" Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.905 [INFO][2707] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:36:32.959029 env[1051]: 2024-02-09 19:36:32.905 [INFO][2707] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.62.194/26] IPv6=[] ContainerID="f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" HandleID="k8s-pod-network.f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" Workload="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:32.960556 env[1051]: 2024-02-09 19:36:32.909 [INFO][2696] k8s.go 385: Populated endpoint ContainerID="f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" Namespace="calico-system" Pod="csi-node-driver-rmxrz" WorkloadEndpoint="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56-k8s-csi--node--driver--rmxrz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f865e0d7-fdde-4dc8-9458-d3929a654ddf", ResourceVersion:"1263", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.56", ContainerID:"", Pod:"csi-node-driver-rmxrz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali8c755cda6e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:36:32.960556 env[1051]: 2024-02-09 19:36:32.909 [INFO][2696] k8s.go 386: Calico CNI using IPs: [192.168.62.194/32] ContainerID="f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" Namespace="calico-system" Pod="csi-node-driver-rmxrz" WorkloadEndpoint="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:32.960556 env[1051]: 2024-02-09 19:36:32.910 [INFO][2696] dataplane_linux.go 68: Setting the host side veth name to cali8c755cda6e7 ContainerID="f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" Namespace="calico-system" Pod="csi-node-driver-rmxrz" WorkloadEndpoint="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:32.960556 env[1051]: 2024-02-09 19:36:32.933 [INFO][2696] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" Namespace="calico-system" Pod="csi-node-driver-rmxrz" WorkloadEndpoint="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:32.960556 env[1051]: 2024-02-09 19:36:32.934 [INFO][2696] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" Namespace="calico-system" Pod="csi-node-driver-rmxrz" WorkloadEndpoint="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56-k8s-csi--node--driver--rmxrz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f865e0d7-fdde-4dc8-9458-d3929a654ddf", ResourceVersion:"1263", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.56", ContainerID:"f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed", Pod:"csi-node-driver-rmxrz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali8c755cda6e7", MAC:"2a:b8:f5:dd:0a:c6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:36:32.960556 env[1051]: 2024-02-09 19:36:32.954 [INFO][2696] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed" Namespace="calico-system" Pod="csi-node-driver-rmxrz" WorkloadEndpoint="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:33.000227 env[1051]: time="2024-02-09T19:36:33.000113586Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:36:33.000227 env[1051]: time="2024-02-09T19:36:33.000164002Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:36:33.000227 env[1051]: time="2024-02-09T19:36:33.000177367Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:36:33.000669 env[1051]: time="2024-02-09T19:36:33.000360546Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed pid=2737 runtime=io.containerd.runc.v2 Feb 9 19:36:33.011000 audit[2753]: NETFILTER_CFG table=filter:88 family=2 entries=40 op=nft_register_chain pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:36:33.011000 audit[2753]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7fffe0042e90 a2=0 a3=7fffe0042e7c items=0 ppid=2333 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:33.011000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:36:33.017308 systemd[1]: Started cri-containerd-f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed.scope. Feb 9 19:36:33.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.033000 audit: BPF prog-id=93 op=LOAD Feb 9 19:36:33.034000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.034000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2737 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:33.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313038306231393539366662393139373136646463303639323137 Feb 9 19:36:33.034000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.034000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2737 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:33.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313038306231393539366662393139373136646463303639323137 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit: BPF prog-id=94 op=LOAD Feb 9 19:36:33.035000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000393900 items=0 ppid=2737 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:33.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313038306231393539366662393139373136646463303639323137 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.035000 audit: BPF prog-id=95 op=LOAD Feb 9 19:36:33.035000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000393948 items=0 ppid=2737 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:33.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313038306231393539366662393139373136646463303639323137 Feb 9 19:36:33.036000 audit: BPF prog-id=95 op=UNLOAD Feb 9 19:36:33.036000 audit: BPF prog-id=94 op=UNLOAD Feb 9 19:36:33.036000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.036000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.036000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.036000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.036000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.036000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.036000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.036000 audit[2746]: AVC avc: denied { perfmon } for pid=2746 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.036000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.036000 audit[2746]: AVC avc: denied { bpf } for pid=2746 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:33.036000 audit: BPF prog-id=96 op=LOAD Feb 9 19:36:33.036000 audit[2746]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000393d58 items=0 ppid=2737 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:33.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313038306231393539366662393139373136646463303639323137 Feb 9 19:36:33.064480 env[1051]: time="2024-02-09T19:36:33.064386077Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rmxrz,Uid:f865e0d7-fdde-4dc8-9458-d3929a654ddf,Namespace:calico-system,Attempt:1,} returns sandbox id \"f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed\"" Feb 9 19:36:33.066523 env[1051]: time="2024-02-09T19:36:33.066491924Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:36:33.114124 kubelet[1378]: E0209 19:36:33.113987 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:33.133576 env[1051]: time="2024-02-09T19:36:33.133503147Z" level=info msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\"" Feb 9 19:36:33.221940 kubelet[1378]: E0209 19:36:33.221692 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:33.332411 env[1051]: 2024-02-09 19:36:33.235 [WARNING][2788] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56-k8s-csi--node--driver--rmxrz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f865e0d7-fdde-4dc8-9458-d3929a654ddf", ResourceVersion:"1269", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.56", ContainerID:"f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed", Pod:"csi-node-driver-rmxrz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali8c755cda6e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:36:33.332411 env[1051]: 2024-02-09 19:36:33.237 [INFO][2788] k8s.go 578: Cleaning up netns ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:33.332411 env[1051]: 2024-02-09 19:36:33.237 [INFO][2788] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" iface="eth0" netns="" Feb 9 19:36:33.332411 env[1051]: 2024-02-09 19:36:33.237 [INFO][2788] k8s.go 585: Releasing IP address(es) ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:33.332411 env[1051]: 2024-02-09 19:36:33.237 [INFO][2788] utils.go 188: Calico CNI releasing IP address ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:33.332411 env[1051]: 2024-02-09 19:36:33.301 [INFO][2794] ipam_plugin.go 415: Releasing address using handleID ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" HandleID="k8s-pod-network.a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Workload="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:33.332411 env[1051]: 2024-02-09 19:36:33.301 [INFO][2794] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:36:33.332411 env[1051]: 2024-02-09 19:36:33.301 [INFO][2794] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:36:33.332411 env[1051]: 2024-02-09 19:36:33.321 [WARNING][2794] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" HandleID="k8s-pod-network.a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Workload="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:33.332411 env[1051]: 2024-02-09 19:36:33.321 [INFO][2794] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" HandleID="k8s-pod-network.a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Workload="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:33.332411 env[1051]: 2024-02-09 19:36:33.327 [INFO][2794] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:36:33.332411 env[1051]: 2024-02-09 19:36:33.329 [INFO][2788] k8s.go 591: Teardown processing complete. ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:33.333178 env[1051]: time="2024-02-09T19:36:33.333149574Z" level=info msg="TearDown network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\" successfully" Feb 9 19:36:33.333255 env[1051]: time="2024-02-09T19:36:33.333235889Z" level=info msg="StopPodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\" returns successfully" Feb 9 19:36:33.334121 env[1051]: time="2024-02-09T19:36:33.334101656Z" level=info msg="RemovePodSandbox for \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\"" Feb 9 19:36:33.334251 env[1051]: time="2024-02-09T19:36:33.334215943Z" level=info msg="Forcibly stopping sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\"" Feb 9 19:36:33.392531 systemd[1]: run-netns-cni\x2d346a46b1\x2d5e74\x2dac30\x2dbcf5\x2d9c2a5765f410.mount: Deactivated successfully. Feb 9 19:36:33.458990 env[1051]: 2024-02-09 19:36:33.412 [WARNING][2814] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56-k8s-csi--node--driver--rmxrz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f865e0d7-fdde-4dc8-9458-d3929a654ddf", ResourceVersion:"1269", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.56", ContainerID:"f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed", Pod:"csi-node-driver-rmxrz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali8c755cda6e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:36:33.458990 env[1051]: 2024-02-09 19:36:33.412 [INFO][2814] k8s.go 578: Cleaning up netns ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:33.458990 env[1051]: 2024-02-09 19:36:33.412 [INFO][2814] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" iface="eth0" netns="" Feb 9 19:36:33.458990 env[1051]: 2024-02-09 19:36:33.412 [INFO][2814] k8s.go 585: Releasing IP address(es) ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:33.458990 env[1051]: 2024-02-09 19:36:33.412 [INFO][2814] utils.go 188: Calico CNI releasing IP address ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:33.458990 env[1051]: 2024-02-09 19:36:33.435 [INFO][2822] ipam_plugin.go 415: Releasing address using handleID ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" HandleID="k8s-pod-network.a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Workload="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:33.458990 env[1051]: 2024-02-09 19:36:33.435 [INFO][2822] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:36:33.458990 env[1051]: 2024-02-09 19:36:33.435 [INFO][2822] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:36:33.458990 env[1051]: 2024-02-09 19:36:33.451 [WARNING][2822] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" HandleID="k8s-pod-network.a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Workload="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:33.458990 env[1051]: 2024-02-09 19:36:33.451 [INFO][2822] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" HandleID="k8s-pod-network.a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Workload="172.24.4.56-k8s-csi--node--driver--rmxrz-eth0" Feb 9 19:36:33.458990 env[1051]: 2024-02-09 19:36:33.454 [INFO][2822] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:36:33.458990 env[1051]: 2024-02-09 19:36:33.456 [INFO][2814] k8s.go 591: Teardown processing complete. ContainerID="a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c" Feb 9 19:36:33.460830 env[1051]: time="2024-02-09T19:36:33.460716628Z" level=info msg="TearDown network for sandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\" successfully" Feb 9 19:36:33.469953 env[1051]: time="2024-02-09T19:36:33.469897605Z" level=info msg="RemovePodSandbox \"a9f20f82f6f5a6592552c24a96f4121ae1131f675b9a4f95918ebb4cd081ba8c\" returns successfully" Feb 9 19:36:33.471241 env[1051]: time="2024-02-09T19:36:33.471165387Z" level=info msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\"" Feb 9 19:36:33.626135 env[1051]: 2024-02-09 19:36:33.573 [WARNING][2841] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"de207a3e-27b3-4ae9-9f49-87ccb6b58864", ResourceVersion:"1264", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 35, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.56", ContainerID:"aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9", Pod:"nginx-deployment-8ffc5cf85-gvw7v", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8adc103ae59", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:36:33.626135 env[1051]: 2024-02-09 19:36:33.574 [INFO][2841] k8s.go 578: Cleaning up netns ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:36:33.626135 env[1051]: 2024-02-09 19:36:33.574 [INFO][2841] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" iface="eth0" netns="" Feb 9 19:36:33.626135 env[1051]: 2024-02-09 19:36:33.574 [INFO][2841] k8s.go 585: Releasing IP address(es) ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:36:33.626135 env[1051]: 2024-02-09 19:36:33.574 [INFO][2841] utils.go 188: Calico CNI releasing IP address ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:36:33.626135 env[1051]: 2024-02-09 19:36:33.603 [INFO][2847] ipam_plugin.go 415: Releasing address using handleID ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" HandleID="k8s-pod-network.482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Workload="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:33.626135 env[1051]: 2024-02-09 19:36:33.603 [INFO][2847] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:36:33.626135 env[1051]: 2024-02-09 19:36:33.604 [INFO][2847] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:36:33.626135 env[1051]: 2024-02-09 19:36:33.620 [WARNING][2847] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" HandleID="k8s-pod-network.482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Workload="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:33.626135 env[1051]: 2024-02-09 19:36:33.620 [INFO][2847] ipam_plugin.go 443: Releasing address using workloadID ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" HandleID="k8s-pod-network.482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Workload="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:33.626135 env[1051]: 2024-02-09 19:36:33.623 [INFO][2847] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:36:33.626135 env[1051]: 2024-02-09 19:36:33.624 [INFO][2841] k8s.go 591: Teardown processing complete. ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:36:33.626694 env[1051]: time="2024-02-09T19:36:33.626203977Z" level=info msg="TearDown network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\" successfully" Feb 9 19:36:33.626694 env[1051]: time="2024-02-09T19:36:33.626390382Z" level=info msg="StopPodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\" returns successfully" Feb 9 19:36:33.627030 env[1051]: time="2024-02-09T19:36:33.626999129Z" level=info msg="RemovePodSandbox for \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\"" Feb 9 19:36:33.627308 env[1051]: time="2024-02-09T19:36:33.627257250Z" level=info msg="Forcibly stopping sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\"" Feb 9 19:36:33.751235 env[1051]: 2024-02-09 19:36:33.679 [WARNING][2867] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"de207a3e-27b3-4ae9-9f49-87ccb6b58864", ResourceVersion:"1264", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 35, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.56", ContainerID:"aff9f38bdd35287bc63fbbb444795433a67b26a2af34d618f74ce1d769c97fd9", Pod:"nginx-deployment-8ffc5cf85-gvw7v", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali8adc103ae59", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:36:33.751235 env[1051]: 2024-02-09 19:36:33.679 [INFO][2867] k8s.go 578: Cleaning up netns ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:36:33.751235 env[1051]: 2024-02-09 19:36:33.679 [INFO][2867] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" iface="eth0" netns="" Feb 9 19:36:33.751235 env[1051]: 2024-02-09 19:36:33.679 [INFO][2867] k8s.go 585: Releasing IP address(es) ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:36:33.751235 env[1051]: 2024-02-09 19:36:33.679 [INFO][2867] utils.go 188: Calico CNI releasing IP address ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:36:33.751235 env[1051]: 2024-02-09 19:36:33.725 [INFO][2873] ipam_plugin.go 415: Releasing address using handleID ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" HandleID="k8s-pod-network.482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Workload="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:33.751235 env[1051]: 2024-02-09 19:36:33.726 [INFO][2873] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:36:33.751235 env[1051]: 2024-02-09 19:36:33.726 [INFO][2873] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:36:33.751235 env[1051]: 2024-02-09 19:36:33.743 [WARNING][2873] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" HandleID="k8s-pod-network.482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Workload="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:33.751235 env[1051]: 2024-02-09 19:36:33.743 [INFO][2873] ipam_plugin.go 443: Releasing address using workloadID ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" HandleID="k8s-pod-network.482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Workload="172.24.4.56-k8s-nginx--deployment--8ffc5cf85--gvw7v-eth0" Feb 9 19:36:33.751235 env[1051]: 2024-02-09 19:36:33.747 [INFO][2873] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:36:33.751235 env[1051]: 2024-02-09 19:36:33.749 [INFO][2867] k8s.go 591: Teardown processing complete. ContainerID="482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5" Feb 9 19:36:33.752508 env[1051]: time="2024-02-09T19:36:33.751263119Z" level=info msg="TearDown network for sandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\" successfully" Feb 9 19:36:33.754851 env[1051]: time="2024-02-09T19:36:33.754746867Z" level=info msg="RemovePodSandbox \"482099dc91ff10f0bc17b601f8c955fc17d3c16cf897279094988f42e0cd34a5\" returns successfully" Feb 9 19:36:34.222558 kubelet[1378]: E0209 19:36:34.222494 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:34.716379 systemd-networkd[970]: cali8c755cda6e7: Gained IPv6LL Feb 9 19:36:35.167191 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3868404548.mount: Deactivated successfully. Feb 9 19:36:35.223543 kubelet[1378]: E0209 19:36:35.223455 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:36.224419 kubelet[1378]: E0209 19:36:36.224353 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:36.358434 env[1051]: time="2024-02-09T19:36:36.358381722Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:36.361642 env[1051]: time="2024-02-09T19:36:36.361558244Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:36.364716 env[1051]: time="2024-02-09T19:36:36.364671575Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:36.369171 env[1051]: time="2024-02-09T19:36:36.369112114Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:36:36.369524 env[1051]: time="2024-02-09T19:36:36.368142297Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:36.374304 env[1051]: time="2024-02-09T19:36:36.374242087Z" level=info msg="CreateContainer within sandbox \"f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:36:36.398499 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount382919764.mount: Deactivated successfully. Feb 9 19:36:36.407055 env[1051]: time="2024-02-09T19:36:36.407011914Z" level=info msg="CreateContainer within sandbox \"f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"294f627dd9c885681cf3c0ccd05b132b35d72a198867274121821f26c090896f\"" Feb 9 19:36:36.409342 env[1051]: time="2024-02-09T19:36:36.409268583Z" level=info msg="StartContainer for \"294f627dd9c885681cf3c0ccd05b132b35d72a198867274121821f26c090896f\"" Feb 9 19:36:36.458089 systemd[1]: Started cri-containerd-294f627dd9c885681cf3c0ccd05b132b35d72a198867274121821f26c090896f.scope. Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2737 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:36.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239346636323764643963383835363831636633633063636430356231 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit: BPF prog-id=97 op=LOAD Feb 9 19:36:36.486000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f7e30 items=0 ppid=2737 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:36.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239346636323764643963383835363831636633633063636430356231 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.486000 audit: BPF prog-id=98 op=LOAD Feb 9 19:36:36.486000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f7e78 items=0 ppid=2737 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:36.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239346636323764643963383835363831636633633063636430356231 Feb 9 19:36:36.492000 audit: BPF prog-id=98 op=UNLOAD Feb 9 19:36:36.492000 audit: BPF prog-id=97 op=UNLOAD Feb 9 19:36:36.493000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.493000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.493000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.493000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.493000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.493000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.493000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.493000 audit[2894]: AVC avc: denied { perfmon } for pid=2894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.493000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.493000 audit[2894]: AVC avc: denied { bpf } for pid=2894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:36.493000 audit: BPF prog-id=99 op=LOAD Feb 9 19:36:36.493000 audit[2894]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000f7f08 items=0 ppid=2737 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:36.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239346636323764643963383835363831636633633063636430356231 Feb 9 19:36:36.524699 env[1051]: time="2024-02-09T19:36:36.524613408Z" level=info msg="StartContainer for \"294f627dd9c885681cf3c0ccd05b132b35d72a198867274121821f26c090896f\" returns successfully" Feb 9 19:36:36.526521 env[1051]: time="2024-02-09T19:36:36.526486917Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:36:37.225181 kubelet[1378]: E0209 19:36:37.225092 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:38.225400 kubelet[1378]: E0209 19:36:38.225318 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:39.187201 env[1051]: time="2024-02-09T19:36:39.187034567Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:39.192261 env[1051]: time="2024-02-09T19:36:39.192172776Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:39.196503 env[1051]: time="2024-02-09T19:36:39.196405189Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:39.199483 env[1051]: time="2024-02-09T19:36:39.199395713Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:39.201505 env[1051]: time="2024-02-09T19:36:39.201398533Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:36:39.208176 env[1051]: time="2024-02-09T19:36:39.208067813Z" level=info msg="CreateContainer within sandbox \"f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:36:39.225724 kubelet[1378]: E0209 19:36:39.225545 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:39.239249 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2634845743.mount: Deactivated successfully. Feb 9 19:36:39.257550 env[1051]: time="2024-02-09T19:36:39.257452123Z" level=info msg="CreateContainer within sandbox \"f51080b19596fb919716ddc0692173f1352b43ae6a40c0a8b6f7f29315ebf1ed\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"1ddef4971a73bfbe27d3873733da7b78a50929b602d5e39b66439cc28907a7aa\"" Feb 9 19:36:39.259370 env[1051]: time="2024-02-09T19:36:39.259279348Z" level=info msg="StartContainer for \"1ddef4971a73bfbe27d3873733da7b78a50929b602d5e39b66439cc28907a7aa\"" Feb 9 19:36:39.330542 systemd[1]: run-containerd-runc-k8s.io-1ddef4971a73bfbe27d3873733da7b78a50929b602d5e39b66439cc28907a7aa-runc.ZaGtH0.mount: Deactivated successfully. Feb 9 19:36:39.342506 systemd[1]: Started cri-containerd-1ddef4971a73bfbe27d3873733da7b78a50929b602d5e39b66439cc28907a7aa.scope. Feb 9 19:36:39.369919 kernel: kauditd_printk_skb: 150 callbacks suppressed Feb 9 19:36:39.370052 kernel: audit: type=1400 audit(1707507399.360:768): avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.370110 kernel: audit: type=1300 audit(1707507399.360:768): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2737 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:39.360000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.360000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2737 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:39.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164646566343937316137336266626532376433383733373333646137 Feb 9 19:36:39.374653 kernel: audit: type=1327 audit(1707507399.360:768): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164646566343937316137336266626532376433383733373333646137 Feb 9 19:36:39.374851 kernel: audit: type=1400 audit(1707507399.360:769): avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.360000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.360000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.360000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.388800 kernel: audit: type=1400 audit(1707507399.360:769): avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.388898 kernel: audit: type=1400 audit(1707507399.360:769): avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.360000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.360000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.402923 kernel: audit: type=1400 audit(1707507399.360:769): avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.403007 kernel: audit: type=1400 audit(1707507399.360:769): avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.403030 kernel: audit: type=1400 audit(1707507399.360:769): avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.360000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.360000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.360000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.416851 kernel: audit: type=1400 audit(1707507399.360:769): avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.360000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.360000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.360000 audit: BPF prog-id=100 op=LOAD Feb 9 19:36:39.360000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003ee1e0 items=0 ppid=2737 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:39.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164646566343937316137336266626532376433383733373333646137 Feb 9 19:36:39.364000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.364000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.364000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.364000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.364000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.364000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.364000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.364000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.364000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.364000 audit: BPF prog-id=101 op=LOAD Feb 9 19:36:39.364000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003ee228 items=0 ppid=2737 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:39.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164646566343937316137336266626532376433383733373333646137 Feb 9 19:36:39.369000 audit: BPF prog-id=101 op=UNLOAD Feb 9 19:36:39.369000 audit: BPF prog-id=100 op=UNLOAD Feb 9 19:36:39.369000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.369000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.369000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.369000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.369000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.369000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.369000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.369000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.369000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.369000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:39.369000 audit: BPF prog-id=102 op=LOAD Feb 9 19:36:39.369000 audit[2928]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003ee2b8 items=0 ppid=2737 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:39.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164646566343937316137336266626532376433383733373333646137 Feb 9 19:36:39.425345 env[1051]: time="2024-02-09T19:36:39.425281360Z" level=info msg="StartContainer for \"1ddef4971a73bfbe27d3873733da7b78a50929b602d5e39b66439cc28907a7aa\" returns successfully" Feb 9 19:36:39.901668 kubelet[1378]: I0209 19:36:39.901614 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-rmxrz" podStartSLOduration=-9.223371922953241e+09 pod.CreationTimestamp="2024-02-09 19:34:46 +0000 UTC" firstStartedPulling="2024-02-09 19:36:33.066224585 +0000 UTC m=+120.646334086" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:36:39.899707581 +0000 UTC m=+127.479817132" watchObservedRunningTime="2024-02-09 19:36:39.901534164 +0000 UTC m=+127.481643705" Feb 9 19:36:40.226904 kubelet[1378]: E0209 19:36:40.226717 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:40.355907 kubelet[1378]: I0209 19:36:40.355864 1378 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:36:40.357584 kubelet[1378]: I0209 19:36:40.357556 1378 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:36:41.227722 kubelet[1378]: E0209 19:36:41.227635 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:42.229246 kubelet[1378]: E0209 19:36:42.229176 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:43.230106 kubelet[1378]: E0209 19:36:43.230035 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:44.232057 kubelet[1378]: E0209 19:36:44.232003 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:45.233808 kubelet[1378]: E0209 19:36:45.233700 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:45.873000 audit[2995]: NETFILTER_CFG table=filter:89 family=2 entries=18 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:45.876589 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 19:36:45.876845 kernel: audit: type=1325 audit(1707507405.873:774): table=filter:89 family=2 entries=18 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:45.873000 audit[2995]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffc4dad4240 a2=0 a3=7ffc4dad422c items=0 ppid=1669 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:45.893019 kernel: audit: type=1300 audit(1707507405.873:774): arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffc4dad4240 a2=0 a3=7ffc4dad422c items=0 ppid=1669 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:45.893258 kernel: audit: type=1327 audit(1707507405.873:774): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:45.873000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:45.901000 audit[2995]: NETFILTER_CFG table=nat:90 family=2 entries=94 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:45.906835 kernel: audit: type=1325 audit(1707507405.901:775): table=nat:90 family=2 entries=94 op=nft_register_rule pid=2995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:45.901000 audit[2995]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffc4dad4240 a2=0 a3=7ffc4dad422c items=0 ppid=1669 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:45.915848 kernel: audit: type=1300 audit(1707507405.901:775): arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffc4dad4240 a2=0 a3=7ffc4dad422c items=0 ppid=1669 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:45.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:45.921870 kernel: audit: type=1327 audit(1707507405.901:775): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:45.924095 kubelet[1378]: I0209 19:36:45.923980 1378 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:36:45.938033 systemd[1]: Created slice kubepods-besteffort-pod1e59a971_d3e1_4544_bd55_1e827825d154.slice. Feb 9 19:36:45.981000 audit[3021]: NETFILTER_CFG table=filter:91 family=2 entries=30 op=nft_register_rule pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:45.981000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffd80b387c0 a2=0 a3=7ffd80b387ac items=0 ppid=1669 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:45.992424 kernel: audit: type=1325 audit(1707507405.981:776): table=filter:91 family=2 entries=30 op=nft_register_rule pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:45.992543 kernel: audit: type=1300 audit(1707507405.981:776): arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffd80b387c0 a2=0 a3=7ffd80b387ac items=0 ppid=1669 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:45.981000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:45.995709 kernel: audit: type=1327 audit(1707507405.981:776): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:45.984000 audit[3021]: NETFILTER_CFG table=nat:92 family=2 entries=94 op=nft_register_rule pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:45.984000 audit[3021]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffd80b387c0 a2=0 a3=7ffd80b387ac items=0 ppid=1669 pid=3021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:45.984000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:45.999816 kernel: audit: type=1325 audit(1707507405.984:777): table=nat:92 family=2 entries=94 op=nft_register_rule pid=3021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:46.021900 kubelet[1378]: I0209 19:36:46.021846 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/1e59a971-d3e1-4544-bd55-1e827825d154-data\") pod \"nfs-server-provisioner-0\" (UID: \"1e59a971-d3e1-4544-bd55-1e827825d154\") " pod="default/nfs-server-provisioner-0" Feb 9 19:36:46.022310 kubelet[1378]: I0209 19:36:46.022222 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5cq86\" (UniqueName: \"kubernetes.io/projected/1e59a971-d3e1-4544-bd55-1e827825d154-kube-api-access-5cq86\") pod \"nfs-server-provisioner-0\" (UID: \"1e59a971-d3e1-4544-bd55-1e827825d154\") " pod="default/nfs-server-provisioner-0" Feb 9 19:36:46.236077 kubelet[1378]: E0209 19:36:46.234442 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:46.247423 env[1051]: time="2024-02-09T19:36:46.246485843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:1e59a971-d3e1-4544-bd55-1e827825d154,Namespace:default,Attempt:0,}" Feb 9 19:36:46.601231 systemd-networkd[970]: cali60e51b789ff: Link UP Feb 9 19:36:46.608643 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:36:46.610114 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 19:36:46.609409 systemd-networkd[970]: cali60e51b789ff: Gained carrier Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.414 [INFO][3023] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.56-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 1e59a971-d3e1-4544-bd55-1e827825d154 1322 0 2024-02-09 19:36:45 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.56 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.56-k8s-nfs--server--provisioner--0-" Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.415 [INFO][3023] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.56-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.508 [INFO][3035] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" HandleID="k8s-pod-network.115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" Workload="172.24.4.56-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.531 [INFO][3035] ipam_plugin.go 268: Auto assigning IP ContainerID="115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" HandleID="k8s-pod-network.115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" Workload="172.24.4.56-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000266df0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.56", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 19:36:46.508907961 +0000 UTC"}, Hostname:"172.24.4.56", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.531 [INFO][3035] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.532 [INFO][3035] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.532 [INFO][3035] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.56' Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.537 [INFO][3035] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" host="172.24.4.56" Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.546 [INFO][3035] ipam.go 372: Looking up existing affinities for host host="172.24.4.56" Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.554 [INFO][3035] ipam.go 489: Trying affinity for 192.168.62.192/26 host="172.24.4.56" Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.558 [INFO][3035] ipam.go 155: Attempting to load block cidr=192.168.62.192/26 host="172.24.4.56" Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.562 [INFO][3035] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.192/26 host="172.24.4.56" Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.563 [INFO][3035] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.192/26 handle="k8s-pod-network.115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" host="172.24.4.56" Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.566 [INFO][3035] ipam.go 1682: Creating new handle: k8s-pod-network.115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.576 [INFO][3035] ipam.go 1203: Writing block in order to claim IPs block=192.168.62.192/26 handle="k8s-pod-network.115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" host="172.24.4.56" Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.589 [INFO][3035] ipam.go 1216: Successfully claimed IPs: [192.168.62.195/26] block=192.168.62.192/26 handle="k8s-pod-network.115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" host="172.24.4.56" Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.589 [INFO][3035] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.195/26] handle="k8s-pod-network.115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" host="172.24.4.56" Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.589 [INFO][3035] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:36:46.630556 env[1051]: 2024-02-09 19:36:46.589 [INFO][3035] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.62.195/26] IPv6=[] ContainerID="115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" HandleID="k8s-pod-network.115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" Workload="172.24.4.56-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:36:46.639401 env[1051]: 2024-02-09 19:36:46.593 [INFO][3023] k8s.go 385: Populated endpoint ContainerID="115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.56-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"1e59a971-d3e1-4544-bd55-1e827825d154", ResourceVersion:"1322", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 36, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.56", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.62.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:36:46.639401 env[1051]: 2024-02-09 19:36:46.593 [INFO][3023] k8s.go 386: Calico CNI using IPs: [192.168.62.195/32] ContainerID="115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.56-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:36:46.639401 env[1051]: 2024-02-09 19:36:46.594 [INFO][3023] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.56-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:36:46.639401 env[1051]: 2024-02-09 19:36:46.609 [INFO][3023] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.56-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:36:46.641609 env[1051]: 2024-02-09 19:36:46.611 [INFO][3023] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.56-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"1e59a971-d3e1-4544-bd55-1e827825d154", ResourceVersion:"1322", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 36, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.56", ContainerID:"115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.62.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"e6:3c:6f:f0:c6:53", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:36:46.641609 env[1051]: 2024-02-09 19:36:46.624 [INFO][3023] k8s.go 491: Wrote updated endpoint to datastore ContainerID="115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.56-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:36:46.668158 env[1051]: time="2024-02-09T19:36:46.668062957Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:36:46.668313 env[1051]: time="2024-02-09T19:36:46.668161596Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:36:46.668313 env[1051]: time="2024-02-09T19:36:46.668202905Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:36:46.668487 env[1051]: time="2024-02-09T19:36:46.668432444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c pid=3065 runtime=io.containerd.runc.v2 Feb 9 19:36:46.678000 audit[3076]: NETFILTER_CFG table=filter:93 family=2 entries=44 op=nft_register_chain pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:36:46.678000 audit[3076]: SYSCALL arch=c000003e syscall=46 success=yes exit=22352 a0=3 a1=7ffe16039340 a2=0 a3=7ffe1603932c items=0 ppid=2333 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:46.678000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:36:46.691753 systemd[1]: Started cri-containerd-115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c.scope. Feb 9 19:36:46.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.711000 audit: BPF prog-id=103 op=LOAD Feb 9 19:36:46.713000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.713000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3065 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:46.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356135363334373934393434356133623062343931643837323166 Feb 9 19:36:46.713000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.713000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3065 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:46.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356135363334373934393434356133623062343931643837323166 Feb 9 19:36:46.713000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.713000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.713000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.713000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.713000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.713000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.713000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.713000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.713000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.713000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.713000 audit: BPF prog-id=104 op=LOAD Feb 9 19:36:46.713000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001d6410 items=0 ppid=3065 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:46.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356135363334373934393434356133623062343931643837323166 Feb 9 19:36:46.714000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.714000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.714000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.714000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.714000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.714000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.714000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.714000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.714000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.714000 audit: BPF prog-id=105 op=LOAD Feb 9 19:36:46.714000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001d6458 items=0 ppid=3065 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:46.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356135363334373934393434356133623062343931643837323166 Feb 9 19:36:46.715000 audit: BPF prog-id=105 op=UNLOAD Feb 9 19:36:46.715000 audit: BPF prog-id=104 op=UNLOAD Feb 9 19:36:46.715000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.715000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.715000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.715000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.715000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.715000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.715000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.715000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.715000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.715000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:46.715000 audit: BPF prog-id=106 op=LOAD Feb 9 19:36:46.715000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001d6868 items=0 ppid=3065 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:46.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131356135363334373934393434356133623062343931643837323166 Feb 9 19:36:46.758976 env[1051]: time="2024-02-09T19:36:46.758865420Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:1e59a971-d3e1-4544-bd55-1e827825d154,Namespace:default,Attempt:0,} returns sandbox id \"115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c\"" Feb 9 19:36:46.763662 env[1051]: time="2024-02-09T19:36:46.763609369Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 19:36:47.152582 systemd[1]: run-containerd-runc-k8s.io-115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c-runc.2JkShB.mount: Deactivated successfully. Feb 9 19:36:47.236180 kubelet[1378]: E0209 19:36:47.236088 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:48.083742 systemd-networkd[970]: cali60e51b789ff: Gained IPv6LL Feb 9 19:36:48.236527 kubelet[1378]: E0209 19:36:48.236478 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:49.236994 kubelet[1378]: E0209 19:36:49.236927 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:50.238730 kubelet[1378]: E0209 19:36:50.238641 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:50.703589 systemd[1]: run-containerd-runc-k8s.io-a0a538b586a08e513ea320e9c6842ec32d30e2214885c10eac328ffc16223900-runc.uqFLO7.mount: Deactivated successfully. Feb 9 19:36:50.793566 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4212862532.mount: Deactivated successfully. Feb 9 19:36:51.238971 kubelet[1378]: E0209 19:36:51.238891 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:52.240306 kubelet[1378]: E0209 19:36:52.240204 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:53.114115 kubelet[1378]: E0209 19:36:53.114003 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:53.241055 kubelet[1378]: E0209 19:36:53.240973 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:54.241742 kubelet[1378]: E0209 19:36:54.241633 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:54.633022 env[1051]: time="2024-02-09T19:36:54.632920469Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:54.925430 env[1051]: time="2024-02-09T19:36:54.922161718Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:54.944447 env[1051]: time="2024-02-09T19:36:54.944362551Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:54.962471 env[1051]: time="2024-02-09T19:36:54.962310265Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:36:54.965080 env[1051]: time="2024-02-09T19:36:54.964852105Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 19:36:54.970450 env[1051]: time="2024-02-09T19:36:54.970302206Z" level=info msg="CreateContainer within sandbox \"115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 19:36:55.004448 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3636367555.mount: Deactivated successfully. Feb 9 19:36:55.033981 env[1051]: time="2024-02-09T19:36:55.033859543Z" level=info msg="CreateContainer within sandbox \"115a56347949445a3b0b491d8721f9c662e8edda0a9fd87ed6ab4152355db02c\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"954c9dca111f0e2ae4007d56fd0370bc92cbbbf68303ca4b3bb5ce7108529bac\"" Feb 9 19:36:55.035910 env[1051]: time="2024-02-09T19:36:55.035856069Z" level=info msg="StartContainer for \"954c9dca111f0e2ae4007d56fd0370bc92cbbbf68303ca4b3bb5ce7108529bac\"" Feb 9 19:36:55.076531 systemd[1]: Started cri-containerd-954c9dca111f0e2ae4007d56fd0370bc92cbbbf68303ca4b3bb5ce7108529bac.scope. Feb 9 19:36:55.091627 systemd[1]: run-containerd-runc-k8s.io-954c9dca111f0e2ae4007d56fd0370bc92cbbbf68303ca4b3bb5ce7108529bac-runc.ZMMeDK.mount: Deactivated successfully. Feb 9 19:36:55.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.124192 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 9 19:36:55.124266 kernel: audit: type=1400 audit(1707507415.120:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.130842 kernel: audit: type=1400 audit(1707507415.120:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.130953 kernel: audit: type=1400 audit(1707507415.120:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.137532 kernel: audit: type=1400 audit(1707507415.120:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.137605 kernel: audit: type=1400 audit(1707507415.120:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.144633 kernel: audit: type=1400 audit(1707507415.120:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.144704 kernel: audit: type=1400 audit(1707507415.120:803): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.120000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.151890 kernel: audit: type=1400 audit(1707507415.120:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.120000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.156368 kernel: audit: type=1400 audit(1707507415.120:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.160843 kernel: audit: type=1400 audit(1707507415.121:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.121000 audit: BPF prog-id=107 op=LOAD Feb 9 19:36:55.126000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.126000 audit[3130]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3065 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:55.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935346339646361313131663065326165343030376435366664303337 Feb 9 19:36:55.126000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.126000 audit[3130]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=3065 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:55.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935346339646361313131663065326165343030376435366664303337 Feb 9 19:36:55.126000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.126000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.126000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.126000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.126000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.126000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.126000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.126000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.126000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.126000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.126000 audit: BPF prog-id=108 op=LOAD Feb 9 19:36:55.126000 audit[3130]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002aa9b0 items=0 ppid=3065 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:55.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935346339646361313131663065326165343030376435366664303337 Feb 9 19:36:55.133000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.133000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.133000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.133000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.133000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.133000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.133000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.133000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.133000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.133000 audit: BPF prog-id=109 op=LOAD Feb 9 19:36:55.133000 audit[3130]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002aa9f8 items=0 ppid=3065 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:55.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935346339646361313131663065326165343030376435366664303337 Feb 9 19:36:55.143000 audit: BPF prog-id=109 op=UNLOAD Feb 9 19:36:55.143000 audit: BPF prog-id=108 op=UNLOAD Feb 9 19:36:55.143000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.143000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.143000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.143000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.143000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.143000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.143000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.143000 audit[3130]: AVC avc: denied { perfmon } for pid=3130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.143000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.143000 audit[3130]: AVC avc: denied { bpf } for pid=3130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:36:55.143000 audit: BPF prog-id=110 op=LOAD Feb 9 19:36:55.143000 audit[3130]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002aae08 items=0 ppid=3065 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:55.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935346339646361313131663065326165343030376435366664303337 Feb 9 19:36:55.187704 env[1051]: time="2024-02-09T19:36:55.187556643Z" level=info msg="StartContainer for \"954c9dca111f0e2ae4007d56fd0370bc92cbbbf68303ca4b3bb5ce7108529bac\" returns successfully" Feb 9 19:36:55.242345 kubelet[1378]: E0209 19:36:55.242248 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:55.244000 audit[3160]: AVC avc: denied { search } for pid=3160 comm="rpcbind" name="crypto" dev="proc" ino=23899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c1010 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:36:55.244000 audit[3160]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f5dd41200c0 a2=0 a3=0 items=0 ppid=3142 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c1010 key=(null) Feb 9 19:36:55.244000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 19:36:55.292000 audit[3165]: AVC avc: denied { search } for pid=3165 comm="dbus-daemon" name="crypto" dev="proc" ino=23899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c1010 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:36:55.292000 audit[3165]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fdd21cb20c0 a2=0 a3=0 items=0 ppid=3142 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c1010 key=(null) Feb 9 19:36:55.292000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:36:55.297000 audit[3166]: AVC avc: denied { watch } for pid=3166 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538068 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c1010 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c16,c1010 tclass=dir permissive=0 Feb 9 19:36:55.297000 audit[3166]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55a3b3aa1d30 a2=2c8 a3=7fff12e0a09c items=0 ppid=3142 pid=3166 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c1010 key=(null) Feb 9 19:36:55.297000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:36:55.301000 audit[3167]: AVC avc: denied { read } for pid=3167 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22901 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c1010 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 19:36:55.301000 audit[3167]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f3acdc5f320 a1=80000 a2=d a3=7fffa53997a0 items=0 ppid=3142 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c1010 key=(null) Feb 9 19:36:55.301000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:36:55.302000 audit[3167]: AVC avc: denied { search } for pid=3167 comm="ganesha.nfsd" name="crypto" dev="proc" ino=23899 scontext=system_u:system_r:svirt_lxc_net_t:s0:c16,c1010 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:36:55.302000 audit[3167]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f3acd1b30c0 a2=0 a3=0 items=0 ppid=3142 pid=3167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c16,c1010 key=(null) Feb 9 19:36:55.302000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:36:56.137000 audit[3196]: NETFILTER_CFG table=filter:94 family=2 entries=18 op=nft_register_rule pid=3196 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:56.137000 audit[3196]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc91f879e0 a2=0 a3=7ffc91f879cc items=0 ppid=1669 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:56.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:56.142000 audit[3196]: NETFILTER_CFG table=nat:95 family=2 entries=178 op=nft_register_chain pid=3196 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:36:56.142000 audit[3196]: SYSCALL arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7ffc91f879e0 a2=0 a3=7ffc91f879cc items=0 ppid=1669 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:36:56.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:36:56.243338 kubelet[1378]: E0209 19:36:56.243266 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:57.245042 kubelet[1378]: E0209 19:36:57.244926 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:58.245693 kubelet[1378]: E0209 19:36:58.245637 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:36:59.246654 kubelet[1378]: E0209 19:36:59.246510 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:00.247099 kubelet[1378]: E0209 19:37:00.246843 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:01.248006 kubelet[1378]: E0209 19:37:01.247875 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:02.249493 kubelet[1378]: E0209 19:37:02.249414 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:03.251164 kubelet[1378]: E0209 19:37:03.251099 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:04.252762 kubelet[1378]: E0209 19:37:04.252678 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:05.253380 kubelet[1378]: E0209 19:37:05.253306 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:06.254094 kubelet[1378]: E0209 19:37:06.254035 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:07.255166 kubelet[1378]: E0209 19:37:07.255049 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:08.256064 kubelet[1378]: E0209 19:37:08.255937 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:09.256402 kubelet[1378]: E0209 19:37:09.256345 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:10.257350 kubelet[1378]: E0209 19:37:10.257282 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:11.259120 kubelet[1378]: E0209 19:37:11.259049 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:12.261003 kubelet[1378]: E0209 19:37:12.260854 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:12.825242 update_engine[1046]: I0209 19:37:12.825038 1046 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 19:37:12.825242 update_engine[1046]: I0209 19:37:12.825122 1046 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 19:37:12.830439 update_engine[1046]: I0209 19:37:12.830138 1046 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 19:37:12.832055 update_engine[1046]: I0209 19:37:12.831878 1046 omaha_request_params.cc:62] Current group set to lts Feb 9 19:37:12.842660 update_engine[1046]: I0209 19:37:12.842134 1046 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 19:37:12.842660 update_engine[1046]: I0209 19:37:12.842180 1046 update_attempter.cc:643] Scheduling an action processor start. Feb 9 19:37:12.842660 update_engine[1046]: I0209 19:37:12.842221 1046 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 19:37:12.842660 update_engine[1046]: I0209 19:37:12.842322 1046 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 19:37:12.842660 update_engine[1046]: I0209 19:37:12.842497 1046 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 19:37:12.842660 update_engine[1046]: I0209 19:37:12.842511 1046 omaha_request_action.cc:271] Request: Feb 9 19:37:12.842660 update_engine[1046]: Feb 9 19:37:12.842660 update_engine[1046]: Feb 9 19:37:12.842660 update_engine[1046]: Feb 9 19:37:12.842660 update_engine[1046]: Feb 9 19:37:12.842660 update_engine[1046]: Feb 9 19:37:12.842660 update_engine[1046]: Feb 9 19:37:12.842660 update_engine[1046]: Feb 9 19:37:12.842660 update_engine[1046]: Feb 9 19:37:12.842660 update_engine[1046]: I0209 19:37:12.842521 1046 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 19:37:12.843881 locksmithd[1092]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 19:37:12.856715 update_engine[1046]: I0209 19:37:12.856662 1046 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 19:37:12.857296 update_engine[1046]: E0209 19:37:12.857264 1046 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 19:37:12.857570 update_engine[1046]: I0209 19:37:12.857542 1046 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 19:37:13.115531 kubelet[1378]: E0209 19:37:13.114208 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:13.261544 kubelet[1378]: E0209 19:37:13.261474 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:14.262348 kubelet[1378]: E0209 19:37:14.262257 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:15.263296 kubelet[1378]: E0209 19:37:15.263215 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:16.264519 kubelet[1378]: E0209 19:37:16.264450 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:17.266166 kubelet[1378]: E0209 19:37:17.266065 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:18.266946 kubelet[1378]: E0209 19:37:18.266858 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:19.268080 kubelet[1378]: E0209 19:37:19.267919 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:20.268486 kubelet[1378]: E0209 19:37:20.268293 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:20.614486 kubelet[1378]: I0209 19:37:20.614414 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.22337200124046e+09 pod.CreationTimestamp="2024-02-09 19:36:45 +0000 UTC" firstStartedPulling="2024-02-09 19:36:46.7624488 +0000 UTC m=+134.342558332" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:36:56.022411392 +0000 UTC m=+143.602520943" watchObservedRunningTime="2024-02-09 19:37:20.614316326 +0000 UTC m=+168.194425878" Feb 9 19:37:20.615642 kubelet[1378]: I0209 19:37:20.615590 1378 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:37:20.642167 systemd[1]: Created slice kubepods-besteffort-podc205548a_cf70_4bf8_8627_82a3e6d1f264.slice. Feb 9 19:37:20.674723 systemd[1]: run-containerd-runc-k8s.io-a0a538b586a08e513ea320e9c6842ec32d30e2214885c10eac328ffc16223900-runc.11Cm7H.mount: Deactivated successfully. Feb 9 19:37:20.774865 kubelet[1378]: I0209 19:37:20.774671 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-692d5c20-f9a8-46fb-bbf8-2efdb0f08fc4\" (UniqueName: \"kubernetes.io/nfs/c205548a-cf70-4bf8-8627-82a3e6d1f264-pvc-692d5c20-f9a8-46fb-bbf8-2efdb0f08fc4\") pod \"test-pod-1\" (UID: \"c205548a-cf70-4bf8-8627-82a3e6d1f264\") " pod="default/test-pod-1" Feb 9 19:37:20.774865 kubelet[1378]: I0209 19:37:20.774829 1378 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8b59j\" (UniqueName: \"kubernetes.io/projected/c205548a-cf70-4bf8-8627-82a3e6d1f264-kube-api-access-8b59j\") pod \"test-pod-1\" (UID: \"c205548a-cf70-4bf8-8627-82a3e6d1f264\") " pod="default/test-pod-1" Feb 9 19:37:20.940000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:20.958828 kernel: Failed to create system directory netfs Feb 9 19:37:20.959016 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 19:37:20.959074 kernel: audit: type=1400 audit(1707507440.940:822): avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:20.959131 kernel: Failed to create system directory netfs Feb 9 19:37:20.959175 kernel: audit: type=1400 audit(1707507440.940:822): avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:20.940000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:20.969757 kernel: Failed to create system directory netfs Feb 9 19:37:20.969892 kernel: audit: type=1400 audit(1707507440.940:822): avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:20.940000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:20.988497 kernel: Failed to create system directory netfs Feb 9 19:37:20.988632 kernel: audit: type=1400 audit(1707507440.940:822): avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:20.940000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:20.940000 audit[3252]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c1a1c5b5e0 a1=153bc a2=55c1a01ca2b0 a3=5 items=0 ppid=998 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:20.940000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:37:21.013434 kernel: audit: type=1300 audit(1707507440.940:822): arch=c000003e syscall=175 success=yes exit=0 a0=55c1a1c5b5e0 a1=153bc a2=55c1a01ca2b0 a3=5 items=0 ppid=998 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:21.013553 kernel: audit: type=1327 audit(1707507440.940:822): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.027116 kernel: Failed to create system directory fscache Feb 9 19:37:21.027202 kernel: audit: type=1400 audit(1707507441.016:823): avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.027234 kernel: Failed to create system directory fscache Feb 9 19:37:21.027256 kernel: audit: type=1400 audit(1707507441.016:823): avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.031947 kernel: Failed to create system directory fscache Feb 9 19:37:21.032010 kernel: audit: type=1400 audit(1707507441.016:823): avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.036817 kernel: Failed to create system directory fscache Feb 9 19:37:21.036884 kernel: audit: type=1400 audit(1707507441.016:823): avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.040785 kernel: Failed to create system directory fscache Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.042678 kernel: Failed to create system directory fscache Feb 9 19:37:21.043789 kernel: Failed to create system directory fscache Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.044992 kernel: Failed to create system directory fscache Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.046062 kernel: Failed to create system directory fscache Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.047147 kernel: Failed to create system directory fscache Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.048223 kernel: Failed to create system directory fscache Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.049291 kernel: Failed to create system directory fscache Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.050403 kernel: Failed to create system directory fscache Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.051491 kernel: Failed to create system directory fscache Feb 9 19:37:21.016000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.053792 kernel: FS-Cache: Loaded Feb 9 19:37:21.016000 audit[3252]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c1a1e709c0 a1=4c0fc a2=55c1a01ca2b0 a3=5 items=0 ppid=998 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:21.016000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.097281 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.097355 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.098483 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.099583 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.100630 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.101683 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.102820 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.104833 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.104888 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.105917 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.107013 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.108146 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.109195 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.110243 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.111298 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.112367 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.113428 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.114493 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.115539 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.116653 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.117726 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.119846 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.119905 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.120960 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.122021 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.123087 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.124143 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.125178 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.126243 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.127304 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.128355 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.129416 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.130506 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.131537 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.132515 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.133498 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.134479 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.135465 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.136458 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.137440 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.138488 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.139539 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.140583 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.141649 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.142680 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.143684 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.144824 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.146844 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.146890 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.147877 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.148905 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.149955 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.151026 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.152121 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.153114 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.154169 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.155252 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.156236 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.157208 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.158220 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.159251 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.160308 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.161368 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.162436 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.163424 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.164426 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.165409 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.166415 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.167472 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.168474 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.169495 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.170581 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.171667 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.172697 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.174664 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.174711 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.176644 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.176719 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.178671 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.178745 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.180840 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.180891 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.181944 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.183038 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.184051 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.185044 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.186051 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.187138 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.188202 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.189188 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.190235 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.191321 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.192412 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.193433 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.194543 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.195578 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.196572 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.197611 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.198597 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.199605 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.200644 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.201727 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.203862 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.203907 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.204953 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.206018 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.207114 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.208157 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.209216 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.210289 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.211312 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.212407 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.213380 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.214547 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.215662 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.217687 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.217736 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.219836 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.219872 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.220870 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.221958 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.223040 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.224045 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.225063 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.226123 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.227241 kernel: Failed to create system directory sunrpc Feb 9 19:37:21.079000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.237662 kernel: RPC: Registered named UNIX socket transport module. Feb 9 19:37:21.237832 kernel: RPC: Registered udp transport module. Feb 9 19:37:21.237860 kernel: RPC: Registered tcp transport module. Feb 9 19:37:21.238423 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 19:37:21.079000 audit[3252]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c1a1ebcad0 a1=1588c4 a2=55c1a01ca2b0 a3=5 items=6 ppid=998 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:21.079000 audit: CWD cwd="/" Feb 9 19:37:21.079000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:21.079000 audit: PATH item=1 name=(null) inode=23329 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:21.079000 audit: PATH item=2 name=(null) inode=23329 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:21.079000 audit: PATH item=3 name=(null) inode=23330 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:21.079000 audit: PATH item=4 name=(null) inode=23329 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:21.079000 audit: PATH item=5 name=(null) inode=23331 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:37:21.079000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:37:21.269802 kubelet[1378]: E0209 19:37:21.269665 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.286436 kernel: Failed to create system directory nfs Feb 9 19:37:21.286559 kernel: Failed to create system directory nfs Feb 9 19:37:21.286622 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.291875 kernel: Failed to create system directory nfs Feb 9 19:37:21.291966 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.293659 kernel: Failed to create system directory nfs Feb 9 19:37:21.293761 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.294523 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.295376 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.296237 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.297098 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.297959 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.298845 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.300528 kernel: Failed to create system directory nfs Feb 9 19:37:21.300612 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.301389 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.302263 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.303143 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.304062 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.304951 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.306643 kernel: Failed to create system directory nfs Feb 9 19:37:21.306709 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.308352 kernel: Failed to create system directory nfs Feb 9 19:37:21.308459 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.309215 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.310064 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.310935 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.312620 kernel: Failed to create system directory nfs Feb 9 19:37:21.312710 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.313505 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.314491 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.315345 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.316228 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.317083 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.317936 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.319055 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.319949 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.321738 kernel: Failed to create system directory nfs Feb 9 19:37:21.321883 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.322732 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.323665 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.325452 kernel: Failed to create system directory nfs Feb 9 19:37:21.325538 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.326320 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.327236 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.328113 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.328968 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.329877 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.331699 kernel: Failed to create system directory nfs Feb 9 19:37:21.331829 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.332614 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.333478 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.334399 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.335324 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.336202 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.337054 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.337907 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.339590 kernel: Failed to create system directory nfs Feb 9 19:37:21.339672 kernel: Failed to create system directory nfs Feb 9 19:37:21.274000 audit[3252]: AVC avc: denied { confidentiality } for pid=3252 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.274000 audit[3252]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c1a205f680 a1=e29dc a2=55c1a01ca2b0 a3=5 items=0 ppid=998 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:21.358944 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 19:37:21.274000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.449438 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.449495 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.450484 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.451540 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.452571 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.453580 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.454648 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.455709 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.457723 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.457766 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.459954 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.460007 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.462647 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.467253 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.469805 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.469892 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.474963 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.477490 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.477541 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.480130 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.485077 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.487698 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.487734 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.490253 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.498040 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.498142 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.498165 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.503029 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.505700 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.505780 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.508346 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.510839 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.515974 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.516013 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.518575 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.521282 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.523970 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.529064 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.529172 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.533419 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.533601 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.536540 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.536713 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.537835 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.540312 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.540422 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.541478 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.542566 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.543856 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.544965 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.547311 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.547452 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.548536 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.549846 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.550978 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.552288 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.554632 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.554844 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.556709 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.556883 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.557605 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.558612 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.559531 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.560526 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.561395 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.562326 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.563316 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.564203 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.565217 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.566129 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.567294 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.568653 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.569940 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.571208 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.572450 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.573733 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.575042 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.576279 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.577468 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.578640 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.579844 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.580993 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.582124 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.584608 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.584763 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.585723 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.586924 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.587986 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.589215 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.590333 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.591494 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.592945 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.593878 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.595086 kernel: Failed to create system directory nfs4 Feb 9 19:37:21.428000 audit[3257]: AVC avc: denied { confidentiality } for pid=3257 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.782973 kernel: NFS: Registering the id_resolver key type Feb 9 19:37:21.783231 kernel: Key type id_resolver registered Feb 9 19:37:21.783283 kernel: Key type id_legacy registered Feb 9 19:37:21.428000 audit[3257]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fe20c9bd010 a1=1d3cc4 a2=556c335832b0 a3=5 items=0 ppid=998 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:21.428000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.801945 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.802045 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.802093 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.804322 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.804377 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.806595 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.806643 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.807690 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.808820 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.809941 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.812323 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.812409 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.814668 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.814708 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.816879 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.816929 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.819129 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.819178 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.820237 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.821413 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.823844 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.823895 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.826048 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.826104 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.827174 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.828326 kernel: Failed to create system directory rpcgss Feb 9 19:37:21.795000 audit[3258]: AVC avc: denied { confidentiality } for pid=3258 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:37:21.795000 audit[3258]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f94b704a010 a1=4f524 a2=5650225722b0 a3=5 items=0 ppid=998 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:21.795000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 19:37:21.888625 nfsidmap[3265]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Feb 9 19:37:21.896507 nfsidmap[3266]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Feb 9 19:37:21.913000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:37:21.913000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:37:21.913000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:37:21.913000 audit[1124]: AVC avc: denied { watch_reads } for pid=1124 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:37:21.913000 audit[1124]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55fd3eb97f40 a2=10 a3=b2174fc15c96b5c4 items=0 ppid=1 pid=1124 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:21.913000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:37:21.913000 audit[1124]: AVC avc: denied { watch_reads } for pid=1124 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:37:21.913000 audit[1124]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55fd3eb97f40 a2=10 a3=b2174fc15c96b5c4 items=0 ppid=1 pid=1124 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:21.913000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:37:21.913000 audit[1124]: AVC avc: denied { watch_reads } for pid=1124 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2417 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:37:21.913000 audit[1124]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55fd3eb97f40 a2=10 a3=b2174fc15c96b5c4 items=0 ppid=1 pid=1124 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:21.913000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:37:22.154633 env[1051]: time="2024-02-09T19:37:22.153108458Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c205548a-cf70-4bf8-8627-82a3e6d1f264,Namespace:default,Attempt:0,}" Feb 9 19:37:22.270714 kubelet[1378]: E0209 19:37:22.270629 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:22.635213 systemd-networkd[970]: cali5ec59c6bf6e: Link UP Feb 9 19:37:22.646852 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:37:22.651987 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 19:37:22.653015 systemd-networkd[970]: cali5ec59c6bf6e: Gained carrier Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.289 [INFO][3268] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.56-k8s-test--pod--1-eth0 default c205548a-cf70-4bf8-8627-82a3e6d1f264 1431 0 2024-02-09 19:36:49 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.56 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.56-k8s-test--pod--1-" Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.289 [INFO][3268] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.56-k8s-test--pod--1-eth0" Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.401 [INFO][3280] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" HandleID="k8s-pod-network.6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" Workload="172.24.4.56-k8s-test--pod--1-eth0" Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.442 [INFO][3280] ipam_plugin.go 268: Auto assigning IP ContainerID="6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" HandleID="k8s-pod-network.6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" Workload="172.24.4.56-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027f950), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.56", "pod":"test-pod-1", "timestamp":"2024-02-09 19:37:22.401306659 +0000 UTC"}, Hostname:"172.24.4.56", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.442 [INFO][3280] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.442 [INFO][3280] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.442 [INFO][3280] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.56' Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.447 [INFO][3280] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" host="172.24.4.56" Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.456 [INFO][3280] ipam.go 372: Looking up existing affinities for host host="172.24.4.56" Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.465 [INFO][3280] ipam.go 489: Trying affinity for 192.168.62.192/26 host="172.24.4.56" Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.468 [INFO][3280] ipam.go 155: Attempting to load block cidr=192.168.62.192/26 host="172.24.4.56" Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.474 [INFO][3280] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.62.192/26 host="172.24.4.56" Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.474 [INFO][3280] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.62.192/26 handle="k8s-pod-network.6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" host="172.24.4.56" Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.477 [INFO][3280] ipam.go 1682: Creating new handle: k8s-pod-network.6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.565 [INFO][3280] ipam.go 1203: Writing block in order to claim IPs block=192.168.62.192/26 handle="k8s-pod-network.6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" host="172.24.4.56" Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.603 [INFO][3280] ipam.go 1216: Successfully claimed IPs: [192.168.62.196/26] block=192.168.62.192/26 handle="k8s-pod-network.6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" host="172.24.4.56" Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.603 [INFO][3280] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.62.196/26] handle="k8s-pod-network.6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" host="172.24.4.56" Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.603 [INFO][3280] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.603 [INFO][3280] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.62.196/26] IPv6=[] ContainerID="6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" HandleID="k8s-pod-network.6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" Workload="172.24.4.56-k8s-test--pod--1-eth0" Feb 9 19:37:22.670865 env[1051]: 2024-02-09 19:37:22.607 [INFO][3268] k8s.go 385: Populated endpoint ContainerID="6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.56-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c205548a-cf70-4bf8-8627-82a3e6d1f264", ResourceVersion:"1431", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 36, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.56", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:37:22.673272 env[1051]: 2024-02-09 19:37:22.607 [INFO][3268] k8s.go 386: Calico CNI using IPs: [192.168.62.196/32] ContainerID="6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.56-k8s-test--pod--1-eth0" Feb 9 19:37:22.673272 env[1051]: 2024-02-09 19:37:22.607 [INFO][3268] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.56-k8s-test--pod--1-eth0" Feb 9 19:37:22.673272 env[1051]: 2024-02-09 19:37:22.652 [INFO][3268] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.56-k8s-test--pod--1-eth0" Feb 9 19:37:22.673272 env[1051]: 2024-02-09 19:37:22.654 [INFO][3268] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.56-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.56-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"c205548a-cf70-4bf8-8627-82a3e6d1f264", ResourceVersion:"1431", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 36, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.56", ContainerID:"6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.62.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"62:89:b9:b0:e6:1e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:37:22.673272 env[1051]: 2024-02-09 19:37:22.667 [INFO][3268] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.56-k8s-test--pod--1-eth0" Feb 9 19:37:22.715000 audit[3303]: NETFILTER_CFG table=filter:96 family=2 entries=34 op=nft_register_chain pid=3303 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:37:22.715000 audit[3303]: SYSCALL arch=c000003e syscall=46 success=yes exit=17876 a0=3 a1=7ffc60a0f360 a2=0 a3=7ffc60a0f34c items=0 ppid=2333 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:22.715000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:37:22.724753 env[1051]: time="2024-02-09T19:37:22.724615134Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:37:22.724753 env[1051]: time="2024-02-09T19:37:22.724678226Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:37:22.724753 env[1051]: time="2024-02-09T19:37:22.724693435Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:37:22.725409 env[1051]: time="2024-02-09T19:37:22.725332345Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc pid=3306 runtime=io.containerd.runc.v2 Feb 9 19:37:22.750858 systemd[1]: Started cri-containerd-6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc.scope. Feb 9 19:37:22.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.769000 audit: BPF prog-id=111 op=LOAD Feb 9 19:37:22.771000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.771000 audit[3317]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3306 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:22.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662306437323364373639613335386433383533353035336637333338 Feb 9 19:37:22.771000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.771000 audit[3317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3306 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:22.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662306437323364373639613335386433383533353035336637333338 Feb 9 19:37:22.771000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.771000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.771000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.771000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.771000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.771000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.771000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.771000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.771000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.771000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.771000 audit: BPF prog-id=112 op=LOAD Feb 9 19:37:22.771000 audit[3317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000368b90 items=0 ppid=3306 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:22.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662306437323364373639613335386433383533353035336637333338 Feb 9 19:37:22.772000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.772000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.772000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.772000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.772000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.772000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.772000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.772000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.772000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.772000 audit: BPF prog-id=113 op=LOAD Feb 9 19:37:22.772000 audit[3317]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000368bd8 items=0 ppid=3306 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:22.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662306437323364373639613335386433383533353035336637333338 Feb 9 19:37:22.773000 audit: BPF prog-id=113 op=UNLOAD Feb 9 19:37:22.773000 audit: BPF prog-id=112 op=UNLOAD Feb 9 19:37:22.773000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.773000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.773000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.773000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.773000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.773000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.773000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.773000 audit[3317]: AVC avc: denied { perfmon } for pid=3317 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.773000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.773000 audit[3317]: AVC avc: denied { bpf } for pid=3317 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:22.773000 audit: BPF prog-id=114 op=LOAD Feb 9 19:37:22.773000 audit[3317]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000368fe8 items=0 ppid=3306 pid=3317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:22.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662306437323364373639613335386433383533353035336637333338 Feb 9 19:37:22.818436 env[1051]: time="2024-02-09T19:37:22.818335165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:c205548a-cf70-4bf8-8627-82a3e6d1f264,Namespace:default,Attempt:0,} returns sandbox id \"6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc\"" Feb 9 19:37:22.821911 update_engine[1046]: I0209 19:37:22.821383 1046 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 19:37:22.821911 update_engine[1046]: I0209 19:37:22.821902 1046 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 19:37:22.822376 update_engine[1046]: E0209 19:37:22.822170 1046 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 19:37:22.822376 update_engine[1046]: I0209 19:37:22.822275 1046 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 19:37:22.822809 env[1051]: time="2024-02-09T19:37:22.822752513Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:37:23.241019 env[1051]: time="2024-02-09T19:37:23.240902921Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:23.245122 env[1051]: time="2024-02-09T19:37:23.244997079Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:23.249464 env[1051]: time="2024-02-09T19:37:23.249387908Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:23.254183 env[1051]: time="2024-02-09T19:37:23.254107198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:37:23.256465 env[1051]: time="2024-02-09T19:37:23.256370895Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:37:23.261752 env[1051]: time="2024-02-09T19:37:23.261679349Z" level=info msg="CreateContainer within sandbox \"6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 19:37:23.271523 kubelet[1378]: E0209 19:37:23.271387 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:23.292458 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2389941188.mount: Deactivated successfully. Feb 9 19:37:23.306080 env[1051]: time="2024-02-09T19:37:23.305963261Z" level=info msg="CreateContainer within sandbox \"6b0d723d769a358d38535053f73386e8cfa0780f8df1fa548d5b40c3f64013bc\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"c8af5a79e8609c2c7ebdc3fd38d8a4f5896eaea6f22bd8501b10bcc849ab205f\"" Feb 9 19:37:23.307990 env[1051]: time="2024-02-09T19:37:23.307914174Z" level=info msg="StartContainer for \"c8af5a79e8609c2c7ebdc3fd38d8a4f5896eaea6f22bd8501b10bcc849ab205f\"" Feb 9 19:37:23.359371 systemd[1]: Started cri-containerd-c8af5a79e8609c2c7ebdc3fd38d8a4f5896eaea6f22bd8501b10bcc849ab205f.scope. Feb 9 19:37:23.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.386000 audit: BPF prog-id=115 op=LOAD Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3306 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:23.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616635613739653836303963326337656264633366643338643861 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3306 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:23.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616635613739653836303963326337656264633366643338643861 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit: BPF prog-id=116 op=LOAD Feb 9 19:37:23.387000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000996e0 items=0 ppid=3306 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:23.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616635613739653836303963326337656264633366643338643861 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.387000 audit: BPF prog-id=117 op=LOAD Feb 9 19:37:23.387000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000099728 items=0 ppid=3306 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:23.387000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616635613739653836303963326337656264633366643338643861 Feb 9 19:37:23.387000 audit: BPF prog-id=117 op=UNLOAD Feb 9 19:37:23.387000 audit: BPF prog-id=116 op=UNLOAD Feb 9 19:37:23.388000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.388000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.388000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.388000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.388000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.388000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.388000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.388000 audit[3348]: AVC avc: denied { perfmon } for pid=3348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.388000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.388000 audit[3348]: AVC avc: denied { bpf } for pid=3348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:37:23.388000 audit: BPF prog-id=118 op=LOAD Feb 9 19:37:23.388000 audit[3348]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000099b38 items=0 ppid=3306 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:37:23.388000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338616635613739653836303963326337656264633366643338643861 Feb 9 19:37:23.421286 env[1051]: time="2024-02-09T19:37:23.421227002Z" level=info msg="StartContainer for \"c8af5a79e8609c2c7ebdc3fd38d8a4f5896eaea6f22bd8501b10bcc849ab205f\" returns successfully" Feb 9 19:37:24.208729 kubelet[1378]: I0209 19:37:24.208647 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=-9.223372001646317e+09 pod.CreationTimestamp="2024-02-09 19:36:49 +0000 UTC" firstStartedPulling="2024-02-09 19:37:22.821089985 +0000 UTC m=+170.401199506" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:37:24.208396517 +0000 UTC m=+171.788506099" watchObservedRunningTime="2024-02-09 19:37:24.208459819 +0000 UTC m=+171.788569410" Feb 9 19:37:24.272080 kubelet[1378]: E0209 19:37:24.271962 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:24.307475 systemd-networkd[970]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 19:37:25.272513 kubelet[1378]: E0209 19:37:25.272344 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:26.273104 kubelet[1378]: E0209 19:37:26.273014 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:27.273904 kubelet[1378]: E0209 19:37:27.273710 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:28.274832 kubelet[1378]: E0209 19:37:28.274710 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:29.275424 kubelet[1378]: E0209 19:37:29.275291 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:30.276034 kubelet[1378]: E0209 19:37:30.275926 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:31.276875 kubelet[1378]: E0209 19:37:31.276811 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:32.278439 kubelet[1378]: E0209 19:37:32.278377 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:32.823332 update_engine[1046]: I0209 19:37:32.823115 1046 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 19:37:32.824204 update_engine[1046]: I0209 19:37:32.824110 1046 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 19:37:32.824556 update_engine[1046]: E0209 19:37:32.824496 1046 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 19:37:32.824701 update_engine[1046]: I0209 19:37:32.824676 1046 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 19:37:33.114504 kubelet[1378]: E0209 19:37:33.114264 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:33.280011 kubelet[1378]: E0209 19:37:33.279945 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:34.280935 kubelet[1378]: E0209 19:37:34.280860 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:35.282025 kubelet[1378]: E0209 19:37:35.281871 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:37:36.282956 kubelet[1378]: E0209 19:37:36.282873 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"