Feb 9 19:32:42.011937 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:32:42.011975 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:32:42.011997 kernel: BIOS-provided physical RAM map: Feb 9 19:32:42.012010 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 9 19:32:42.012022 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 9 19:32:42.012035 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 9 19:32:42.012049 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Feb 9 19:32:42.012062 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Feb 9 19:32:42.012077 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 9 19:32:42.012089 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 9 19:32:42.012102 kernel: NX (Execute Disable) protection: active Feb 9 19:32:42.012114 kernel: SMBIOS 2.8 present. Feb 9 19:32:42.012126 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Feb 9 19:32:42.012139 kernel: Hypervisor detected: KVM Feb 9 19:32:42.012154 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 9 19:32:42.012170 kernel: kvm-clock: cpu 0, msr 3afaa001, primary cpu clock Feb 9 19:32:42.012183 kernel: kvm-clock: using sched offset of 6888317314 cycles Feb 9 19:32:42.012198 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 9 19:32:42.012212 kernel: tsc: Detected 1996.249 MHz processor Feb 9 19:32:42.012226 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:32:42.012241 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:32:42.012254 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Feb 9 19:32:42.012268 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:32:42.012284 kernel: ACPI: Early table checksum verification disabled Feb 9 19:32:42.012297 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Feb 9 19:32:42.012311 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:32:42.012325 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:32:42.012339 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:32:42.012353 kernel: ACPI: FACS 0x000000007FFE0000 000040 Feb 9 19:32:42.012366 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:32:42.012380 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 9 19:32:42.012393 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Feb 9 19:32:42.012409 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Feb 9 19:32:42.012423 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Feb 9 19:32:42.012436 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Feb 9 19:32:42.012449 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Feb 9 19:32:42.012462 kernel: No NUMA configuration found Feb 9 19:32:42.012475 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Feb 9 19:32:42.012489 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Feb 9 19:32:42.012502 kernel: Zone ranges: Feb 9 19:32:42.012523 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:32:42.012538 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Feb 9 19:32:42.012551 kernel: Normal empty Feb 9 19:32:42.012566 kernel: Movable zone start for each node Feb 9 19:32:42.012580 kernel: Early memory node ranges Feb 9 19:32:42.012594 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 9 19:32:42.013676 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Feb 9 19:32:42.013693 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Feb 9 19:32:42.013709 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:32:42.013723 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 9 19:32:42.013738 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Feb 9 19:32:42.013752 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 9 19:32:42.013766 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 9 19:32:42.013780 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:32:42.013795 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 9 19:32:42.013812 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 9 19:32:42.013826 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:32:42.013840 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 9 19:32:42.013855 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 9 19:32:42.013869 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:32:42.013883 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:32:42.013897 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Feb 9 19:32:42.013911 kernel: Booting paravirtualized kernel on KVM Feb 9 19:32:42.013926 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:32:42.013940 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:32:42.013957 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:32:42.013972 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:32:42.013986 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:32:42.014000 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Feb 9 19:32:42.014014 kernel: kvm-guest: PV spinlocks disabled, no host support Feb 9 19:32:42.014028 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Feb 9 19:32:42.014042 kernel: Policy zone: DMA32 Feb 9 19:32:42.014059 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:32:42.014078 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:32:42.014092 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 19:32:42.014106 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:32:42.014121 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:32:42.014135 kernel: Memory: 1975340K/2096620K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121020K reserved, 0K cma-reserved) Feb 9 19:32:42.014150 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:32:42.014164 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:32:42.014178 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:32:42.014194 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:32:42.014210 kernel: rcu: RCU event tracing is enabled. Feb 9 19:32:42.014225 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:32:42.014239 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:32:42.014254 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:32:42.014268 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:32:42.014282 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:32:42.014296 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 9 19:32:42.014307 kernel: Console: colour VGA+ 80x25 Feb 9 19:32:42.014318 kernel: printk: console [tty0] enabled Feb 9 19:32:42.014328 kernel: printk: console [ttyS0] enabled Feb 9 19:32:42.014337 kernel: ACPI: Core revision 20210730 Feb 9 19:32:42.014346 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:32:42.014356 kernel: x2apic enabled Feb 9 19:32:42.014364 kernel: Switched APIC routing to physical x2apic. Feb 9 19:32:42.014371 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 9 19:32:42.014379 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 9 19:32:42.014387 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Feb 9 19:32:42.014394 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Feb 9 19:32:42.014404 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Feb 9 19:32:42.014411 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:32:42.014419 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 19:32:42.014427 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:32:42.014434 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:32:42.014442 kernel: Speculative Store Bypass: Vulnerable Feb 9 19:32:42.014449 kernel: x86/fpu: x87 FPU will use FXSAVE Feb 9 19:32:42.014457 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:32:42.014464 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:32:42.014473 kernel: LSM: Security Framework initializing Feb 9 19:32:42.014481 kernel: SELinux: Initializing. Feb 9 19:32:42.014488 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 19:32:42.014496 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 9 19:32:42.014504 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Feb 9 19:32:42.014512 kernel: Performance Events: AMD PMU driver. Feb 9 19:32:42.014519 kernel: ... version: 0 Feb 9 19:32:42.014527 kernel: ... bit width: 48 Feb 9 19:32:42.014535 kernel: ... generic registers: 4 Feb 9 19:32:42.014550 kernel: ... value mask: 0000ffffffffffff Feb 9 19:32:42.014558 kernel: ... max period: 00007fffffffffff Feb 9 19:32:42.014567 kernel: ... fixed-purpose events: 0 Feb 9 19:32:42.014575 kernel: ... event mask: 000000000000000f Feb 9 19:32:42.014582 kernel: signal: max sigframe size: 1440 Feb 9 19:32:42.014590 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:32:42.014598 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:32:42.014619 kernel: x86: Booting SMP configuration: Feb 9 19:32:42.014630 kernel: .... node #0, CPUs: #1 Feb 9 19:32:42.014637 kernel: kvm-clock: cpu 1, msr 3afaa041, secondary cpu clock Feb 9 19:32:42.014645 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Feb 9 19:32:42.014653 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:32:42.014661 kernel: smpboot: Max logical packages: 2 Feb 9 19:32:42.014669 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Feb 9 19:32:42.014677 kernel: devtmpfs: initialized Feb 9 19:32:42.014685 kernel: x86/mm: Memory block size: 128MB Feb 9 19:32:42.014693 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:32:42.014703 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:32:42.014712 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:32:42.014720 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:32:42.014727 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:32:42.014735 kernel: audit: type=2000 audit(1707507161.163:1): state=initialized audit_enabled=0 res=1 Feb 9 19:32:42.014743 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:32:42.014751 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:32:42.014759 kernel: cpuidle: using governor menu Feb 9 19:32:42.014767 kernel: ACPI: bus type PCI registered Feb 9 19:32:42.014776 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:32:42.014784 kernel: dca service started, version 1.12.1 Feb 9 19:32:42.014792 kernel: PCI: Using configuration type 1 for base access Feb 9 19:32:42.014800 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:32:42.014808 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:32:42.014816 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:32:42.014825 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:32:42.014832 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:32:42.014840 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:32:42.014850 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:32:42.014858 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:32:42.014866 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:32:42.014874 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 19:32:42.014882 kernel: ACPI: Interpreter enabled Feb 9 19:32:42.014890 kernel: ACPI: PM: (supports S0 S3 S5) Feb 9 19:32:42.014898 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:32:42.014906 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:32:42.014914 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 9 19:32:42.014924 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 9 19:32:42.015063 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 9 19:32:42.015149 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 9 19:32:42.015161 kernel: acpiphp: Slot [3] registered Feb 9 19:32:42.015170 kernel: acpiphp: Slot [4] registered Feb 9 19:32:42.015178 kernel: acpiphp: Slot [5] registered Feb 9 19:32:42.015186 kernel: acpiphp: Slot [6] registered Feb 9 19:32:42.015197 kernel: acpiphp: Slot [7] registered Feb 9 19:32:42.015204 kernel: acpiphp: Slot [8] registered Feb 9 19:32:42.015212 kernel: acpiphp: Slot [9] registered Feb 9 19:32:42.015220 kernel: acpiphp: Slot [10] registered Feb 9 19:32:42.015228 kernel: acpiphp: Slot [11] registered Feb 9 19:32:42.015236 kernel: acpiphp: Slot [12] registered Feb 9 19:32:42.015244 kernel: acpiphp: Slot [13] registered Feb 9 19:32:42.015252 kernel: acpiphp: Slot [14] registered Feb 9 19:32:42.015260 kernel: acpiphp: Slot [15] registered Feb 9 19:32:42.015267 kernel: acpiphp: Slot [16] registered Feb 9 19:32:42.015277 kernel: acpiphp: Slot [17] registered Feb 9 19:32:42.015285 kernel: acpiphp: Slot [18] registered Feb 9 19:32:42.015292 kernel: acpiphp: Slot [19] registered Feb 9 19:32:42.015300 kernel: acpiphp: Slot [20] registered Feb 9 19:32:42.015308 kernel: acpiphp: Slot [21] registered Feb 9 19:32:42.015316 kernel: acpiphp: Slot [22] registered Feb 9 19:32:42.015324 kernel: acpiphp: Slot [23] registered Feb 9 19:32:42.015332 kernel: acpiphp: Slot [24] registered Feb 9 19:32:42.015339 kernel: acpiphp: Slot [25] registered Feb 9 19:32:42.015349 kernel: acpiphp: Slot [26] registered Feb 9 19:32:42.015357 kernel: acpiphp: Slot [27] registered Feb 9 19:32:42.015364 kernel: acpiphp: Slot [28] registered Feb 9 19:32:42.015372 kernel: acpiphp: Slot [29] registered Feb 9 19:32:42.015380 kernel: acpiphp: Slot [30] registered Feb 9 19:32:42.015388 kernel: acpiphp: Slot [31] registered Feb 9 19:32:42.015396 kernel: PCI host bridge to bus 0000:00 Feb 9 19:32:42.015501 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 9 19:32:42.015577 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 9 19:32:42.019701 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 9 19:32:42.019782 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 9 19:32:42.019857 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 9 19:32:42.019929 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 9 19:32:42.020046 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 9 19:32:42.020141 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 9 19:32:42.020239 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 9 19:32:42.020324 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Feb 9 19:32:42.020406 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 9 19:32:42.020488 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 9 19:32:42.020570 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 9 19:32:42.020670 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 9 19:32:42.020763 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 9 19:32:42.020850 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 9 19:32:42.020931 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 9 19:32:42.021047 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 9 19:32:42.021147 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 9 19:32:42.021242 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 9 19:32:42.021332 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Feb 9 19:32:42.021426 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Feb 9 19:32:42.021517 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 9 19:32:42.021643 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 9 19:32:42.021738 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Feb 9 19:32:42.021828 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Feb 9 19:32:42.021916 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 9 19:32:42.022006 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Feb 9 19:32:42.022108 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 9 19:32:42.022199 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 9 19:32:42.022291 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Feb 9 19:32:42.022378 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 9 19:32:42.022474 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Feb 9 19:32:42.022559 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Feb 9 19:32:42.024694 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 9 19:32:42.024799 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Feb 9 19:32:42.024884 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Feb 9 19:32:42.024967 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 9 19:32:42.024980 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 9 19:32:42.024989 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 9 19:32:42.024997 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 9 19:32:42.025033 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 9 19:32:42.025041 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 9 19:32:42.025052 kernel: iommu: Default domain type: Translated Feb 9 19:32:42.025061 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:32:42.025155 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 9 19:32:42.025244 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 9 19:32:42.025333 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 9 19:32:42.025345 kernel: vgaarb: loaded Feb 9 19:32:42.025354 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:32:42.025362 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:32:42.025371 kernel: PTP clock support registered Feb 9 19:32:42.025383 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:32:42.025392 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 9 19:32:42.025401 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 9 19:32:42.025409 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Feb 9 19:32:42.025417 kernel: clocksource: Switched to clocksource kvm-clock Feb 9 19:32:42.025426 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:32:42.025435 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:32:42.025444 kernel: pnp: PnP ACPI init Feb 9 19:32:42.025538 kernel: pnp 00:03: [dma 2] Feb 9 19:32:42.025555 kernel: pnp: PnP ACPI: found 5 devices Feb 9 19:32:42.025564 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:32:42.025573 kernel: NET: Registered PF_INET protocol family Feb 9 19:32:42.025582 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 19:32:42.025591 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 9 19:32:42.025680 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:32:42.025691 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:32:42.025700 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 9 19:32:42.025712 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 9 19:32:42.025720 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 19:32:42.025729 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 9 19:32:42.025738 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:32:42.025746 kernel: NET: Registered PF_XDP protocol family Feb 9 19:32:42.025831 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 9 19:32:42.025913 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 9 19:32:42.025989 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 9 19:32:42.026064 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 9 19:32:42.026143 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 9 19:32:42.026231 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 9 19:32:42.026318 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 9 19:32:42.026397 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 9 19:32:42.026410 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:32:42.026418 kernel: Initialise system trusted keyrings Feb 9 19:32:42.026427 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 9 19:32:42.026438 kernel: Key type asymmetric registered Feb 9 19:32:42.026446 kernel: Asymmetric key parser 'x509' registered Feb 9 19:32:42.026454 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:32:42.026463 kernel: io scheduler mq-deadline registered Feb 9 19:32:42.026471 kernel: io scheduler kyber registered Feb 9 19:32:42.026479 kernel: io scheduler bfq registered Feb 9 19:32:42.026487 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:32:42.026497 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 9 19:32:42.026505 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 9 19:32:42.026513 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 9 19:32:42.026523 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 9 19:32:42.026531 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:32:42.026539 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:32:42.026547 kernel: random: crng init done Feb 9 19:32:42.026555 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 9 19:32:42.026563 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 9 19:32:42.026571 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 9 19:32:42.026579 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 9 19:32:42.026690 kernel: rtc_cmos 00:04: RTC can wake from S4 Feb 9 19:32:42.026771 kernel: rtc_cmos 00:04: registered as rtc0 Feb 9 19:32:42.026844 kernel: rtc_cmos 00:04: setting system clock to 2024-02-09T19:32:41 UTC (1707507161) Feb 9 19:32:42.026915 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Feb 9 19:32:42.026927 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:32:42.026935 kernel: Segment Routing with IPv6 Feb 9 19:32:42.026943 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:32:42.026951 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:32:42.026959 kernel: Key type dns_resolver registered Feb 9 19:32:42.026970 kernel: IPI shorthand broadcast: enabled Feb 9 19:32:42.026978 kernel: sched_clock: Marking stable (723184637, 128284540)->(905146372, -53677195) Feb 9 19:32:42.026986 kernel: registered taskstats version 1 Feb 9 19:32:42.026994 kernel: Loading compiled-in X.509 certificates Feb 9 19:32:42.027002 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:32:42.027011 kernel: Key type .fscrypt registered Feb 9 19:32:42.027018 kernel: Key type fscrypt-provisioning registered Feb 9 19:32:42.027027 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 19:32:42.027036 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:32:42.027045 kernel: ima: No architecture policies found Feb 9 19:32:42.027052 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:32:42.027060 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:32:42.027068 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:32:42.027076 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:32:42.027084 kernel: Run /init as init process Feb 9 19:32:42.027092 kernel: with arguments: Feb 9 19:32:42.027100 kernel: /init Feb 9 19:32:42.027109 kernel: with environment: Feb 9 19:32:42.027117 kernel: HOME=/ Feb 9 19:32:42.027125 kernel: TERM=linux Feb 9 19:32:42.027133 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:32:42.027143 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:32:42.027154 systemd[1]: Detected virtualization kvm. Feb 9 19:32:42.027163 systemd[1]: Detected architecture x86-64. Feb 9 19:32:42.027172 systemd[1]: Running in initrd. Feb 9 19:32:42.027182 systemd[1]: No hostname configured, using default hostname. Feb 9 19:32:42.027190 systemd[1]: Hostname set to . Feb 9 19:32:42.027199 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:32:42.027208 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:32:42.027216 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:32:42.027225 systemd[1]: Reached target cryptsetup.target. Feb 9 19:32:42.027233 systemd[1]: Reached target paths.target. Feb 9 19:32:42.027242 systemd[1]: Reached target slices.target. Feb 9 19:32:42.027253 systemd[1]: Reached target swap.target. Feb 9 19:32:42.027261 systemd[1]: Reached target timers.target. Feb 9 19:32:42.027270 systemd[1]: Listening on iscsid.socket. Feb 9 19:32:42.027278 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:32:42.027287 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:32:42.027295 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:32:42.027304 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:32:42.027312 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:32:42.027323 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:32:42.027331 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:32:42.027340 systemd[1]: Reached target sockets.target. Feb 9 19:32:42.027349 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:32:42.027366 systemd[1]: Finished network-cleanup.service. Feb 9 19:32:42.027376 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:32:42.027388 systemd[1]: Starting systemd-journald.service... Feb 9 19:32:42.027396 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:32:42.027405 systemd[1]: Starting systemd-resolved.service... Feb 9 19:32:42.027414 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:32:42.027423 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:32:42.027431 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:32:42.027443 systemd-journald[186]: Journal started Feb 9 19:32:42.027488 systemd-journald[186]: Runtime Journal (/run/log/journal/384fdd7dd05e4cfd9dce93723e06e4ad) is 4.9M, max 39.5M, 34.5M free. Feb 9 19:32:41.990650 systemd-modules-load[187]: Inserted module 'overlay' Feb 9 19:32:42.063037 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:32:42.063063 kernel: Bridge firewalling registered Feb 9 19:32:42.063081 systemd[1]: Started systemd-journald.service. Feb 9 19:32:42.063095 kernel: audit: type=1130 audit(1707507162.050:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.038052 systemd-resolved[188]: Positive Trust Anchors: Feb 9 19:32:42.067148 kernel: audit: type=1130 audit(1707507162.062:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.038062 systemd-resolved[188]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:32:42.071563 kernel: audit: type=1130 audit(1707507162.066:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.038097 systemd-resolved[188]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:32:42.078387 kernel: audit: type=1130 audit(1707507162.071:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.078408 kernel: SCSI subsystem initialized Feb 9 19:32:42.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.041050 systemd-resolved[188]: Defaulting to hostname 'linux'. Feb 9 19:32:42.044687 systemd-modules-load[187]: Inserted module 'br_netfilter' Feb 9 19:32:42.063539 systemd[1]: Started systemd-resolved.service. Feb 9 19:32:42.067913 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:32:42.099701 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:32:42.099729 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:32:42.099740 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:32:42.072187 systemd[1]: Reached target nss-lookup.target. Feb 9 19:32:42.079834 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:32:42.081315 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:32:42.095543 systemd-modules-load[187]: Inserted module 'dm_multipath' Feb 9 19:32:42.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.103500 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:32:42.107879 kernel: audit: type=1130 audit(1707507162.103:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.107637 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:32:42.112097 kernel: audit: type=1130 audit(1707507162.107:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.108506 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:32:42.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.113566 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:32:42.119106 kernel: audit: type=1130 audit(1707507162.111:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.114779 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:32:42.129075 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:32:42.134680 kernel: audit: type=1130 audit(1707507162.129:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.134746 dracut-cmdline[205]: dracut-dracut-053 Feb 9 19:32:42.136899 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:32:42.206673 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:32:42.220777 kernel: iscsi: registered transport (tcp) Feb 9 19:32:42.245317 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:32:42.245388 kernel: QLogic iSCSI HBA Driver Feb 9 19:32:42.301664 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:32:42.303347 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:32:42.313832 kernel: audit: type=1130 audit(1707507162.301:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.364733 kernel: raid6: sse2x4 gen() 12786 MB/s Feb 9 19:32:42.381721 kernel: raid6: sse2x4 xor() 4647 MB/s Feb 9 19:32:42.398723 kernel: raid6: sse2x2 gen() 13927 MB/s Feb 9 19:32:42.415712 kernel: raid6: sse2x2 xor() 8464 MB/s Feb 9 19:32:42.432716 kernel: raid6: sse2x1 gen() 10817 MB/s Feb 9 19:32:42.450534 kernel: raid6: sse2x1 xor() 6833 MB/s Feb 9 19:32:42.450671 kernel: raid6: using algorithm sse2x2 gen() 13927 MB/s Feb 9 19:32:42.450702 kernel: raid6: .... xor() 8464 MB/s, rmw enabled Feb 9 19:32:42.451352 kernel: raid6: using ssse3x2 recovery algorithm Feb 9 19:32:42.467321 kernel: xor: measuring software checksum speed Feb 9 19:32:42.467393 kernel: prefetch64-sse : 18463 MB/sec Feb 9 19:32:42.469741 kernel: generic_sse : 16818 MB/sec Feb 9 19:32:42.469803 kernel: xor: using function: prefetch64-sse (18463 MB/sec) Feb 9 19:32:42.589674 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:32:42.607974 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:32:42.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.608000 audit: BPF prog-id=7 op=LOAD Feb 9 19:32:42.609000 audit: BPF prog-id=8 op=LOAD Feb 9 19:32:42.610153 systemd[1]: Starting systemd-udevd.service... Feb 9 19:32:42.643923 systemd-udevd[386]: Using default interface naming scheme 'v252'. Feb 9 19:32:42.656255 systemd[1]: Started systemd-udevd.service. Feb 9 19:32:42.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.664870 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:32:42.689375 dracut-pre-trigger[398]: rd.md=0: removing MD RAID activation Feb 9 19:32:42.733288 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:32:42.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.736033 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:32:42.790909 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:32:42.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:42.872711 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Feb 9 19:32:42.885496 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 9 19:32:42.885580 kernel: GPT:17805311 != 41943039 Feb 9 19:32:42.885592 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 9 19:32:42.885618 kernel: GPT:17805311 != 41943039 Feb 9 19:32:42.886221 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 9 19:32:42.888112 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:32:42.905628 kernel: libata version 3.00 loaded. Feb 9 19:32:42.909689 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 9 19:32:42.910640 kernel: scsi host0: ata_piix Feb 9 19:32:42.911753 kernel: scsi host1: ata_piix Feb 9 19:32:42.911889 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Feb 9 19:32:42.911902 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Feb 9 19:32:42.932643 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (434) Feb 9 19:32:42.944639 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:32:42.981157 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:32:42.984310 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:32:42.984858 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:32:42.990428 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:32:42.991831 systemd[1]: Starting disk-uuid.service... Feb 9 19:32:43.003117 disk-uuid[459]: Primary Header is updated. Feb 9 19:32:43.003117 disk-uuid[459]: Secondary Entries is updated. Feb 9 19:32:43.003117 disk-uuid[459]: Secondary Header is updated. Feb 9 19:32:43.017701 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:32:43.033654 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:32:44.043672 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 9 19:32:44.044063 disk-uuid[460]: The operation has completed successfully. Feb 9 19:32:44.095499 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:32:44.097714 systemd[1]: Finished disk-uuid.service. Feb 9 19:32:44.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:44.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:44.126456 systemd[1]: Starting verity-setup.service... Feb 9 19:32:44.147650 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Feb 9 19:32:44.285785 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:32:44.291084 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:32:44.297785 systemd[1]: Finished verity-setup.service. Feb 9 19:32:44.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:44.564895 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:32:44.566383 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:32:44.569205 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:32:44.571040 systemd[1]: Starting ignition-setup.service... Feb 9 19:32:44.573959 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:32:44.660137 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:32:44.660239 kernel: BTRFS info (device vda6): using free space tree Feb 9 19:32:44.660271 kernel: BTRFS info (device vda6): has skinny extents Feb 9 19:32:44.746513 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:32:44.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:44.750000 audit: BPF prog-id=9 op=LOAD Feb 9 19:32:44.753395 systemd[1]: Starting systemd-networkd.service... Feb 9 19:32:44.770475 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:32:44.800209 systemd[1]: Finished ignition-setup.service. Feb 9 19:32:44.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:44.803027 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:32:44.817487 systemd-networkd[626]: lo: Link UP Feb 9 19:32:44.817500 systemd-networkd[626]: lo: Gained carrier Feb 9 19:32:44.818841 systemd-networkd[626]: Enumeration completed Feb 9 19:32:44.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:44.819562 systemd-networkd[626]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:32:44.820817 systemd[1]: Started systemd-networkd.service. Feb 9 19:32:44.822107 systemd-networkd[626]: eth0: Link UP Feb 9 19:32:44.822113 systemd-networkd[626]: eth0: Gained carrier Feb 9 19:32:44.822710 systemd[1]: Reached target network.target. Feb 9 19:32:44.829191 systemd[1]: Starting iscsiuio.service... Feb 9 19:32:44.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:44.838648 systemd[1]: Started iscsiuio.service. Feb 9 19:32:44.840197 systemd[1]: Starting iscsid.service... Feb 9 19:32:44.844780 systemd-networkd[626]: eth0: DHCPv4 address 172.24.4.156/24, gateway 172.24.4.1 acquired from 172.24.4.1 Feb 9 19:32:44.846249 iscsid[637]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:32:44.846249 iscsid[637]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:32:44.846249 iscsid[637]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:32:44.846249 iscsid[637]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:32:44.846249 iscsid[637]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:32:44.846249 iscsid[637]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:32:44.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:44.846473 systemd[1]: Started iscsid.service. Feb 9 19:32:44.848415 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:32:44.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:44.861473 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:32:44.862036 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:32:44.862534 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:32:44.863007 systemd[1]: Reached target remote-fs.target. Feb 9 19:32:44.864923 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:32:44.878354 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:32:44.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:45.155680 ignition[632]: Ignition 2.14.0 Feb 9 19:32:45.155735 ignition[632]: Stage: fetch-offline Feb 9 19:32:45.155861 ignition[632]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:32:45.155949 ignition[632]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:32:45.158449 ignition[632]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:32:45.158858 ignition[632]: parsed url from cmdline: "" Feb 9 19:32:45.162205 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:32:45.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:45.158873 ignition[632]: no config URL provided Feb 9 19:32:45.158896 ignition[632]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:32:45.166687 systemd[1]: Starting ignition-fetch.service... Feb 9 19:32:45.158981 ignition[632]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:32:45.159003 ignition[632]: failed to fetch config: resource requires networking Feb 9 19:32:45.159513 ignition[632]: Ignition finished successfully Feb 9 19:32:45.184242 ignition[655]: Ignition 2.14.0 Feb 9 19:32:45.184269 ignition[655]: Stage: fetch Feb 9 19:32:45.184508 ignition[655]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:32:45.184553 ignition[655]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:32:45.186688 ignition[655]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:32:45.186901 ignition[655]: parsed url from cmdline: "" Feb 9 19:32:45.186910 ignition[655]: no config URL provided Feb 9 19:32:45.186924 ignition[655]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:32:45.186943 ignition[655]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:32:45.194116 ignition[655]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Feb 9 19:32:45.194178 ignition[655]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Feb 9 19:32:45.194219 ignition[655]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Feb 9 19:32:45.406907 ignition[655]: GET result: OK Feb 9 19:32:45.407057 ignition[655]: parsing config with SHA512: 799ffb7a52f3968b278537b7ed1d2c511b8e2aa38b4ae8b3d9d188c8dc554e74a889d70f1eb59292d310a97af852ac7978f0fc1a012ee691b00ed542f2792fcc Feb 9 19:32:45.474866 unknown[655]: fetched base config from "system" Feb 9 19:32:45.475845 unknown[655]: fetched base config from "system" Feb 9 19:32:45.475864 unknown[655]: fetched user config from "openstack" Feb 9 19:32:45.476991 ignition[655]: fetch: fetch complete Feb 9 19:32:45.477022 ignition[655]: fetch: fetch passed Feb 9 19:32:45.477140 ignition[655]: Ignition finished successfully Feb 9 19:32:45.483409 systemd[1]: Finished ignition-fetch.service. Feb 9 19:32:45.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:45.486459 systemd[1]: Starting ignition-kargs.service... Feb 9 19:32:45.507328 ignition[661]: Ignition 2.14.0 Feb 9 19:32:45.507355 ignition[661]: Stage: kargs Feb 9 19:32:45.507669 ignition[661]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:32:45.520329 systemd[1]: Finished ignition-kargs.service. Feb 9 19:32:45.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:45.507711 ignition[661]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:32:45.509905 ignition[661]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:32:45.512667 ignition[661]: kargs: kargs passed Feb 9 19:32:45.524953 systemd[1]: Starting ignition-disks.service... Feb 9 19:32:45.512774 ignition[661]: Ignition finished successfully Feb 9 19:32:45.544964 ignition[667]: Ignition 2.14.0 Feb 9 19:32:45.544989 ignition[667]: Stage: disks Feb 9 19:32:45.545279 ignition[667]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:32:45.545321 ignition[667]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:32:45.550870 systemd[1]: Finished ignition-disks.service. Feb 9 19:32:45.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:45.547156 ignition[667]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:32:45.552393 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:32:45.549181 ignition[667]: disks: disks passed Feb 9 19:32:45.553876 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:32:45.549254 ignition[667]: Ignition finished successfully Feb 9 19:32:45.555582 systemd[1]: Reached target local-fs.target. Feb 9 19:32:45.557146 systemd[1]: Reached target sysinit.target. Feb 9 19:32:45.558575 systemd[1]: Reached target basic.target. Feb 9 19:32:45.562108 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:32:45.592252 systemd-fsck[674]: ROOT: clean, 602/1628000 files, 124051/1617920 blocks Feb 9 19:32:45.603072 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:32:45.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:45.606228 systemd[1]: Mounting sysroot.mount... Feb 9 19:32:45.627706 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:32:45.629564 systemd[1]: Mounted sysroot.mount. Feb 9 19:32:45.632037 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:32:45.638220 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:32:45.640880 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 9 19:32:45.645327 systemd[1]: Starting flatcar-openstack-hostname.service... Feb 9 19:32:45.652038 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:32:45.652922 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:32:45.664049 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:32:45.674106 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:32:45.678531 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:32:45.696055 initrd-setup-root[686]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:32:45.711647 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (681) Feb 9 19:32:45.720572 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:32:45.720690 kernel: BTRFS info (device vda6): using free space tree Feb 9 19:32:45.720709 kernel: BTRFS info (device vda6): has skinny extents Feb 9 19:32:45.720729 initrd-setup-root[694]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:32:45.725888 initrd-setup-root[718]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:32:45.735082 initrd-setup-root[726]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:32:45.741521 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:32:46.094433 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:32:46.125705 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 9 19:32:46.125764 kernel: audit: type=1130 audit(1707507166.095:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:46.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:46.097543 systemd[1]: Starting ignition-mount.service... Feb 9 19:32:46.120413 systemd[1]: Starting sysroot-boot.service... Feb 9 19:32:46.129155 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:32:46.129389 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:32:46.188112 ignition[749]: INFO : Ignition 2.14.0 Feb 9 19:32:46.188112 ignition[749]: INFO : Stage: mount Feb 9 19:32:46.189912 ignition[749]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:32:46.189912 ignition[749]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:32:46.189912 ignition[749]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:32:46.199158 kernel: audit: type=1130 audit(1707507166.193:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:46.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:46.199232 ignition[749]: INFO : mount: mount passed Feb 9 19:32:46.199232 ignition[749]: INFO : Ignition finished successfully Feb 9 19:32:46.193239 systemd[1]: Finished ignition-mount.service. Feb 9 19:32:46.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:46.205937 systemd[1]: Finished sysroot-boot.service. Feb 9 19:32:46.210670 kernel: audit: type=1130 audit(1707507166.205:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:46.224170 coreos-metadata[680]: Feb 09 19:32:46.224 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Feb 9 19:32:46.239824 coreos-metadata[680]: Feb 09 19:32:46.239 INFO Fetch successful Feb 9 19:32:46.239824 coreos-metadata[680]: Feb 09 19:32:46.239 INFO wrote hostname ci-3510-3-2-4-d828aa07b9.novalocal to /sysroot/etc/hostname Feb 9 19:32:46.244065 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Feb 9 19:32:46.244203 systemd[1]: Finished flatcar-openstack-hostname.service. Feb 9 19:32:46.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:46.246476 systemd[1]: Starting ignition-files.service... Feb 9 19:32:46.254636 kernel: audit: type=1130 audit(1707507166.244:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:46.254662 kernel: audit: type=1131 audit(1707507166.244:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:46.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:46.258032 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:32:46.323743 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (758) Feb 9 19:32:46.347504 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:32:46.347646 kernel: BTRFS info (device vda6): using free space tree Feb 9 19:32:46.347675 kernel: BTRFS info (device vda6): has skinny extents Feb 9 19:32:46.362444 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:32:46.385269 ignition[777]: INFO : Ignition 2.14.0 Feb 9 19:32:46.385269 ignition[777]: INFO : Stage: files Feb 9 19:32:46.388028 ignition[777]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:32:46.388028 ignition[777]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:32:46.388028 ignition[777]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:32:46.394226 ignition[777]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:32:46.394226 ignition[777]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:32:46.394226 ignition[777]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:32:46.401898 ignition[777]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:32:46.405287 ignition[777]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:32:46.405287 ignition[777]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:32:46.405148 unknown[777]: wrote ssh authorized keys file for user: core Feb 9 19:32:46.411301 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:32:46.411301 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 19:32:46.691188 systemd-networkd[626]: eth0: Gained IPv6LL Feb 9 19:32:46.835443 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:32:47.743577 ignition[777]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 19:32:47.745536 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:32:47.746639 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:32:47.751586 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:32:48.100887 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:32:48.573976 ignition[777]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 19:32:48.573976 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:32:48.618212 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:32:48.620329 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:32:48.768533 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 19:32:49.756220 ignition[777]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 9 19:32:49.756220 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:32:49.761754 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:32:49.761754 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:32:49.866874 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 19:32:52.021845 ignition[777]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 9 19:32:52.021845 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:32:52.027679 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:32:52.027679 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:32:52.027679 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:32:52.027679 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:32:52.069637 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:32:52.071698 ignition[777]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:32:52.071698 ignition[777]: INFO : files: op(a): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:32:52.075468 ignition[777]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Feb 9 19:32:52.078388 ignition[777]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Feb 9 19:32:52.078388 ignition[777]: INFO : files: op(a): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 9 19:32:52.078388 ignition[777]: INFO : files: op(c): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:32:52.078388 ignition[777]: INFO : files: op(c): op(d): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:32:52.078388 ignition[777]: INFO : files: op(c): op(d): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:32:52.078388 ignition[777]: INFO : files: op(c): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:32:52.078388 ignition[777]: INFO : files: op(e): [started] processing unit "prepare-critools.service" Feb 9 19:32:52.078388 ignition[777]: INFO : files: op(e): op(f): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:32:52.078388 ignition[777]: INFO : files: op(e): op(f): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:32:52.078388 ignition[777]: INFO : files: op(e): [finished] processing unit "prepare-critools.service" Feb 9 19:32:52.078388 ignition[777]: INFO : files: op(10): [started] processing unit "coreos-metadata.service" Feb 9 19:32:52.125385 kernel: audit: type=1130 audit(1707507172.104:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.125568 ignition[777]: INFO : files: op(10): op(11): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Feb 9 19:32:52.125568 ignition[777]: INFO : files: op(10): op(11): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Feb 9 19:32:52.125568 ignition[777]: INFO : files: op(10): [finished] processing unit "coreos-metadata.service" Feb 9 19:32:52.125568 ignition[777]: INFO : files: op(12): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:32:52.125568 ignition[777]: INFO : files: op(12): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 9 19:32:52.125568 ignition[777]: INFO : files: op(13): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:32:52.125568 ignition[777]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:32:52.125568 ignition[777]: INFO : files: op(14): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:32:52.125568 ignition[777]: INFO : files: op(14): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:32:52.125568 ignition[777]: INFO : files: createResultFile: createFiles: op(15): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:32:52.125568 ignition[777]: INFO : files: createResultFile: createFiles: op(15): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:32:52.125568 ignition[777]: INFO : files: files passed Feb 9 19:32:52.125568 ignition[777]: INFO : Ignition finished successfully Feb 9 19:32:52.164566 kernel: audit: type=1130 audit(1707507172.135:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.164615 kernel: audit: type=1131 audit(1707507172.135:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.164643 kernel: audit: type=1130 audit(1707507172.150:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.101428 systemd[1]: Finished ignition-files.service. Feb 9 19:32:52.109712 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:32:52.166162 initrd-setup-root-after-ignition[802]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:32:52.117790 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:32:52.119772 systemd[1]: Starting ignition-quench.service... Feb 9 19:32:52.131888 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:32:52.132108 systemd[1]: Finished ignition-quench.service. Feb 9 19:32:52.141721 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:32:52.151566 systemd[1]: Reached target ignition-complete.target. Feb 9 19:32:52.158414 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:32:52.177344 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:32:52.178201 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:32:52.186165 kernel: audit: type=1130 audit(1707507172.178:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.186199 kernel: audit: type=1131 audit(1707507172.178:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.178914 systemd[1]: Reached target initrd-fs.target. Feb 9 19:32:52.187313 systemd[1]: Reached target initrd.target. Feb 9 19:32:52.188020 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:32:52.190436 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:32:52.207353 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:32:52.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.209459 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:32:52.214011 kernel: audit: type=1130 audit(1707507172.207:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.220821 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:32:52.222047 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:32:52.223154 systemd[1]: Stopped target timers.target. Feb 9 19:32:52.224222 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:32:52.224989 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:32:52.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.229665 kernel: audit: type=1131 audit(1707507172.225:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.227195 systemd[1]: Stopped target initrd.target. Feb 9 19:32:52.230700 systemd[1]: Stopped target basic.target. Feb 9 19:32:52.237037 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:32:52.238166 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:32:52.239489 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:32:52.240718 systemd[1]: Stopped target remote-fs.target. Feb 9 19:32:52.241872 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:32:52.243043 systemd[1]: Stopped target sysinit.target. Feb 9 19:32:52.244156 systemd[1]: Stopped target local-fs.target. Feb 9 19:32:52.245132 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:32:52.246139 systemd[1]: Stopped target swap.target. Feb 9 19:32:52.247109 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:32:52.257942 kernel: audit: type=1131 audit(1707507172.248:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.247364 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:32:52.249086 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:32:52.269258 kernel: audit: type=1131 audit(1707507172.259:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.258789 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:32:52.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.259076 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:32:52.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.260327 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:32:52.260521 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:32:52.270138 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:32:52.270354 systemd[1]: Stopped ignition-files.service. Feb 9 19:32:52.281175 iscsid[637]: iscsid shutting down. Feb 9 19:32:52.272722 systemd[1]: Stopping ignition-mount.service... Feb 9 19:32:52.273881 systemd[1]: Stopping iscsid.service... Feb 9 19:32:52.281559 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:32:52.282534 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:32:52.282812 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:32:52.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.288367 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:32:52.289518 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:32:52.290000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.294546 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:32:52.295555 systemd[1]: Stopped iscsid.service. Feb 9 19:32:52.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.299073 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:32:52.300174 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:32:52.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.303767 ignition[815]: INFO : Ignition 2.14.0 Feb 9 19:32:52.303767 ignition[815]: INFO : Stage: umount Feb 9 19:32:52.305447 ignition[815]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:32:52.305447 ignition[815]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 9 19:32:52.305447 ignition[815]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 9 19:32:52.309815 ignition[815]: INFO : umount: umount passed Feb 9 19:32:52.309815 ignition[815]: INFO : Ignition finished successfully Feb 9 19:32:52.312077 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:32:52.312841 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:32:52.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.312947 systemd[1]: Stopped ignition-mount.service. Feb 9 19:32:52.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.314110 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:32:52.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.314197 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:32:52.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.315002 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:32:52.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.315042 systemd[1]: Stopped ignition-disks.service. Feb 9 19:32:52.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.315836 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:32:52.315890 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:32:52.316955 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:32:52.317017 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:32:52.317914 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:32:52.317972 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:32:52.319036 systemd[1]: Stopped target paths.target. Feb 9 19:32:52.319967 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:32:52.321857 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:32:52.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.323142 systemd[1]: Stopped target slices.target. Feb 9 19:32:52.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.324492 systemd[1]: Stopped target sockets.target. Feb 9 19:32:52.325498 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:32:52.325561 systemd[1]: Closed iscsid.socket. Feb 9 19:32:52.326591 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:32:52.326688 systemd[1]: Stopped ignition-setup.service. Feb 9 19:32:52.327802 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:32:52.327851 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:32:52.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.330733 systemd[1]: Stopping iscsiuio.service... Feb 9 19:32:52.333886 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:32:52.333986 systemd[1]: Stopped iscsiuio.service. Feb 9 19:32:52.334788 systemd[1]: Stopped target network.target. Feb 9 19:32:52.335639 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:32:52.335680 systemd[1]: Closed iscsiuio.socket. Feb 9 19:32:52.336567 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:32:52.337900 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:32:52.340652 systemd-networkd[626]: eth0: DHCPv6 lease lost Feb 9 19:32:52.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.341799 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:32:52.341912 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:32:52.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.345688 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:32:52.347000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:32:52.345876 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:32:52.348000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:32:52.348365 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:32:52.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.348416 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:32:52.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.350130 systemd[1]: Stopping network-cleanup.service... Feb 9 19:32:52.350639 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:32:52.350712 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:32:52.351225 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:32:52.351263 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:32:52.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.351894 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:32:52.351939 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:32:52.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.352538 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:32:52.355229 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:32:52.356563 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:32:52.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.356804 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:32:52.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.360791 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:32:52.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.360905 systemd[1]: Stopped network-cleanup.service. Feb 9 19:32:52.362194 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:32:52.362240 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:32:52.362937 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:32:52.362968 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:32:52.363911 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:32:52.363961 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:32:52.365154 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:32:52.365193 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:32:52.366130 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:32:52.366176 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:32:52.367919 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:32:52.375376 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 19:32:52.375472 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 19:32:52.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.380813 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:32:52.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.380873 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:32:52.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.381719 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:32:52.381779 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:32:52.383809 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 19:32:52.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:52.384308 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:32:52.384403 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:32:52.385079 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:32:52.387063 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:32:52.404112 systemd[1]: Switching root. Feb 9 19:32:52.428010 systemd-journald[186]: Journal stopped Feb 9 19:32:58.633796 systemd-journald[186]: Received SIGTERM from PID 1 (n/a). Feb 9 19:32:58.633923 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:32:58.633958 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:32:58.633986 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:32:58.634012 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:32:58.634046 kernel: SELinux: policy capability open_perms=1 Feb 9 19:32:58.634080 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:32:58.634108 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:32:58.634143 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:32:58.634168 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:32:58.634200 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:32:58.634225 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:32:58.634252 systemd[1]: Successfully loaded SELinux policy in 102.152ms. Feb 9 19:32:58.634289 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.957ms. Feb 9 19:32:58.634322 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:32:58.634352 systemd[1]: Detected virtualization kvm. Feb 9 19:32:58.634380 systemd[1]: Detected architecture x86-64. Feb 9 19:32:58.634415 systemd[1]: Detected first boot. Feb 9 19:32:58.634448 systemd[1]: Hostname set to . Feb 9 19:32:58.634477 systemd[1]: Initializing machine ID from VM UUID. Feb 9 19:32:58.634505 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:32:58.634539 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:32:58.634569 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:32:58.634599 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:32:58.634680 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:32:58.634716 kernel: kauditd_printk_skb: 49 callbacks suppressed Feb 9 19:32:58.634742 kernel: audit: type=1334 audit(1707507178.008:90): prog-id=12 op=LOAD Feb 9 19:32:58.634770 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:32:58.634803 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:32:58.634833 kernel: audit: type=1334 audit(1707507178.008:91): prog-id=3 op=UNLOAD Feb 9 19:32:58.634869 kernel: audit: type=1334 audit(1707507178.008:92): prog-id=13 op=LOAD Feb 9 19:32:58.634905 kernel: audit: type=1334 audit(1707507178.008:93): prog-id=14 op=LOAD Feb 9 19:32:58.634931 kernel: audit: type=1334 audit(1707507178.009:94): prog-id=4 op=UNLOAD Feb 9 19:32:58.634956 kernel: audit: type=1334 audit(1707507178.009:95): prog-id=5 op=UNLOAD Feb 9 19:32:58.634984 kernel: audit: type=1131 audit(1707507178.012:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.635011 kernel: audit: type=1334 audit(1707507178.019:97): prog-id=12 op=UNLOAD Feb 9 19:32:58.635040 kernel: audit: type=1130 audit(1707507178.027:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.635074 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:32:58.635104 kernel: audit: type=1131 audit(1707507178.027:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.635132 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:32:58.635163 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:32:58.635202 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 9 19:32:58.635234 systemd[1]: Created slice system-getty.slice. Feb 9 19:32:58.635263 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:32:58.635292 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:32:58.635320 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:32:58.635354 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:32:58.635399 systemd[1]: Created slice user.slice. Feb 9 19:32:58.635437 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:32:58.635467 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:32:58.635496 systemd[1]: Set up automount boot.automount. Feb 9 19:32:58.635544 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:32:58.635576 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:32:58.635683 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:32:58.635728 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:32:58.635756 systemd[1]: Reached target integritysetup.target. Feb 9 19:32:58.635785 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:32:58.635814 systemd[1]: Reached target remote-fs.target. Feb 9 19:32:58.635841 systemd[1]: Reached target slices.target. Feb 9 19:32:58.635870 systemd[1]: Reached target swap.target. Feb 9 19:32:58.635899 systemd[1]: Reached target torcx.target. Feb 9 19:32:58.635935 systemd[1]: Reached target veritysetup.target. Feb 9 19:32:58.635964 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:32:58.635992 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:32:58.636020 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:32:58.636049 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:32:58.636076 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:32:58.636104 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:32:58.636132 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:32:58.636160 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:32:58.636191 systemd[1]: Mounting media.mount... Feb 9 19:32:58.636219 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:32:58.636247 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:32:58.636276 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:32:58.636304 systemd[1]: Mounting tmp.mount... Feb 9 19:32:58.636331 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:32:58.636361 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:32:58.636389 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:32:58.636416 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:32:58.636448 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:32:58.636477 systemd[1]: Starting modprobe@drm.service... Feb 9 19:32:58.636504 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:32:58.636531 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:32:58.636560 systemd[1]: Starting modprobe@loop.service... Feb 9 19:32:58.636589 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:32:58.636678 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:32:58.636709 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:32:58.636739 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:32:58.636773 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:32:58.636803 systemd[1]: Stopped systemd-journald.service. Feb 9 19:32:58.636830 systemd[1]: Starting systemd-journald.service... Feb 9 19:32:58.636857 kernel: loop: module loaded Feb 9 19:32:58.636884 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:32:58.636911 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:32:58.636939 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:32:58.636966 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:32:58.637019 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:32:58.637060 systemd[1]: Stopped verity-setup.service. Feb 9 19:32:58.637087 kernel: fuse: init (API version 7.34) Feb 9 19:32:58.637115 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:32:58.637144 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:32:58.637172 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:32:58.637199 systemd[1]: Mounted media.mount. Feb 9 19:32:58.637227 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:32:58.637254 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:32:58.637281 systemd[1]: Mounted tmp.mount. Feb 9 19:32:58.637313 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:32:58.637342 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:32:58.637370 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:32:58.637399 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:32:58.637427 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:32:58.637455 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:32:58.637486 systemd[1]: Finished modprobe@drm.service. Feb 9 19:32:58.637515 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:32:58.637544 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:32:58.637573 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:32:58.637600 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:32:58.637669 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:32:58.637709 systemd[1]: Finished modprobe@loop.service. Feb 9 19:32:58.637737 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:32:58.637764 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:32:58.637795 systemd[1]: Reached target network-pre.target. Feb 9 19:32:58.637823 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:32:58.637851 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:32:58.637880 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:32:58.637916 systemd-journald[913]: Journal started Feb 9 19:32:58.638019 systemd-journald[913]: Runtime Journal (/run/log/journal/384fdd7dd05e4cfd9dce93723e06e4ad) is 4.9M, max 39.5M, 34.5M free. Feb 9 19:32:53.410000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:32:53.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:32:53.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:32:53.596000 audit: BPF prog-id=10 op=LOAD Feb 9 19:32:53.596000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:32:53.597000 audit: BPF prog-id=11 op=LOAD Feb 9 19:32:53.597000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:32:53.870000 audit[847]: AVC avc: denied { associate } for pid=847 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:32:53.870000 audit[847]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=830 pid=847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:53.870000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:32:53.875000 audit[847]: AVC avc: denied { associate } for pid=847 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:32:53.875000 audit[847]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=830 pid=847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:53.875000 audit: CWD cwd="/" Feb 9 19:32:53.875000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:53.875000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:53.875000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:32:58.008000 audit: BPF prog-id=12 op=LOAD Feb 9 19:32:58.008000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:32:58.008000 audit: BPF prog-id=13 op=LOAD Feb 9 19:32:58.008000 audit: BPF prog-id=14 op=LOAD Feb 9 19:32:58.009000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:32:58.009000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:32:58.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.019000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:32:58.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.197000 audit: BPF prog-id=15 op=LOAD Feb 9 19:32:58.197000 audit: BPF prog-id=16 op=LOAD Feb 9 19:32:58.197000 audit: BPF prog-id=17 op=LOAD Feb 9 19:32:58.197000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:32:58.197000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:32:58.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.630000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:32:58.630000 audit[913]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe78da8b60 a2=4000 a3=7ffe78da8bfc items=0 ppid=1 pid=913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:58.630000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:32:53.864939 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:32:58.006405 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:32:53.866489 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:32:58.006420 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 9 19:32:53.866543 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:32:58.012934 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:32:53.866703 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:32:53.866732 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:32:53.866810 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:32:53.866845 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:32:53.867385 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:32:53.867528 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:32:53.867565 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:32:53.869146 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:32:53.869238 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:32:53.869287 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:32:53.869329 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:32:53.869376 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:32:53.869414 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:53Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:32:57.579351 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:57Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:32:57.579935 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:57Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:32:57.580141 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:57Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:32:57.580482 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:57Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:32:57.580588 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:57Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:32:57.580749 /usr/lib/systemd/system-generators/torcx-generator[847]: time="2024-02-09T19:32:57Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:32:58.670259 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:32:58.676676 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:32:58.687548 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:32:58.695697 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:32:58.705700 systemd[1]: Started systemd-journald.service. Feb 9 19:32:58.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.710815 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:32:58.711834 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:32:58.714660 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:32:58.717490 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:32:58.719913 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:32:58.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.735085 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:32:58.735819 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:32:58.740136 systemd-journald[913]: Time spent on flushing to /var/log/journal/384fdd7dd05e4cfd9dce93723e06e4ad is 35.950ms for 1126 entries. Feb 9 19:32:58.740136 systemd-journald[913]: System Journal (/var/log/journal/384fdd7dd05e4cfd9dce93723e06e4ad) is 8.0M, max 584.8M, 576.8M free. Feb 9 19:32:58.787790 systemd-journald[913]: Received client request to flush runtime journal. Feb 9 19:32:58.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.747593 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:32:58.765080 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:32:58.766958 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:32:58.788847 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:32:58.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.804318 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:32:58.806865 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:32:58.820009 udevadm[958]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 19:32:58.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.823016 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:32:58.825237 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:32:58.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:58.893420 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:32:59.609566 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:32:59.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:59.611000 audit: BPF prog-id=18 op=LOAD Feb 9 19:32:59.611000 audit: BPF prog-id=19 op=LOAD Feb 9 19:32:59.611000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:32:59.611000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:32:59.613309 systemd[1]: Starting systemd-udevd.service... Feb 9 19:32:59.658555 systemd-udevd[961]: Using default interface naming scheme 'v252'. Feb 9 19:32:59.748040 systemd[1]: Started systemd-udevd.service. Feb 9 19:32:59.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:59.756000 audit: BPF prog-id=20 op=LOAD Feb 9 19:32:59.761954 systemd[1]: Starting systemd-networkd.service... Feb 9 19:32:59.780000 audit: BPF prog-id=21 op=LOAD Feb 9 19:32:59.780000 audit: BPF prog-id=22 op=LOAD Feb 9 19:32:59.781000 audit: BPF prog-id=23 op=LOAD Feb 9 19:32:59.783120 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:32:59.836390 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:32:59.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:59.847332 systemd[1]: Started systemd-userdbd.service. Feb 9 19:32:59.933751 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 9 19:32:59.942847 systemd-networkd[971]: lo: Link UP Feb 9 19:32:59.943381 systemd-networkd[971]: lo: Gained carrier Feb 9 19:32:59.944039 systemd-networkd[971]: Enumeration completed Feb 9 19:32:59.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:32:59.944174 systemd[1]: Started systemd-networkd.service. Feb 9 19:32:59.944511 systemd-networkd[971]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:32:59.946418 systemd-networkd[971]: eth0: Link UP Feb 9 19:32:59.946429 systemd-networkd[971]: eth0: Gained carrier Feb 9 19:32:59.953674 kernel: ACPI: button: Power Button [PWRF] Feb 9 19:32:59.957281 systemd-networkd[971]: eth0: DHCPv4 address 172.24.4.156/24, gateway 172.24.4.1 acquired from 172.24.4.1 Feb 9 19:32:59.966190 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:32:59.970000 audit[972]: AVC avc: denied { confidentiality } for pid=972 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:32:59.970000 audit[972]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5630106a0de0 a1=32194 a2=7f8966317bc5 a3=5 items=108 ppid=961 pid=972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:32:59.970000 audit: CWD cwd="/" Feb 9 19:32:59.970000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=1 name=(null) inode=14375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=2 name=(null) inode=14375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=3 name=(null) inode=14376 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=4 name=(null) inode=14375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=5 name=(null) inode=14377 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=6 name=(null) inode=14375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=7 name=(null) inode=14378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=8 name=(null) inode=14378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=9 name=(null) inode=14379 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=10 name=(null) inode=14378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=11 name=(null) inode=14380 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=12 name=(null) inode=14378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=13 name=(null) inode=14381 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=14 name=(null) inode=14378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=15 name=(null) inode=14382 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=16 name=(null) inode=14378 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=17 name=(null) inode=14383 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=18 name=(null) inode=14375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=19 name=(null) inode=14384 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=20 name=(null) inode=14384 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=21 name=(null) inode=14385 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=22 name=(null) inode=14384 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=23 name=(null) inode=14386 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=24 name=(null) inode=14384 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=25 name=(null) inode=14387 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=26 name=(null) inode=14384 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=27 name=(null) inode=14388 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=28 name=(null) inode=14384 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=29 name=(null) inode=14389 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=30 name=(null) inode=14375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=31 name=(null) inode=14390 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=32 name=(null) inode=14390 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=33 name=(null) inode=14391 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=34 name=(null) inode=14390 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=35 name=(null) inode=14392 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=36 name=(null) inode=14390 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=37 name=(null) inode=14393 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=38 name=(null) inode=14390 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=39 name=(null) inode=14394 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=40 name=(null) inode=14390 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=41 name=(null) inode=14395 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=42 name=(null) inode=14375 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=43 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=44 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=45 name=(null) inode=14397 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=46 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=47 name=(null) inode=14398 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=48 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=49 name=(null) inode=14399 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=50 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=51 name=(null) inode=14400 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=52 name=(null) inode=14396 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=53 name=(null) inode=14401 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=55 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=56 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=57 name=(null) inode=14403 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=58 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=59 name=(null) inode=14404 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=60 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=61 name=(null) inode=14405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=62 name=(null) inode=14405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=63 name=(null) inode=14406 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=64 name=(null) inode=14405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=65 name=(null) inode=14407 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=66 name=(null) inode=14405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=67 name=(null) inode=14408 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=68 name=(null) inode=14405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=69 name=(null) inode=14409 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=70 name=(null) inode=14405 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=71 name=(null) inode=14410 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=72 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=73 name=(null) inode=14411 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=74 name=(null) inode=14411 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=75 name=(null) inode=14412 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=76 name=(null) inode=14411 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=77 name=(null) inode=14413 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=78 name=(null) inode=14411 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=79 name=(null) inode=14414 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=80 name=(null) inode=14411 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=81 name=(null) inode=14415 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=82 name=(null) inode=14411 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=83 name=(null) inode=14416 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=84 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=85 name=(null) inode=14417 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=86 name=(null) inode=14417 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=87 name=(null) inode=14418 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=88 name=(null) inode=14417 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=89 name=(null) inode=14419 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=90 name=(null) inode=14417 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=91 name=(null) inode=14420 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=92 name=(null) inode=14417 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=93 name=(null) inode=14421 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=94 name=(null) inode=14417 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=95 name=(null) inode=14422 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=96 name=(null) inode=14402 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=97 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=98 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=99 name=(null) inode=14424 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=100 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=101 name=(null) inode=14425 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=102 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=103 name=(null) inode=14426 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=104 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=105 name=(null) inode=14427 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=106 name=(null) inode=14423 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PATH item=107 name=(null) inode=14428 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:32:59.970000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:33:00.010633 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 9 19:33:00.023656 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 9 19:33:00.032684 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:33:00.071284 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:33:00.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:00.073342 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:33:00.115423 lvm[990]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:33:00.153952 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:33:00.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:00.155423 systemd[1]: Reached target cryptsetup.target. Feb 9 19:33:00.159173 systemd[1]: Starting lvm2-activation.service... Feb 9 19:33:00.168859 lvm[991]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:33:00.208138 systemd[1]: Finished lvm2-activation.service. Feb 9 19:33:00.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:00.209762 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:33:00.210991 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:33:00.211058 systemd[1]: Reached target local-fs.target. Feb 9 19:33:00.212195 systemd[1]: Reached target machines.target. Feb 9 19:33:00.216103 systemd[1]: Starting ldconfig.service... Feb 9 19:33:00.218560 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:33:00.218734 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:33:00.221238 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:33:00.227100 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:33:00.231559 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:33:00.235959 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:33:00.236085 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:33:00.239119 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:33:00.265420 systemd[1]: boot.automount: Got automount request for /boot, triggered by 993 (bootctl) Feb 9 19:33:00.268663 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:33:00.318915 systemd-tmpfiles[996]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:33:00.340980 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:33:00.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:00.381861 systemd-tmpfiles[996]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:33:00.423244 systemd-tmpfiles[996]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:33:01.122525 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:33:01.125428 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:33:01.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:01.324965 systemd-fsck[1001]: fsck.fat 4.2 (2021-01-31) Feb 9 19:33:01.324965 systemd-fsck[1001]: /dev/vda1: 789 files, 115339/258078 clusters Feb 9 19:33:01.328443 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:33:01.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:01.332752 systemd[1]: Mounting boot.mount... Feb 9 19:33:01.392001 systemd[1]: Mounted boot.mount. Feb 9 19:33:01.460154 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:33:01.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:01.665152 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:33:01.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:01.668293 systemd[1]: Starting audit-rules.service... Feb 9 19:33:01.670377 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:33:01.672905 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:33:01.677000 audit: BPF prog-id=24 op=LOAD Feb 9 19:33:01.679046 systemd[1]: Starting systemd-resolved.service... Feb 9 19:33:01.684000 audit: BPF prog-id=25 op=LOAD Feb 9 19:33:01.687758 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:33:01.692645 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:33:01.693915 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:33:01.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:01.694956 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:33:01.700000 audit[1010]: SYSTEM_BOOT pid=1010 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:33:01.716400 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:33:01.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:01.766130 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:33:01.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:01.794823 systemd-networkd[971]: eth0: Gained IPv6LL Feb 9 19:33:01.798000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:33:01.798000 audit[1024]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff566f2ee0 a2=420 a3=0 items=0 ppid=1004 pid=1024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:01.798000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:33:01.800001 augenrules[1024]: No rules Feb 9 19:33:01.800511 systemd[1]: Finished audit-rules.service. Feb 9 19:33:01.804250 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:33:01.805019 systemd[1]: Reached target time-set.target. Feb 9 19:33:01.815169 systemd-resolved[1008]: Positive Trust Anchors: Feb 9 19:33:01.815466 systemd-resolved[1008]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:33:01.815560 systemd-resolved[1008]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:33:01.825922 systemd-resolved[1008]: Using system hostname 'ci-3510-3-2-4-d828aa07b9.novalocal'. Feb 9 19:33:01.827984 systemd[1]: Started systemd-resolved.service. Feb 9 19:33:01.829128 systemd[1]: Reached target network.target. Feb 9 19:33:01.829832 systemd[1]: Reached target nss-lookup.target. Feb 9 19:33:01.856326 systemd-timesyncd[1009]: Contacted time server 195.154.226.102:123 (0.flatcar.pool.ntp.org). Feb 9 19:33:01.856393 systemd-timesyncd[1009]: Initial clock synchronization to Fri 2024-02-09 19:33:02.189508 UTC. Feb 9 19:33:02.572100 ldconfig[992]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:33:02.600355 systemd[1]: Finished ldconfig.service. Feb 9 19:33:02.604961 systemd[1]: Starting systemd-update-done.service... Feb 9 19:33:02.624030 systemd[1]: Finished systemd-update-done.service. Feb 9 19:33:02.625527 systemd[1]: Reached target sysinit.target. Feb 9 19:33:02.626990 systemd[1]: Started motdgen.path. Feb 9 19:33:02.628165 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:33:02.630126 systemd[1]: Started logrotate.timer. Feb 9 19:33:02.631462 systemd[1]: Started mdadm.timer. Feb 9 19:33:02.632525 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:33:02.633988 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:33:02.634128 systemd[1]: Reached target paths.target. Feb 9 19:33:02.635714 systemd[1]: Reached target timers.target. Feb 9 19:33:02.638935 systemd[1]: Listening on dbus.socket. Feb 9 19:33:02.643227 systemd[1]: Starting docker.socket... Feb 9 19:33:02.655314 systemd[1]: Listening on sshd.socket. Feb 9 19:33:02.657041 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:33:02.658319 systemd[1]: Listening on docker.socket. Feb 9 19:33:02.659959 systemd[1]: Reached target sockets.target. Feb 9 19:33:02.661276 systemd[1]: Reached target basic.target. Feb 9 19:33:02.662849 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:33:02.663120 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:33:02.666177 systemd[1]: Starting containerd.service... Feb 9 19:33:02.670924 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 9 19:33:02.675432 systemd[1]: Starting dbus.service... Feb 9 19:33:02.682533 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:33:02.691903 systemd[1]: Starting extend-filesystems.service... Feb 9 19:33:02.693507 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:33:02.697868 systemd[1]: Starting motdgen.service... Feb 9 19:33:02.705445 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:33:02.710449 systemd[1]: Starting prepare-critools.service... Feb 9 19:33:02.716471 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:33:02.723996 systemd[1]: Starting sshd-keygen.service... Feb 9 19:33:02.736403 systemd[1]: Starting systemd-logind.service... Feb 9 19:33:02.737019 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:33:02.737108 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 19:33:02.737712 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:33:02.738764 systemd[1]: Starting update-engine.service... Feb 9 19:33:02.748379 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:33:02.749570 extend-filesystems[1039]: Found vda Feb 9 19:33:02.760096 jq[1056]: true Feb 9 19:33:02.775592 jq[1038]: false Feb 9 19:33:02.779078 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:33:02.779274 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:33:02.782305 extend-filesystems[1039]: Found vda1 Feb 9 19:33:02.782305 extend-filesystems[1039]: Found vda2 Feb 9 19:33:02.782305 extend-filesystems[1039]: Found vda3 Feb 9 19:33:02.782305 extend-filesystems[1039]: Found usr Feb 9 19:33:02.782305 extend-filesystems[1039]: Found vda4 Feb 9 19:33:02.782305 extend-filesystems[1039]: Found vda6 Feb 9 19:33:02.782305 extend-filesystems[1039]: Found vda7 Feb 9 19:33:02.782305 extend-filesystems[1039]: Found vda9 Feb 9 19:33:02.782305 extend-filesystems[1039]: Checking size of /dev/vda9 Feb 9 19:33:02.821131 tar[1058]: ./ Feb 9 19:33:02.821131 tar[1058]: ./loopback Feb 9 19:33:02.801729 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:33:02.821599 tar[1059]: crictl Feb 9 19:33:02.821829 jq[1061]: true Feb 9 19:33:02.801899 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:33:02.811749 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:33:02.811940 systemd[1]: Finished motdgen.service. Feb 9 19:33:02.832298 extend-filesystems[1039]: Resized partition /dev/vda9 Feb 9 19:33:02.842148 dbus-daemon[1035]: [system] SELinux support is enabled Feb 9 19:33:02.842364 systemd[1]: Started dbus.service. Feb 9 19:33:02.845257 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:33:02.845286 systemd[1]: Reached target system-config.target. Feb 9 19:33:02.845787 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:33:02.845804 systemd[1]: Reached target user-config.target. Feb 9 19:33:02.856293 extend-filesystems[1076]: resize2fs 1.46.5 (30-Dec-2021) Feb 9 19:33:02.925813 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Feb 9 19:33:02.959426 env[1060]: time="2024-02-09T19:33:02.959332918Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:33:02.996633 update_engine[1054]: I0209 19:33:02.992987 1054 main.cc:92] Flatcar Update Engine starting Feb 9 19:33:03.092610 coreos-metadata[1034]: Feb 09 19:33:03.012 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Feb 9 19:33:03.093141 env[1060]: time="2024-02-09T19:33:03.028880647Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:33:03.093239 update_engine[1054]: I0209 19:33:03.007097 1054 update_check_scheduler.cc:74] Next update check in 4m4s Feb 9 19:33:03.007071 systemd[1]: Started update-engine.service. Feb 9 19:33:03.010306 systemd[1]: Started locksmithd.service. Feb 9 19:33:03.096184 env[1060]: time="2024-02-09T19:33:03.093878975Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:33:03.099691 systemd-logind[1053]: Watching system buttons on /dev/input/event1 (Power Button) Feb 9 19:33:03.099797 systemd-logind[1053]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:33:03.101446 systemd-logind[1053]: New seat seat0. Feb 9 19:33:03.106738 systemd[1]: Started systemd-logind.service. Feb 9 19:33:03.122254 env[1060]: time="2024-02-09T19:33:03.120958702Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:33:03.122254 env[1060]: time="2024-02-09T19:33:03.121025866Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:33:03.122254 env[1060]: time="2024-02-09T19:33:03.121389889Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:33:03.122254 env[1060]: time="2024-02-09T19:33:03.121414571Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:33:03.122254 env[1060]: time="2024-02-09T19:33:03.121433595Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:33:03.122254 env[1060]: time="2024-02-09T19:33:03.121448724Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:33:03.122254 env[1060]: time="2024-02-09T19:33:03.121604785Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:33:03.122254 env[1060]: time="2024-02-09T19:33:03.121976595Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:33:03.122254 env[1060]: time="2024-02-09T19:33:03.122173476Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:33:03.122254 env[1060]: time="2024-02-09T19:33:03.122204815Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:33:03.128737 env[1060]: time="2024-02-09T19:33:03.127087133Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:33:03.128737 env[1060]: time="2024-02-09T19:33:03.127131576Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:33:03.246655 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Feb 9 19:33:03.246709 coreos-metadata[1034]: Feb 09 19:33:03.206 INFO Fetch successful Feb 9 19:33:03.246709 coreos-metadata[1034]: Feb 09 19:33:03.206 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 9 19:33:03.246709 coreos-metadata[1034]: Feb 09 19:33:03.225 INFO Fetch successful Feb 9 19:33:03.248759 tar[1058]: ./bandwidth Feb 9 19:33:03.254577 extend-filesystems[1076]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 9 19:33:03.254577 extend-filesystems[1076]: old_desc_blocks = 1, new_desc_blocks = 3 Feb 9 19:33:03.254577 extend-filesystems[1076]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Feb 9 19:33:03.261328 extend-filesystems[1039]: Resized filesystem in /dev/vda9 Feb 9 19:33:03.255465 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:33:03.255892 systemd[1]: Finished extend-filesystems.service. Feb 9 19:33:03.269713 unknown[1034]: wrote ssh authorized keys file for user: core Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.279487654Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.279544133Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.279581390Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.279696778Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.279742894Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.279761761Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.279777285Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.279793608Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.279809901Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.279828416Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.279870938Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.279889381Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.280052483Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:33:03.280764 env[1060]: time="2024-02-09T19:33:03.280150580Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:33:03.281206 bash[1091]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:33:03.281304 env[1060]: time="2024-02-09T19:33:03.280527645Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:33:03.281304 env[1060]: time="2024-02-09T19:33:03.280560261Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:33:03.281304 env[1060]: time="2024-02-09T19:33:03.280576782Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:33:03.281304 env[1060]: time="2024-02-09T19:33:03.280698431Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:33:03.281304 env[1060]: time="2024-02-09T19:33:03.280724474Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:33:03.281347 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.281623066Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.281676408Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.281693427Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.281708297Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.281722845Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.281736854Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.281757809Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.281920163Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.281940214Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.281954855Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.281969913Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.281987846Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.282004657Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:33:03.282743 env[1060]: time="2024-02-09T19:33:03.282027492Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:33:03.283183 env[1060]: time="2024-02-09T19:33:03.282066837Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:33:03.283212 env[1060]: time="2024-02-09T19:33:03.282297664Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:33:03.283212 env[1060]: time="2024-02-09T19:33:03.282400808Z" level=info msg="Connect containerd service" Feb 9 19:33:03.283212 env[1060]: time="2024-02-09T19:33:03.282434224Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:33:03.295523 env[1060]: time="2024-02-09T19:33:03.285411021Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:33:03.295523 env[1060]: time="2024-02-09T19:33:03.285932465Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:33:03.295523 env[1060]: time="2024-02-09T19:33:03.285979837Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:33:03.295523 env[1060]: time="2024-02-09T19:33:03.286027790Z" level=info msg="containerd successfully booted in 0.342319s" Feb 9 19:33:03.295523 env[1060]: time="2024-02-09T19:33:03.288319077Z" level=info msg="Start subscribing containerd event" Feb 9 19:33:03.295523 env[1060]: time="2024-02-09T19:33:03.288577524Z" level=info msg="Start recovering state" Feb 9 19:33:03.295523 env[1060]: time="2024-02-09T19:33:03.288918743Z" level=info msg="Start event monitor" Feb 9 19:33:03.295523 env[1060]: time="2024-02-09T19:33:03.289014442Z" level=info msg="Start snapshots syncer" Feb 9 19:33:03.295523 env[1060]: time="2024-02-09T19:33:03.289047038Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:33:03.295523 env[1060]: time="2024-02-09T19:33:03.289112094Z" level=info msg="Start streaming server" Feb 9 19:33:03.286290 systemd[1]: Started containerd.service. Feb 9 19:33:03.355299 update-ssh-keys[1102]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:33:03.355777 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 9 19:33:03.363310 tar[1058]: ./ptp Feb 9 19:33:03.453316 tar[1058]: ./vlan Feb 9 19:33:03.533649 tar[1058]: ./host-device Feb 9 19:33:03.607126 tar[1058]: ./tuning Feb 9 19:33:03.687516 tar[1058]: ./vrf Feb 9 19:33:03.765956 tar[1058]: ./sbr Feb 9 19:33:03.833320 tar[1058]: ./tap Feb 9 19:33:03.887926 tar[1058]: ./dhcp Feb 9 19:33:04.086207 systemd[1]: Finished prepare-critools.service. Feb 9 19:33:04.103746 tar[1058]: ./static Feb 9 19:33:04.132403 tar[1058]: ./firewall Feb 9 19:33:04.176438 tar[1058]: ./macvlan Feb 9 19:33:04.216759 tar[1058]: ./dummy Feb 9 19:33:04.229773 locksmithd[1094]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:33:04.276031 tar[1058]: ./bridge Feb 9 19:33:04.322218 tar[1058]: ./ipvlan Feb 9 19:33:04.363522 tar[1058]: ./portmap Feb 9 19:33:04.402529 tar[1058]: ./host-local Feb 9 19:33:04.542406 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:33:04.815147 sshd_keygen[1072]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:33:04.843346 systemd[1]: Finished sshd-keygen.service. Feb 9 19:33:04.847012 systemd[1]: Starting issuegen.service... Feb 9 19:33:04.854014 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:33:04.854303 systemd[1]: Finished issuegen.service. Feb 9 19:33:04.858323 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:33:04.865809 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:33:04.869873 systemd[1]: Started getty@tty1.service. Feb 9 19:33:04.874280 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:33:04.875936 systemd[1]: Reached target getty.target. Feb 9 19:33:04.877023 systemd[1]: Reached target multi-user.target. Feb 9 19:33:04.880334 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:33:04.895913 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:33:04.896223 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:33:04.897459 systemd[1]: Startup finished in 964ms (kernel) + 11.513s (initrd) + 11.624s (userspace) = 24.102s. Feb 9 19:33:11.970847 systemd[1]: Created slice system-sshd.slice. Feb 9 19:33:11.972933 systemd[1]: Started sshd@0-172.24.4.156:22-172.24.4.1:42392.service. Feb 9 19:33:13.320320 sshd[1122]: Accepted publickey for core from 172.24.4.1 port 42392 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:33:13.331645 sshd[1122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:33:13.367338 systemd[1]: Created slice user-500.slice. Feb 9 19:33:13.369855 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:33:13.377826 systemd-logind[1053]: New session 1 of user core. Feb 9 19:33:13.398789 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:33:13.402196 systemd[1]: Starting user@500.service... Feb 9 19:33:13.411828 (systemd)[1125]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:33:13.541246 systemd[1125]: Queued start job for default target default.target. Feb 9 19:33:13.541943 systemd[1125]: Reached target paths.target. Feb 9 19:33:13.541964 systemd[1125]: Reached target sockets.target. Feb 9 19:33:13.541978 systemd[1125]: Reached target timers.target. Feb 9 19:33:13.541992 systemd[1125]: Reached target basic.target. Feb 9 19:33:13.542043 systemd[1125]: Reached target default.target. Feb 9 19:33:13.542071 systemd[1125]: Startup finished in 116ms. Feb 9 19:33:13.542921 systemd[1]: Started user@500.service. Feb 9 19:33:13.545291 systemd[1]: Started session-1.scope. Feb 9 19:33:13.910213 systemd[1]: Started sshd@1-172.24.4.156:22-172.24.4.1:42406.service. Feb 9 19:33:15.626091 sshd[1134]: Accepted publickey for core from 172.24.4.1 port 42406 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:33:15.628232 sshd[1134]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:33:15.636896 systemd-logind[1053]: New session 2 of user core. Feb 9 19:33:15.640172 systemd[1]: Started session-2.scope. Feb 9 19:33:16.463373 sshd[1134]: pam_unix(sshd:session): session closed for user core Feb 9 19:33:16.470478 systemd[1]: Started sshd@2-172.24.4.156:22-172.24.4.1:45128.service. Feb 9 19:33:16.472887 systemd[1]: sshd@1-172.24.4.156:22-172.24.4.1:42406.service: Deactivated successfully. Feb 9 19:33:16.474500 systemd[1]: session-2.scope: Deactivated successfully. Feb 9 19:33:16.477303 systemd-logind[1053]: Session 2 logged out. Waiting for processes to exit. Feb 9 19:33:16.479949 systemd-logind[1053]: Removed session 2. Feb 9 19:33:18.096108 sshd[1139]: Accepted publickey for core from 172.24.4.1 port 45128 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:33:18.099845 sshd[1139]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:33:18.111376 systemd[1]: Started session-3.scope. Feb 9 19:33:18.112828 systemd-logind[1053]: New session 3 of user core. Feb 9 19:33:18.892800 sshd[1139]: pam_unix(sshd:session): session closed for user core Feb 9 19:33:18.901505 systemd[1]: Started sshd@3-172.24.4.156:22-172.24.4.1:45136.service. Feb 9 19:33:18.906153 systemd[1]: sshd@2-172.24.4.156:22-172.24.4.1:45128.service: Deactivated successfully. Feb 9 19:33:18.908003 systemd[1]: session-3.scope: Deactivated successfully. Feb 9 19:33:18.911599 systemd-logind[1053]: Session 3 logged out. Waiting for processes to exit. Feb 9 19:33:18.914453 systemd-logind[1053]: Removed session 3. Feb 9 19:33:20.171748 sshd[1145]: Accepted publickey for core from 172.24.4.1 port 45136 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:33:20.174769 sshd[1145]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:33:20.186199 systemd[1]: Started session-4.scope. Feb 9 19:33:20.188714 systemd-logind[1053]: New session 4 of user core. Feb 9 19:33:20.874518 sshd[1145]: pam_unix(sshd:session): session closed for user core Feb 9 19:33:20.883874 systemd[1]: Started sshd@4-172.24.4.156:22-172.24.4.1:45152.service. Feb 9 19:33:20.886342 systemd[1]: sshd@3-172.24.4.156:22-172.24.4.1:45136.service: Deactivated successfully. Feb 9 19:33:20.888262 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:33:20.890528 systemd-logind[1053]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:33:20.893152 systemd-logind[1053]: Removed session 4. Feb 9 19:33:22.296408 sshd[1151]: Accepted publickey for core from 172.24.4.1 port 45152 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:33:22.298967 sshd[1151]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:33:22.310855 systemd-logind[1053]: New session 5 of user core. Feb 9 19:33:22.311944 systemd[1]: Started session-5.scope. Feb 9 19:33:22.796967 sudo[1155]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:33:22.798431 sudo[1155]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:33:22.813166 dbus-daemon[1035]: \xd0\xdd>\xcf5V: received setenforce notice (enforcing=-355693840) Feb 9 19:33:22.817321 sudo[1155]: pam_unix(sudo:session): session closed for user root Feb 9 19:33:23.078907 sshd[1151]: pam_unix(sshd:session): session closed for user core Feb 9 19:33:23.085567 systemd[1]: Started sshd@5-172.24.4.156:22-172.24.4.1:45162.service. Feb 9 19:33:23.090548 systemd[1]: sshd@4-172.24.4.156:22-172.24.4.1:45152.service: Deactivated successfully. Feb 9 19:33:23.091492 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:33:23.092853 systemd-logind[1053]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:33:23.094239 systemd-logind[1053]: Removed session 5. Feb 9 19:33:24.546857 sshd[1158]: Accepted publickey for core from 172.24.4.1 port 45162 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:33:24.550437 sshd[1158]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:33:24.562060 systemd-logind[1053]: New session 6 of user core. Feb 9 19:33:24.562938 systemd[1]: Started session-6.scope. Feb 9 19:33:25.257542 sudo[1163]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:33:25.258274 sudo[1163]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:33:25.265905 sudo[1163]: pam_unix(sudo:session): session closed for user root Feb 9 19:33:25.278176 sudo[1162]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:33:25.278784 sudo[1162]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:33:25.301815 systemd[1]: Stopping audit-rules.service... Feb 9 19:33:25.305000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:33:25.308556 kernel: kauditd_printk_skb: 178 callbacks suppressed Feb 9 19:33:25.308725 kernel: audit: type=1305 audit(1707507205.305:163): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:33:25.305000 audit[1166]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7db9c710 a2=420 a3=0 items=0 ppid=1 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:25.328724 kernel: audit: type=1300 audit(1707507205.305:163): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd7db9c710 a2=420 a3=0 items=0 ppid=1 pid=1166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:25.329018 kernel: audit: type=1327 audit(1707507205.305:163): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:33:25.305000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:33:25.329269 auditctl[1166]: No rules Feb 9 19:33:25.339128 kernel: audit: type=1131 audit(1707507205.327:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:25.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:25.331227 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:33:25.331754 systemd[1]: Stopped audit-rules.service. Feb 9 19:33:25.340924 systemd[1]: Starting audit-rules.service... Feb 9 19:33:25.372174 augenrules[1183]: No rules Feb 9 19:33:25.373773 systemd[1]: Finished audit-rules.service. Feb 9 19:33:25.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:25.375436 sudo[1162]: pam_unix(sudo:session): session closed for user root Feb 9 19:33:25.373000 audit[1162]: USER_END pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:33:25.383768 kernel: audit: type=1130 audit(1707507205.372:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:25.383908 kernel: audit: type=1106 audit(1707507205.373:166): pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:33:25.384011 kernel: audit: type=1104 audit(1707507205.373:167): pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:33:25.373000 audit[1162]: CRED_DISP pid=1162 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:33:25.550981 sshd[1158]: pam_unix(sshd:session): session closed for user core Feb 9 19:33:25.554000 audit[1158]: USER_END pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:25.561271 systemd[1]: Started sshd@6-172.24.4.156:22-172.24.4.1:40298.service. Feb 9 19:33:25.564443 systemd[1]: sshd@5-172.24.4.156:22-172.24.4.1:45162.service: Deactivated successfully. Feb 9 19:33:25.566210 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:33:25.557000 audit[1158]: CRED_DISP pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:25.579284 systemd-logind[1053]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:33:25.581726 kernel: audit: type=1106 audit(1707507205.554:168): pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:25.581853 kernel: audit: type=1104 audit(1707507205.557:169): pid=1158 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:25.582786 systemd-logind[1053]: Removed session 6. Feb 9 19:33:25.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.156:22-172.24.4.1:40298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:25.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.156:22-172.24.4.1:45162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:25.594794 kernel: audit: type=1130 audit(1707507205.558:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.156:22-172.24.4.1:40298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:26.973000 audit[1188]: USER_ACCT pid=1188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:26.974598 sshd[1188]: Accepted publickey for core from 172.24.4.1 port 40298 ssh2: RSA SHA256:0cKtuwQ+yBp2KK/6KUCEpkWDg4c+XXZ9qW4sy+pe7oM Feb 9 19:33:26.976000 audit[1188]: CRED_ACQ pid=1188 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:26.976000 audit[1188]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0e0e1070 a2=3 a3=0 items=0 ppid=1 pid=1188 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:26.976000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:33:26.978543 sshd[1188]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:33:26.987851 systemd-logind[1053]: New session 7 of user core. Feb 9 19:33:26.988681 systemd[1]: Started session-7.scope. Feb 9 19:33:26.997000 audit[1188]: USER_START pid=1188 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:27.000000 audit[1191]: CRED_ACQ pid=1191 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:27.514000 audit[1192]: USER_ACCT pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:33:27.515467 sudo[1192]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:33:27.515000 audit[1192]: CRED_REFR pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:33:27.518829 sudo[1192]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:33:27.523000 audit[1192]: USER_START pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:33:28.496889 systemd[1]: Reloading. Feb 9 19:33:28.597128 /usr/lib/systemd/system-generators/torcx-generator[1221]: time="2024-02-09T19:33:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:33:28.597168 /usr/lib/systemd/system-generators/torcx-generator[1221]: time="2024-02-09T19:33:28Z" level=info msg="torcx already run" Feb 9 19:33:28.706952 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:33:28.706980 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:33:28.734662 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:33:28.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.814000 audit: BPF prog-id=31 op=LOAD Feb 9 19:33:28.814000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:33:28.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.816000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.817000 audit: BPF prog-id=32 op=LOAD Feb 9 19:33:28.817000 audit: BPF prog-id=20 op=UNLOAD Feb 9 19:33:28.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.818000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.818000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit: BPF prog-id=33 op=LOAD Feb 9 19:33:28.819000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit: BPF prog-id=34 op=LOAD Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.819000 audit: BPF prog-id=35 op=LOAD Feb 9 19:33:28.819000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:33:28.819000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:33:28.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.821000 audit: BPF prog-id=36 op=LOAD Feb 9 19:33:28.821000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:33:28.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.822000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.822000 audit: BPF prog-id=37 op=LOAD Feb 9 19:33:28.823000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:33:28.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.824000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.824000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.824000 audit: BPF prog-id=38 op=LOAD Feb 9 19:33:28.825000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit: BPF prog-id=39 op=LOAD Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.825000 audit: BPF prog-id=40 op=LOAD Feb 9 19:33:28.825000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:33:28.825000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit: BPF prog-id=41 op=LOAD Feb 9 19:33:28.826000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit: BPF prog-id=42 op=LOAD Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.826000 audit: BPF prog-id=43 op=LOAD Feb 9 19:33:28.826000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:33:28.826000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit: BPF prog-id=44 op=LOAD Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:28.827000 audit: BPF prog-id=45 op=LOAD Feb 9 19:33:28.827000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:33:28.827000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:33:28.839491 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:33:28.898478 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:33:28.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:28.899870 systemd[1]: Reached target network-online.target. Feb 9 19:33:28.903000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:28.903266 systemd[1]: Started kubelet.service. Feb 9 19:33:28.945890 systemd[1]: Starting coreos-metadata.service... Feb 9 19:33:29.022505 coreos-metadata[1275]: Feb 09 19:33:29.022 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Feb 9 19:33:29.040811 kubelet[1268]: E0209 19:33:29.040751 1268 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 19:33:29.043502 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:33:29.043741 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:33:29.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:33:29.239102 coreos-metadata[1275]: Feb 09 19:33:29.238 INFO Fetch successful Feb 9 19:33:29.239102 coreos-metadata[1275]: Feb 09 19:33:29.239 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Feb 9 19:33:29.257663 coreos-metadata[1275]: Feb 09 19:33:29.257 INFO Fetch successful Feb 9 19:33:29.257663 coreos-metadata[1275]: Feb 09 19:33:29.257 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Feb 9 19:33:29.282415 coreos-metadata[1275]: Feb 09 19:33:29.282 INFO Fetch successful Feb 9 19:33:29.282415 coreos-metadata[1275]: Feb 09 19:33:29.282 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Feb 9 19:33:29.299627 coreos-metadata[1275]: Feb 09 19:33:29.299 INFO Fetch successful Feb 9 19:33:29.299627 coreos-metadata[1275]: Feb 09 19:33:29.299 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Feb 9 19:33:29.318589 coreos-metadata[1275]: Feb 09 19:33:29.318 INFO Fetch successful Feb 9 19:33:29.337680 systemd[1]: Finished coreos-metadata.service. Feb 9 19:33:29.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:30.145349 systemd[1]: Stopped kubelet.service. Feb 9 19:33:30.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:30.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:30.173403 systemd[1]: Reloading. Feb 9 19:33:30.318927 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:33:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:33:30.318967 /usr/lib/systemd/system-generators/torcx-generator[1332]: time="2024-02-09T19:33:30Z" level=info msg="torcx already run" Feb 9 19:33:30.411988 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:33:30.412272 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:33:30.439780 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:33:30.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.511450 kernel: kauditd_printk_skb: 189 callbacks suppressed Feb 9 19:33:30.511509 kernel: audit: type=1400 audit(1707507210.507:358): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.538369 kernel: audit: type=1400 audit(1707507210.507:359): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.538424 kernel: audit: type=1400 audit(1707507210.507:360): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.538444 kernel: audit: type=1400 audit(1707507210.507:361): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.554986 kernel: audit: type=1400 audit(1707507210.507:362): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.555035 kernel: audit: type=1400 audit(1707507210.507:363): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.572286 kernel: audit: type=1400 audit(1707507210.507:364): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.572335 kernel: audit: type=1400 audit(1707507210.507:365): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.584073 kernel: audit: type=1400 audit(1707507210.507:366): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.584128 kernel: audit: type=1400 audit(1707507210.517:367): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.517000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.517000 audit: BPF prog-id=46 op=LOAD Feb 9 19:33:30.517000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:33:30.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.520000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.528000 audit: BPF prog-id=47 op=LOAD Feb 9 19:33:30.528000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:33:30.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.546000 audit: BPF prog-id=48 op=LOAD Feb 9 19:33:30.546000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:33:30.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.563000 audit: BPF prog-id=49 op=LOAD Feb 9 19:33:30.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.579000 audit: BPF prog-id=50 op=LOAD Feb 9 19:33:30.579000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:33:30.579000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:33:30.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.586000 audit: BPF prog-id=51 op=LOAD Feb 9 19:33:30.588000 audit: BPF prog-id=36 op=UNLOAD Feb 9 19:33:30.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.589000 audit: BPF prog-id=52 op=LOAD Feb 9 19:33:30.589000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:33:30.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.591000 audit: BPF prog-id=53 op=LOAD Feb 9 19:33:30.591000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:33:30.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit: BPF prog-id=54 op=LOAD Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit: BPF prog-id=55 op=LOAD Feb 9 19:33:30.592000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:33:30.592000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit: BPF prog-id=56 op=LOAD Feb 9 19:33:30.592000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit: BPF prog-id=57 op=LOAD Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.592000 audit: BPF prog-id=58 op=LOAD Feb 9 19:33:30.592000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:33:30.592000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit: BPF prog-id=59 op=LOAD Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:30.593000 audit: BPF prog-id=60 op=LOAD Feb 9 19:33:30.593000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:33:30.593000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:33:30.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:30.617469 systemd[1]: Started kubelet.service. Feb 9 19:33:30.671817 kubelet[1378]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:33:30.674744 kubelet[1378]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:33:30.674744 kubelet[1378]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:33:30.674878 kubelet[1378]: I0209 19:33:30.674807 1378 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:33:31.160957 kubelet[1378]: I0209 19:33:31.160844 1378 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 19:33:31.161441 kubelet[1378]: I0209 19:33:31.161411 1378 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:33:31.162316 kubelet[1378]: I0209 19:33:31.162277 1378 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 19:33:31.167784 kubelet[1378]: I0209 19:33:31.167722 1378 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:33:31.175877 kubelet[1378]: I0209 19:33:31.175804 1378 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:33:31.177527 kubelet[1378]: I0209 19:33:31.177353 1378 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:33:31.177722 kubelet[1378]: I0209 19:33:31.177639 1378 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:33:31.177722 kubelet[1378]: I0209 19:33:31.177665 1378 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:33:31.177722 kubelet[1378]: I0209 19:33:31.177682 1378 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 19:33:31.178099 kubelet[1378]: I0209 19:33:31.177830 1378 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:33:31.188323 kubelet[1378]: I0209 19:33:31.188281 1378 kubelet.go:405] "Attempting to sync node with API server" Feb 9 19:33:31.188323 kubelet[1378]: I0209 19:33:31.188314 1378 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:33:31.188323 kubelet[1378]: I0209 19:33:31.188336 1378 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:33:31.188794 kubelet[1378]: I0209 19:33:31.188351 1378 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:33:31.189101 kubelet[1378]: E0209 19:33:31.189073 1378 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:31.189187 kubelet[1378]: E0209 19:33:31.189124 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:31.190255 kubelet[1378]: I0209 19:33:31.190227 1378 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:33:31.190540 kubelet[1378]: W0209 19:33:31.190512 1378 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:33:31.191044 kubelet[1378]: I0209 19:33:31.191009 1378 server.go:1168] "Started kubelet" Feb 9 19:33:31.190000 audit[1378]: AVC avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.190000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:33:31.190000 audit[1378]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cd5c20 a1=c000bbaf00 a2=c000cd5bf0 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.190000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:33:31.192000 audit[1378]: AVC avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.192000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:33:31.192000 audit[1378]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c6cdc0 a1=c000bbaf18 a2=c000cd5cb0 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.192000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:33:31.193486 kubelet[1378]: I0209 19:33:31.192721 1378 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:33:31.193486 kubelet[1378]: I0209 19:33:31.192773 1378 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:33:31.193486 kubelet[1378]: I0209 19:33:31.192834 1378 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:33:31.195646 kubelet[1378]: I0209 19:33:31.195591 1378 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:33:31.196419 kubelet[1378]: I0209 19:33:31.196371 1378 server.go:461] "Adding debug handlers to kubelet server" Feb 9 19:33:31.197756 kubelet[1378]: I0209 19:33:31.197709 1378 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:33:31.199337 kubelet[1378]: E0209 19:33:31.198333 1378 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:33:31.199337 kubelet[1378]: E0209 19:33:31.198360 1378 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:33:31.199337 kubelet[1378]: I0209 19:33:31.198646 1378 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 19:33:31.199337 kubelet[1378]: I0209 19:33:31.198738 1378 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 19:33:31.237179 kubelet[1378]: I0209 19:33:31.237154 1378 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:33:31.237726 kubelet[1378]: I0209 19:33:31.237713 1378 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:33:31.237808 kubelet[1378]: I0209 19:33:31.237797 1378 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:33:31.254396 kubelet[1378]: E0209 19:33:31.254355 1378 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.156\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 9 19:33:31.256597 kubelet[1378]: W0209 19:33:31.255915 1378 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:33:31.256597 kubelet[1378]: E0209 19:33:31.255960 1378 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:33:31.256597 kubelet[1378]: E0209 19:33:31.256102 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c30674e75a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 190986586, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 190986586, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.262193 kubelet[1378]: W0209 19:33:31.256517 1378 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:33:31.262193 kubelet[1378]: E0209 19:33:31.256547 1378 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:33:31.262193 kubelet[1378]: W0209 19:33:31.256843 1378 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.24.4.156" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:33:31.262193 kubelet[1378]: E0209 19:33:31.256902 1378 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.156" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:33:31.262339 kubelet[1378]: E0209 19:33:31.257031 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c306e540d0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 198349520, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 198349520, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.262414 kubelet[1378]: E0209 19:33:31.257955 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c309199984", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.156 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235334532, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235334532, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.262487 kubelet[1378]: E0209 19:33:31.258688 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c30919aed2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.156 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235339986, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235339986, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.262563 kubelet[1378]: E0209 19:33:31.259367 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c30919bb33", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.156 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235343155, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235343155, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.282206 kubelet[1378]: I0209 19:33:31.282155 1378 policy_none.go:49] "None policy: Start" Feb 9 19:33:31.284086 kubelet[1378]: I0209 19:33:31.284054 1378 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:33:31.284228 kubelet[1378]: I0209 19:33:31.284216 1378 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:33:31.300947 kubelet[1378]: I0209 19:33:31.299926 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.156" Feb 9 19:33:31.301411 kubelet[1378]: E0209 19:33:31.301396 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.156" Feb 9 19:33:31.301890 kubelet[1378]: E0209 19:33:31.301795 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c309199984", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.156 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235334532, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 299882274, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.156.17b248c309199984" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.303005 kubelet[1378]: E0209 19:33:31.302952 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c30919aed2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.156 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235339986, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 299890306, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.156.17b248c30919aed2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.304621 kubelet[1378]: E0209 19:33:31.304555 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c30919bb33", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.156 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235343155, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 299893385, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.156.17b248c30919bb33" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.313410 systemd[1]: Created slice kubepods.slice. Feb 9 19:33:31.312000 audit[1394]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:31.312000 audit[1394]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc18e03860 a2=0 a3=7ffc18e0384c items=0 ppid=1378 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.312000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:33:31.316000 audit[1396]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:31.316000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffec143d9f0 a2=0 a3=7ffec143d9dc items=0 ppid=1378 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.316000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:33:31.319953 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:33:31.323771 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:33:31.331139 kubelet[1378]: I0209 19:33:31.331120 1378 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:33:31.329000 audit[1378]: AVC avc: denied { mac_admin } for pid=1378 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:31.329000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:33:31.329000 audit[1378]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f36b40 a1=c000f564b0 a2=c000f36b10 a3=25 items=0 ppid=1 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.329000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:33:31.332096 kubelet[1378]: I0209 19:33:31.332084 1378 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:33:31.333769 kubelet[1378]: I0209 19:33:31.333753 1378 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:33:31.337545 kubelet[1378]: E0209 19:33:31.337524 1378 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.156\" not found" Feb 9 19:33:31.340001 kubelet[1378]: E0209 19:33:31.339892 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c30f1adb31", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 336080177, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 336080177, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.324000 audit[1398]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:31.324000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc9e8354b0 a2=0 a3=7ffc9e83549c items=0 ppid=1378 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.324000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:33:31.346000 audit[1403]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:31.346000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcc2af9b80 a2=0 a3=7ffcc2af9b6c items=0 ppid=1378 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.346000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:33:31.431000 audit[1408]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:31.431000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffeba541a60 a2=0 a3=7ffeba541a4c items=0 ppid=1378 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:33:31.437203 kubelet[1378]: I0209 19:33:31.437171 1378 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:33:31.437000 audit[1410]: NETFILTER_CFG table=mangle:7 family=2 entries=1 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:31.437000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc8732490 a2=0 a3=7fffc873247c items=0 ppid=1378 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:33:31.437000 audit[1409]: NETFILTER_CFG table=mangle:8 family=10 entries=2 op=nft_register_chain pid=1409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:31.437000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd7e3912b0 a2=0 a3=7ffd7e39129c items=0 ppid=1378 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:33:31.439594 kubelet[1378]: I0209 19:33:31.439565 1378 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:33:31.439686 kubelet[1378]: I0209 19:33:31.439667 1378 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 19:33:31.439737 kubelet[1378]: I0209 19:33:31.439719 1378 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 19:33:31.439843 kubelet[1378]: E0209 19:33:31.439819 1378 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 19:33:31.439000 audit[1411]: NETFILTER_CFG table=nat:9 family=2 entries=2 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:31.439000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd43180d20 a2=0 a3=7ffd43180d0c items=0 ppid=1378 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:33:31.442512 kubelet[1378]: W0209 19:33:31.442479 1378 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:33:31.442646 kubelet[1378]: E0209 19:33:31.442540 1378 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:33:31.441000 audit[1413]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:31.441000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc2d297e10 a2=0 a3=7ffc2d297dfc items=0 ppid=1378 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.441000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:33:31.442000 audit[1412]: NETFILTER_CFG table=mangle:11 family=10 entries=1 op=nft_register_chain pid=1412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:31.442000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdccf65640 a2=0 a3=7ffdccf6562c items=0 ppid=1378 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:33:31.444000 audit[1414]: NETFILTER_CFG table=nat:12 family=10 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:31.444000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffd579d560 a2=0 a3=7fffd579d54c items=0 ppid=1378 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:33:31.445000 audit[1415]: NETFILTER_CFG table=filter:13 family=10 entries=2 op=nft_register_chain pid=1415 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:31.445000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd7c161180 a2=0 a3=7ffd7c16116c items=0 ppid=1378 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:31.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:33:31.458176 kubelet[1378]: E0209 19:33:31.458143 1378 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.156\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 9 19:33:31.503480 kubelet[1378]: I0209 19:33:31.503426 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.156" Feb 9 19:33:31.505056 kubelet[1378]: E0209 19:33:31.505038 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.156" Feb 9 19:33:31.505504 kubelet[1378]: E0209 19:33:31.505428 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c309199984", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.156 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235334532, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 503346093, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.156.17b248c309199984" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.506861 kubelet[1378]: E0209 19:33:31.506688 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c30919aed2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.156 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235339986, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 503358978, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.156.17b248c30919aed2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.508851 kubelet[1378]: E0209 19:33:31.508716 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c30919bb33", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.156 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235343155, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 503369557, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.156.17b248c30919bb33" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.860762 kubelet[1378]: E0209 19:33:31.860695 1378 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"172.24.4.156\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 9 19:33:31.907160 kubelet[1378]: I0209 19:33:31.907112 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.156" Feb 9 19:33:31.911801 kubelet[1378]: E0209 19:33:31.911571 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c309199984", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.156 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235334532, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 907030294, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.156.17b248c309199984" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.912365 kubelet[1378]: E0209 19:33:31.912326 1378 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.156" Feb 9 19:33:31.915050 kubelet[1378]: E0209 19:33:31.914921 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c30919aed2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.156 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235339986, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 907053828, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.156.17b248c30919aed2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:31.918208 kubelet[1378]: E0209 19:33:31.918085 1378 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156.17b248c30919bb33", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.156", UID:"172.24.4.156", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.156 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.156"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 235343155, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 33, 31, 907060036, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.156.17b248c30919bb33" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:33:32.156856 kubelet[1378]: W0209 19:33:32.156678 1378 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:33:32.157184 kubelet[1378]: E0209 19:33:32.157153 1378 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:33:32.167039 kubelet[1378]: I0209 19:33:32.166932 1378 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 19:33:32.189297 kubelet[1378]: E0209 19:33:32.189246 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:32.630291 kubelet[1378]: E0209 19:33:32.630194 1378 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.24.4.156" not found Feb 9 19:33:32.677582 kubelet[1378]: E0209 19:33:32.677523 1378 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.24.4.156\" not found" node="172.24.4.156" Feb 9 19:33:32.714503 kubelet[1378]: I0209 19:33:32.714450 1378 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.156" Feb 9 19:33:32.725401 kubelet[1378]: I0209 19:33:32.725352 1378 kubelet_node_status.go:73] "Successfully registered node" node="172.24.4.156" Feb 9 19:33:32.741298 kubelet[1378]: E0209 19:33:32.741248 1378 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.156\" not found" Feb 9 19:33:32.843741 kubelet[1378]: I0209 19:33:32.843699 1378 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 19:33:32.845068 env[1060]: time="2024-02-09T19:33:32.844799997Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:33:32.845993 kubelet[1378]: I0209 19:33:32.845924 1378 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 19:33:33.157084 sudo[1192]: pam_unix(sudo:session): session closed for user root Feb 9 19:33:33.156000 audit[1192]: USER_END pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:33:33.156000 audit[1192]: CRED_DISP pid=1192 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:33:33.190520 kubelet[1378]: E0209 19:33:33.190472 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:33.191246 kubelet[1378]: I0209 19:33:33.190797 1378 apiserver.go:52] "Watching apiserver" Feb 9 19:33:33.197027 kubelet[1378]: I0209 19:33:33.196966 1378 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:33:33.197212 kubelet[1378]: I0209 19:33:33.197140 1378 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:33:33.197289 kubelet[1378]: I0209 19:33:33.197231 1378 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:33:33.198877 kubelet[1378]: E0209 19:33:33.198837 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqgtg" podUID=52ed98cb-0e1f-483f-ada3-e6760f45d1cd Feb 9 19:33:33.200837 kubelet[1378]: I0209 19:33:33.200786 1378 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 19:33:33.209239 kubelet[1378]: I0209 19:33:33.209055 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/52ed98cb-0e1f-483f-ada3-e6760f45d1cd-socket-dir\") pod \"csi-node-driver-xqgtg\" (UID: \"52ed98cb-0e1f-483f-ada3-e6760f45d1cd\") " pod="calico-system/csi-node-driver-xqgtg" Feb 9 19:33:33.210126 kubelet[1378]: I0209 19:33:33.209722 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77-xtables-lock\") pod \"calico-node-hcll2\" (UID: \"b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77\") " pod="calico-system/calico-node-hcll2" Feb 9 19:33:33.210126 kubelet[1378]: I0209 19:33:33.209827 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77-var-lib-calico\") pod \"calico-node-hcll2\" (UID: \"b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77\") " pod="calico-system/calico-node-hcll2" Feb 9 19:33:33.211843 systemd[1]: Created slice kubepods-besteffort-podb660ceeb_5b0e_49b3_93ca_a7c38e5e3e77.slice. Feb 9 19:33:33.213294 kubelet[1378]: I0209 19:33:33.212495 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77-cni-bin-dir\") pod \"calico-node-hcll2\" (UID: \"b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77\") " pod="calico-system/calico-node-hcll2" Feb 9 19:33:33.213709 kubelet[1378]: I0209 19:33:33.213633 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77-cni-net-dir\") pod \"calico-node-hcll2\" (UID: \"b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77\") " pod="calico-system/calico-node-hcll2" Feb 9 19:33:33.213844 kubelet[1378]: I0209 19:33:33.213748 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/52ed98cb-0e1f-483f-ada3-e6760f45d1cd-registration-dir\") pod \"csi-node-driver-xqgtg\" (UID: \"52ed98cb-0e1f-483f-ada3-e6760f45d1cd\") " pod="calico-system/csi-node-driver-xqgtg" Feb 9 19:33:33.213922 kubelet[1378]: I0209 19:33:33.213869 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2bjsm\" (UniqueName: \"kubernetes.io/projected/52ed98cb-0e1f-483f-ada3-e6760f45d1cd-kube-api-access-2bjsm\") pod \"csi-node-driver-xqgtg\" (UID: \"52ed98cb-0e1f-483f-ada3-e6760f45d1cd\") " pod="calico-system/csi-node-driver-xqgtg" Feb 9 19:33:33.213996 kubelet[1378]: I0209 19:33:33.213948 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/30240ab5-b78a-490a-a135-d919671b12db-kube-proxy\") pod \"kube-proxy-wv4cr\" (UID: \"30240ab5-b78a-490a-a135-d919671b12db\") " pod="kube-system/kube-proxy-wv4cr" Feb 9 19:33:33.214066 kubelet[1378]: I0209 19:33:33.214015 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/30240ab5-b78a-490a-a135-d919671b12db-xtables-lock\") pod \"kube-proxy-wv4cr\" (UID: \"30240ab5-b78a-490a-a135-d919671b12db\") " pod="kube-system/kube-proxy-wv4cr" Feb 9 19:33:33.214144 kubelet[1378]: I0209 19:33:33.214070 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77-lib-modules\") pod \"calico-node-hcll2\" (UID: \"b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77\") " pod="calico-system/calico-node-hcll2" Feb 9 19:33:33.214144 kubelet[1378]: I0209 19:33:33.214125 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77-policysync\") pod \"calico-node-hcll2\" (UID: \"b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77\") " pod="calico-system/calico-node-hcll2" Feb 9 19:33:33.214329 kubelet[1378]: I0209 19:33:33.214192 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77-cni-log-dir\") pod \"calico-node-hcll2\" (UID: \"b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77\") " pod="calico-system/calico-node-hcll2" Feb 9 19:33:33.214409 kubelet[1378]: I0209 19:33:33.214343 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nk2x6\" (UniqueName: \"kubernetes.io/projected/b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77-kube-api-access-nk2x6\") pod \"calico-node-hcll2\" (UID: \"b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77\") " pod="calico-system/calico-node-hcll2" Feb 9 19:33:33.214409 kubelet[1378]: I0209 19:33:33.214402 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/30240ab5-b78a-490a-a135-d919671b12db-lib-modules\") pod \"kube-proxy-wv4cr\" (UID: \"30240ab5-b78a-490a-a135-d919671b12db\") " pod="kube-system/kube-proxy-wv4cr" Feb 9 19:33:33.214555 kubelet[1378]: I0209 19:33:33.214459 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cf9md\" (UniqueName: \"kubernetes.io/projected/30240ab5-b78a-490a-a135-d919671b12db-kube-api-access-cf9md\") pod \"kube-proxy-wv4cr\" (UID: \"30240ab5-b78a-490a-a135-d919671b12db\") " pod="kube-system/kube-proxy-wv4cr" Feb 9 19:33:33.214555 kubelet[1378]: I0209 19:33:33.214536 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77-tigera-ca-bundle\") pod \"calico-node-hcll2\" (UID: \"b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77\") " pod="calico-system/calico-node-hcll2" Feb 9 19:33:33.214764 kubelet[1378]: I0209 19:33:33.214599 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77-node-certs\") pod \"calico-node-hcll2\" (UID: \"b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77\") " pod="calico-system/calico-node-hcll2" Feb 9 19:33:33.214764 kubelet[1378]: I0209 19:33:33.214725 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77-flexvol-driver-host\") pod \"calico-node-hcll2\" (UID: \"b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77\") " pod="calico-system/calico-node-hcll2" Feb 9 19:33:33.214909 kubelet[1378]: I0209 19:33:33.214783 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77-var-run-calico\") pod \"calico-node-hcll2\" (UID: \"b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77\") " pod="calico-system/calico-node-hcll2" Feb 9 19:33:33.214909 kubelet[1378]: I0209 19:33:33.214854 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/52ed98cb-0e1f-483f-ada3-e6760f45d1cd-varrun\") pod \"csi-node-driver-xqgtg\" (UID: \"52ed98cb-0e1f-483f-ada3-e6760f45d1cd\") " pod="calico-system/csi-node-driver-xqgtg" Feb 9 19:33:33.215062 kubelet[1378]: I0209 19:33:33.214911 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/52ed98cb-0e1f-483f-ada3-e6760f45d1cd-kubelet-dir\") pod \"csi-node-driver-xqgtg\" (UID: \"52ed98cb-0e1f-483f-ada3-e6760f45d1cd\") " pod="calico-system/csi-node-driver-xqgtg" Feb 9 19:33:33.215062 kubelet[1378]: I0209 19:33:33.214931 1378 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:33:33.234871 systemd[1]: Created slice kubepods-besteffort-pod30240ab5_b78a_490a_a135_d919671b12db.slice. Feb 9 19:33:33.321445 kubelet[1378]: E0209 19:33:33.321396 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.321842 kubelet[1378]: W0209 19:33:33.321810 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.322029 kubelet[1378]: E0209 19:33:33.321994 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.322585 kubelet[1378]: E0209 19:33:33.322558 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.322808 kubelet[1378]: W0209 19:33:33.322776 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.322980 kubelet[1378]: E0209 19:33:33.322949 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.323439 kubelet[1378]: E0209 19:33:33.323414 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.323733 kubelet[1378]: W0209 19:33:33.323691 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.323958 kubelet[1378]: E0209 19:33:33.323921 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.324589 kubelet[1378]: E0209 19:33:33.324563 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.324816 kubelet[1378]: W0209 19:33:33.324787 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.324977 kubelet[1378]: E0209 19:33:33.324955 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.335378 kubelet[1378]: E0209 19:33:33.335344 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.335683 kubelet[1378]: W0209 19:33:33.335580 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.335866 kubelet[1378]: E0209 19:33:33.335841 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.392028 sshd[1188]: pam_unix(sshd:session): session closed for user core Feb 9 19:33:33.409864 kubelet[1378]: E0209 19:33:33.408767 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.409864 kubelet[1378]: W0209 19:33:33.408812 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.409864 kubelet[1378]: E0209 19:33:33.408852 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.417000 audit[1188]: USER_END pid=1188 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:33.417000 audit[1188]: CRED_DISP pid=1188 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 9 19:33:33.419802 kubelet[1378]: E0209 19:33:33.418938 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.419802 kubelet[1378]: W0209 19:33:33.418965 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.419802 kubelet[1378]: E0209 19:33:33.419021 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.421943 systemd[1]: sshd@6-172.24.4.156:22-172.24.4.1:40298.service: Deactivated successfully. Feb 9 19:33:33.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.156:22-172.24.4.1:40298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:33:33.423912 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:33:33.425442 systemd-logind[1053]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:33:33.427181 systemd-logind[1053]: Removed session 7. Feb 9 19:33:33.427829 kubelet[1378]: E0209 19:33:33.427751 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.428071 kubelet[1378]: W0209 19:33:33.428030 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.428295 kubelet[1378]: E0209 19:33:33.428267 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.428897 kubelet[1378]: E0209 19:33:33.428848 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.428897 kubelet[1378]: W0209 19:33:33.428882 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.429137 kubelet[1378]: E0209 19:33:33.428927 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.429523 kubelet[1378]: E0209 19:33:33.429480 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.429523 kubelet[1378]: W0209 19:33:33.429505 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.429795 kubelet[1378]: E0209 19:33:33.429538 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.430150 kubelet[1378]: E0209 19:33:33.430118 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.430311 kubelet[1378]: W0209 19:33:33.430160 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.430415 kubelet[1378]: E0209 19:33:33.430340 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.430793 kubelet[1378]: E0209 19:33:33.430765 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.430793 kubelet[1378]: W0209 19:33:33.430789 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.430973 kubelet[1378]: E0209 19:33:33.430820 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.431227 kubelet[1378]: E0209 19:33:33.431191 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.431227 kubelet[1378]: W0209 19:33:33.431219 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.431326 kubelet[1378]: E0209 19:33:33.431251 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.431591 kubelet[1378]: E0209 19:33:33.431569 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.431591 kubelet[1378]: W0209 19:33:33.431590 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.432032 kubelet[1378]: E0209 19:33:33.431680 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.432279 kubelet[1378]: E0209 19:33:33.432257 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.432335 kubelet[1378]: W0209 19:33:33.432279 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.432335 kubelet[1378]: E0209 19:33:33.432307 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.432629 kubelet[1378]: E0209 19:33:33.432584 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.432724 kubelet[1378]: W0209 19:33:33.432701 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.432783 kubelet[1378]: E0209 19:33:33.432744 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.433108 kubelet[1378]: E0209 19:33:33.433083 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.433170 kubelet[1378]: W0209 19:33:33.433106 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.433262 kubelet[1378]: E0209 19:33:33.433232 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.433825 kubelet[1378]: E0209 19:33:33.433803 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.433899 kubelet[1378]: W0209 19:33:33.433843 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.433899 kubelet[1378]: E0209 19:33:33.433892 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.434258 kubelet[1378]: E0209 19:33:33.434232 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.434313 kubelet[1378]: W0209 19:33:33.434260 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.434313 kubelet[1378]: E0209 19:33:33.434284 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.435174 kubelet[1378]: E0209 19:33:33.435141 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:33.435174 kubelet[1378]: W0209 19:33:33.435166 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:33.435270 kubelet[1378]: E0209 19:33:33.435188 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:33.532041 env[1060]: time="2024-02-09T19:33:33.531709544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hcll2,Uid:b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77,Namespace:calico-system,Attempt:0,}" Feb 9 19:33:33.544514 env[1060]: time="2024-02-09T19:33:33.544270669Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wv4cr,Uid:30240ab5-b78a-490a-a135-d919671b12db,Namespace:kube-system,Attempt:0,}" Feb 9 19:33:34.192029 kubelet[1378]: E0209 19:33:34.191717 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:34.610770 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3471399632.mount: Deactivated successfully. Feb 9 19:33:34.626560 env[1060]: time="2024-02-09T19:33:34.626400622Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:34.629652 env[1060]: time="2024-02-09T19:33:34.629559374Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:34.636499 env[1060]: time="2024-02-09T19:33:34.636405025Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:34.641744 env[1060]: time="2024-02-09T19:33:34.641572693Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:34.649841 env[1060]: time="2024-02-09T19:33:34.649756390Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:34.660798 env[1060]: time="2024-02-09T19:33:34.658470107Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:34.663115 env[1060]: time="2024-02-09T19:33:34.663029075Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:34.665102 env[1060]: time="2024-02-09T19:33:34.665032345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:34.718648 env[1060]: time="2024-02-09T19:33:34.707935395Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:33:34.718648 env[1060]: time="2024-02-09T19:33:34.707979827Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:33:34.718648 env[1060]: time="2024-02-09T19:33:34.707994234Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:33:34.718648 env[1060]: time="2024-02-09T19:33:34.708200730Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3e79a4c6e9593369b74c4eea37abacf3e392ba96f44cf8381a54b836de6c4f9c pid=1450 runtime=io.containerd.runc.v2 Feb 9 19:33:34.731311 env[1060]: time="2024-02-09T19:33:34.731185363Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:33:34.731533 env[1060]: time="2024-02-09T19:33:34.731507012Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:33:34.731671 env[1060]: time="2024-02-09T19:33:34.731645264Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:33:34.731960 env[1060]: time="2024-02-09T19:33:34.731929978Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8660cb1b1ae9e79cd93d815506d6dd7b0ce9b7d47baa660b44abe12bffd46fc5 pid=1469 runtime=io.containerd.runc.v2 Feb 9 19:33:34.757479 systemd[1]: Started cri-containerd-3e79a4c6e9593369b74c4eea37abacf3e392ba96f44cf8381a54b836de6c4f9c.scope. Feb 9 19:33:34.769359 systemd[1]: Started cri-containerd-8660cb1b1ae9e79cd93d815506d6dd7b0ce9b7d47baa660b44abe12bffd46fc5.scope. Feb 9 19:33:34.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.787000 audit: BPF prog-id=61 op=LOAD Feb 9 19:33:34.789000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.789000 audit[1481]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1469 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836363063623162316165396537396364393364383135353036643664 Feb 9 19:33:34.789000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.789000 audit[1481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1469 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836363063623162316165396537396364393364383135353036643664 Feb 9 19:33:34.789000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.789000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.789000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.789000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.789000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.789000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.789000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.789000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.789000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.789000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.789000 audit: BPF prog-id=62 op=LOAD Feb 9 19:33:34.789000 audit[1481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003badb0 items=0 ppid=1469 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836363063623162316165396537396364393364383135353036643664 Feb 9 19:33:34.790000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.790000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.790000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.790000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.790000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.790000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.790000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.790000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.790000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.790000 audit: BPF prog-id=63 op=LOAD Feb 9 19:33:34.790000 audit[1481]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003badf8 items=0 ppid=1469 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836363063623162316165396537396364393364383135353036643664 Feb 9 19:33:34.791000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:33:34.791000 audit: BPF prog-id=62 op=UNLOAD Feb 9 19:33:34.791000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.791000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.791000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.791000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.791000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.791000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.791000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.791000 audit[1481]: AVC avc: denied { perfmon } for pid=1481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.791000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.791000 audit[1481]: AVC avc: denied { bpf } for pid=1481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.791000 audit: BPF prog-id=64 op=LOAD Feb 9 19:33:34.791000 audit[1481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003bb208 items=0 ppid=1469 pid=1481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836363063623162316165396537396364393364383135353036643664 Feb 9 19:33:34.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.794000 audit: BPF prog-id=65 op=LOAD Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1450 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365373961346336653935393333363962373463346565613337616261 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1450 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365373961346336653935393333363962373463346565613337616261 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit: BPF prog-id=66 op=LOAD Feb 9 19:33:34.795000 audit[1470]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000337870 items=0 ppid=1450 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365373961346336653935393333363962373463346565613337616261 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.795000 audit: BPF prog-id=67 op=LOAD Feb 9 19:33:34.795000 audit[1470]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003378b8 items=0 ppid=1450 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365373961346336653935393333363962373463346565613337616261 Feb 9 19:33:34.795000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:33:34.796000 audit: BPF prog-id=66 op=UNLOAD Feb 9 19:33:34.796000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.796000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.796000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.796000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.796000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.796000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.796000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.796000 audit[1470]: AVC avc: denied { perfmon } for pid=1470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.796000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.796000 audit[1470]: AVC avc: denied { bpf } for pid=1470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:34.796000 audit: BPF prog-id=68 op=LOAD Feb 9 19:33:34.796000 audit[1470]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000337cc8 items=0 ppid=1450 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:34.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365373961346336653935393333363962373463346565613337616261 Feb 9 19:33:34.819323 env[1060]: time="2024-02-09T19:33:34.817467182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wv4cr,Uid:30240ab5-b78a-490a-a135-d919671b12db,Namespace:kube-system,Attempt:0,} returns sandbox id \"3e79a4c6e9593369b74c4eea37abacf3e392ba96f44cf8381a54b836de6c4f9c\"" Feb 9 19:33:34.820045 env[1060]: time="2024-02-09T19:33:34.820008352Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 19:33:34.822175 env[1060]: time="2024-02-09T19:33:34.822101702Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hcll2,Uid:b660ceeb-5b0e-49b3-93ca-a7c38e5e3e77,Namespace:calico-system,Attempt:0,} returns sandbox id \"8660cb1b1ae9e79cd93d815506d6dd7b0ce9b7d47baa660b44abe12bffd46fc5\"" Feb 9 19:33:35.192383 kubelet[1378]: E0209 19:33:35.192313 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:35.441527 kubelet[1378]: E0209 19:33:35.441424 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqgtg" podUID=52ed98cb-0e1f-483f-ada3-e6760f45d1cd Feb 9 19:33:36.193252 kubelet[1378]: E0209 19:33:36.193145 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:36.453465 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2431381212.mount: Deactivated successfully. Feb 9 19:33:37.194308 kubelet[1378]: E0209 19:33:37.194212 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:37.440956 kubelet[1378]: E0209 19:33:37.440420 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqgtg" podUID=52ed98cb-0e1f-483f-ada3-e6760f45d1cd Feb 9 19:33:37.602251 env[1060]: time="2024-02-09T19:33:37.602079753Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:37.608314 env[1060]: time="2024-02-09T19:33:37.608178688Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:37.613071 env[1060]: time="2024-02-09T19:33:37.612991466Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:37.616500 env[1060]: time="2024-02-09T19:33:37.616429438Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:37.617662 env[1060]: time="2024-02-09T19:33:37.617523924Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 9 19:33:37.620200 env[1060]: time="2024-02-09T19:33:37.620110373Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:33:37.625864 env[1060]: time="2024-02-09T19:33:37.625764908Z" level=info msg="CreateContainer within sandbox \"3e79a4c6e9593369b74c4eea37abacf3e392ba96f44cf8381a54b836de6c4f9c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:33:37.664284 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount204061838.mount: Deactivated successfully. Feb 9 19:33:37.682787 env[1060]: time="2024-02-09T19:33:37.682661698Z" level=info msg="CreateContainer within sandbox \"3e79a4c6e9593369b74c4eea37abacf3e392ba96f44cf8381a54b836de6c4f9c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5a94a80aa59d9320f2252f87f9e6ada6b624a852094d7326049a4c6f6d965c6f\"" Feb 9 19:33:37.684174 env[1060]: time="2024-02-09T19:33:37.684104493Z" level=info msg="StartContainer for \"5a94a80aa59d9320f2252f87f9e6ada6b624a852094d7326049a4c6f6d965c6f\"" Feb 9 19:33:37.729436 systemd[1]: Started cri-containerd-5a94a80aa59d9320f2252f87f9e6ada6b624a852094d7326049a4c6f6d965c6f.scope. Feb 9 19:33:37.773419 kernel: kauditd_printk_skb: 330 callbacks suppressed Feb 9 19:33:37.773750 kernel: audit: type=1400 audit(1707507217.762:587): avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.773806 kernel: audit: type=1300 audit(1707507217.762:587): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1450 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:37.762000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.762000 audit[1532]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1450 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:37.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393461383061613539643933323066323235326638376639653661 Feb 9 19:33:37.763000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.782689 kernel: audit: type=1327 audit(1707507217.762:587): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393461383061613539643933323066323235326638376639653661 Feb 9 19:33:37.782766 kernel: audit: type=1400 audit(1707507217.763:588): avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.763000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.787053 kernel: audit: type=1400 audit(1707507217.763:588): avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.787303 kernel: audit: type=1400 audit(1707507217.763:588): avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.763000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.763000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.795645 kernel: audit: type=1400 audit(1707507217.763:588): avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.763000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.805578 kernel: audit: type=1400 audit(1707507217.763:588): avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.805758 kernel: audit: type=1400 audit(1707507217.763:588): avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.805780 kernel: audit: type=1400 audit(1707507217.763:588): avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.763000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.763000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.763000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.763000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.763000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.763000 audit: BPF prog-id=69 op=LOAD Feb 9 19:33:37.763000 audit[1532]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003e0100 items=0 ppid=1450 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:37.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393461383061613539643933323066323235326638376639653661 Feb 9 19:33:37.767000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.767000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.767000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.767000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.767000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.767000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.767000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.767000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.767000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.767000 audit: BPF prog-id=70 op=LOAD Feb 9 19:33:37.767000 audit[1532]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003e0148 items=0 ppid=1450 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:37.767000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393461383061613539643933323066323235326638376639653661 Feb 9 19:33:37.773000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:33:37.773000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:33:37.773000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.773000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.773000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.773000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.773000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.773000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.773000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.773000 audit[1532]: AVC avc: denied { perfmon } for pid=1532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.773000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.773000 audit[1532]: AVC avc: denied { bpf } for pid=1532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:37.773000 audit: BPF prog-id=71 op=LOAD Feb 9 19:33:37.773000 audit[1532]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003e01d8 items=0 ppid=1450 pid=1532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:37.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561393461383061613539643933323066323235326638376639653661 Feb 9 19:33:37.830402 env[1060]: time="2024-02-09T19:33:37.830328188Z" level=info msg="StartContainer for \"5a94a80aa59d9320f2252f87f9e6ada6b624a852094d7326049a4c6f6d965c6f\" returns successfully" Feb 9 19:33:37.908000 audit[1583]: NETFILTER_CFG table=mangle:14 family=2 entries=1 op=nft_register_chain pid=1583 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:37.908000 audit[1583]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff7094e6d0 a2=0 a3=7fff7094e6bc items=0 ppid=1543 pid=1583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:37.908000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:33:37.916000 audit[1585]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1585 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:37.916000 audit[1585]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8e389340 a2=0 a3=7fff8e38932c items=0 ppid=1543 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:37.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:33:37.917000 audit[1584]: NETFILTER_CFG table=mangle:16 family=10 entries=1 op=nft_register_chain pid=1584 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:37.917000 audit[1584]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd100610d0 a2=0 a3=7ffd100610bc items=0 ppid=1543 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:37.917000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:33:37.919000 audit[1586]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1586 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:37.919000 audit[1586]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8f9786e0 a2=0 a3=7fff8f9786cc items=0 ppid=1543 pid=1586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:37.919000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:33:37.922000 audit[1588]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=1588 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:37.922000 audit[1588]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd75e81630 a2=0 a3=7ffd75e8161c items=0 ppid=1543 pid=1588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:37.922000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:33:37.924000 audit[1589]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=1589 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:37.924000 audit[1589]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd68a6a7d0 a2=0 a3=7ffd68a6a7bc items=0 ppid=1543 pid=1589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:37.924000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:33:38.020000 audit[1590]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=1590 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.020000 audit[1590]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff6836d650 a2=0 a3=7fff6836d63c items=0 ppid=1543 pid=1590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:33:38.027000 audit[1592]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1592 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.027000 audit[1592]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffa7a99d00 a2=0 a3=7fffa7a99cec items=0 ppid=1543 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:33:38.037000 audit[1595]: NETFILTER_CFG table=filter:22 family=2 entries=2 op=nft_register_chain pid=1595 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.037000 audit[1595]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffec1c848c0 a2=0 a3=7ffec1c848ac items=0 ppid=1543 pid=1595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:33:38.040000 audit[1596]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=1596 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.040000 audit[1596]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7b5be090 a2=0 a3=7ffe7b5be07c items=0 ppid=1543 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:33:38.046000 audit[1598]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1598 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.046000 audit[1598]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc3b3e51e0 a2=0 a3=7ffc3b3e51cc items=0 ppid=1543 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:33:38.050000 audit[1599]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1599 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.050000 audit[1599]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2e4c8680 a2=0 a3=7fff2e4c866c items=0 ppid=1543 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:33:38.058000 audit[1601]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1601 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.058000 audit[1601]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc5dd06a90 a2=0 a3=7ffc5dd06a7c items=0 ppid=1543 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.058000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:33:38.068000 audit[1604]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1604 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.068000 audit[1604]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc423934c0 a2=0 a3=7ffc423934ac items=0 ppid=1543 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:33:38.071000 audit[1605]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=1605 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.071000 audit[1605]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccc489420 a2=0 a3=7ffccc48940c items=0 ppid=1543 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.071000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:33:38.078000 audit[1607]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.078000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd2508f950 a2=0 a3=7ffd2508f93c items=0 ppid=1543 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.078000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:33:38.081000 audit[1608]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=1608 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.081000 audit[1608]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe74298ea0 a2=0 a3=7ffe74298e8c items=0 ppid=1543 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:33:38.088000 audit[1610]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1610 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.088000 audit[1610]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc77c02c10 a2=0 a3=7ffc77c02bfc items=0 ppid=1543 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:33:38.100000 audit[1613]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=1613 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.100000 audit[1613]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff717a0240 a2=0 a3=7fff717a022c items=0 ppid=1543 pid=1613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:33:38.112000 audit[1616]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=1616 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.112000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffda32f7080 a2=0 a3=7ffda32f706c items=0 ppid=1543 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:33:38.116000 audit[1617]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1617 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.116000 audit[1617]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe151e8360 a2=0 a3=7ffe151e834c items=0 ppid=1543 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:33:38.122000 audit[1619]: NETFILTER_CFG table=nat:35 family=2 entries=2 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.122000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffeb7e67e20 a2=0 a3=7ffeb7e67e0c items=0 ppid=1543 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:33:38.196389 kubelet[1378]: E0209 19:33:38.196286 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:38.198000 audit[1624]: NETFILTER_CFG table=nat:36 family=2 entries=2 op=nft_register_chain pid=1624 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.198000 audit[1624]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd9d93d880 a2=0 a3=7ffd9d93d86c items=0 ppid=1543 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:33:38.206000 audit[1629]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.206000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd4bc5180 a2=0 a3=7fffd4bc516c items=0 ppid=1543 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.206000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:33:38.211000 audit[1631]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:33:38.211000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffef4f72200 a2=0 a3=7ffef4f721ec items=0 ppid=1543 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.211000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:33:38.221000 audit[1633]: NETFILTER_CFG table=filter:39 family=2 entries=5 op=nft_register_rule pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:38.221000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe41d17890 a2=0 a3=7ffe41d1787c items=0 ppid=1543 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.221000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:38.261000 audit[1633]: NETFILTER_CFG table=nat:40 family=2 entries=54 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:33:38.261000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe41d17890 a2=0 a3=7ffe41d1787c items=0 ppid=1543 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:38.278000 audit[1641]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=1641 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.278000 audit[1641]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe46fb23f0 a2=0 a3=7ffe46fb23dc items=0 ppid=1543 pid=1641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:33:38.282000 audit[1643]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.282000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd5b0b6010 a2=0 a3=7ffd5b0b5ffc items=0 ppid=1543 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.282000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:33:38.286000 audit[1646]: NETFILTER_CFG table=filter:43 family=10 entries=2 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.286000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff902567a0 a2=0 a3=7fff9025678c items=0 ppid=1543 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.286000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:33:38.288000 audit[1647]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.288000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcef72a5a0 a2=0 a3=7ffcef72a58c items=0 ppid=1543 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:33:38.291000 audit[1649]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_rule pid=1649 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.291000 audit[1649]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff53e847f0 a2=0 a3=7fff53e847dc items=0 ppid=1543 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.291000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:33:38.292000 audit[1650]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.292000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe07f2e120 a2=0 a3=7ffe07f2e10c items=0 ppid=1543 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:33:38.295000 audit[1652]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_rule pid=1652 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.295000 audit[1652]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffccbca9440 a2=0 a3=7ffccbca942c items=0 ppid=1543 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.295000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:33:38.300000 audit[1655]: NETFILTER_CFG table=filter:48 family=10 entries=2 op=nft_register_chain pid=1655 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.300000 audit[1655]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff11738300 a2=0 a3=7fff117382ec items=0 ppid=1543 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:33:38.301000 audit[1656]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=1656 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.301000 audit[1656]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe24d72940 a2=0 a3=7ffe24d7292c items=0 ppid=1543 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:33:38.304000 audit[1658]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=1658 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.304000 audit[1658]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe1de50240 a2=0 a3=7ffe1de5022c items=0 ppid=1543 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.304000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:33:38.306000 audit[1659]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.306000 audit[1659]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd0f22cb0 a2=0 a3=7fffd0f22c9c items=0 ppid=1543 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:33:38.309000 audit[1661]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_rule pid=1661 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.309000 audit[1661]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcaf7640b0 a2=0 a3=7ffcaf76409c items=0 ppid=1543 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:33:38.313000 audit[1664]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=1664 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.313000 audit[1664]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3d9ade60 a2=0 a3=7ffe3d9ade4c items=0 ppid=1543 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:33:38.318000 audit[1667]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=1667 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.318000 audit[1667]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe79cd1ab0 a2=0 a3=7ffe79cd1a9c items=0 ppid=1543 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.318000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:33:38.320000 audit[1668]: NETFILTER_CFG table=nat:55 family=10 entries=1 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.320000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffa90e8370 a2=0 a3=7fffa90e835c items=0 ppid=1543 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:33:38.323000 audit[1670]: NETFILTER_CFG table=nat:56 family=10 entries=2 op=nft_register_chain pid=1670 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.323000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffffbeb1f00 a2=0 a3=7ffffbeb1eec items=0 ppid=1543 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:33:38.328000 audit[1673]: NETFILTER_CFG table=nat:57 family=10 entries=2 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.328000 audit[1673]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc1ac07d20 a2=0 a3=7ffc1ac07d0c items=0 ppid=1543 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:33:38.329000 audit[1674]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_chain pid=1674 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.329000 audit[1674]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccbe28c10 a2=0 a3=7ffccbe28bfc items=0 ppid=1543 pid=1674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:33:38.333000 audit[1676]: NETFILTER_CFG table=filter:59 family=10 entries=1 op=nft_register_rule pid=1676 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.333000 audit[1676]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe1db77d50 a2=0 a3=7ffe1db77d3c items=0 ppid=1543 pid=1676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:33:38.339000 audit[1679]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_rule pid=1679 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.339000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeb63f0910 a2=0 a3=7ffeb63f08fc items=0 ppid=1543 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:33:38.341000 audit[1680]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.341000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd1dcb720 a2=0 a3=7ffdd1dcb70c items=0 ppid=1543 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:33:38.344000 audit[1682]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:33:38.344000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe35e541c0 a2=0 a3=7ffe35e541ac items=0 ppid=1543 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:33:38.350000 audit[1684]: NETFILTER_CFG table=filter:63 family=10 entries=3 op=nft_register_rule pid=1684 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:33:38.350000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffc0532e0c0 a2=0 a3=7ffc0532e0ac items=0 ppid=1543 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.350000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:38.351000 audit[1684]: NETFILTER_CFG table=nat:64 family=10 entries=7 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:33:38.351000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffc0532e0c0 a2=0 a3=7ffc0532e0ac items=0 ppid=1543 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:38.351000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:33:38.555685 kubelet[1378]: E0209 19:33:38.548862 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.555685 kubelet[1378]: W0209 19:33:38.549686 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.555685 kubelet[1378]: E0209 19:33:38.549806 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.555685 kubelet[1378]: E0209 19:33:38.550600 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.555685 kubelet[1378]: W0209 19:33:38.550725 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.555685 kubelet[1378]: E0209 19:33:38.550803 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.555685 kubelet[1378]: E0209 19:33:38.551372 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.555685 kubelet[1378]: W0209 19:33:38.551399 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.555685 kubelet[1378]: E0209 19:33:38.551436 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.555685 kubelet[1378]: E0209 19:33:38.552101 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.556974 kubelet[1378]: W0209 19:33:38.552127 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.556974 kubelet[1378]: E0209 19:33:38.552168 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.556974 kubelet[1378]: E0209 19:33:38.552789 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.556974 kubelet[1378]: W0209 19:33:38.552814 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.556974 kubelet[1378]: E0209 19:33:38.552849 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.556974 kubelet[1378]: E0209 19:33:38.553360 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.556974 kubelet[1378]: W0209 19:33:38.553387 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.556974 kubelet[1378]: E0209 19:33:38.553430 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.556974 kubelet[1378]: E0209 19:33:38.554228 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.556974 kubelet[1378]: W0209 19:33:38.554253 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.558080 kubelet[1378]: E0209 19:33:38.554291 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.558080 kubelet[1378]: E0209 19:33:38.554788 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.558080 kubelet[1378]: W0209 19:33:38.554832 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.558080 kubelet[1378]: E0209 19:33:38.554878 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.558080 kubelet[1378]: E0209 19:33:38.555330 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.558080 kubelet[1378]: W0209 19:33:38.555355 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.558080 kubelet[1378]: E0209 19:33:38.555389 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.558080 kubelet[1378]: E0209 19:33:38.556029 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.558080 kubelet[1378]: W0209 19:33:38.556055 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.558080 kubelet[1378]: E0209 19:33:38.556092 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.559292 kubelet[1378]: E0209 19:33:38.556480 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.559292 kubelet[1378]: W0209 19:33:38.556549 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.559292 kubelet[1378]: E0209 19:33:38.556589 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.559292 kubelet[1378]: E0209 19:33:38.557070 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.559292 kubelet[1378]: W0209 19:33:38.557124 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.559292 kubelet[1378]: E0209 19:33:38.557164 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.559292 kubelet[1378]: E0209 19:33:38.557572 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.559292 kubelet[1378]: W0209 19:33:38.557597 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.559292 kubelet[1378]: E0209 19:33:38.557714 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.559292 kubelet[1378]: E0209 19:33:38.558181 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.563328 kubelet[1378]: W0209 19:33:38.558207 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.563328 kubelet[1378]: E0209 19:33:38.558246 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.563328 kubelet[1378]: E0209 19:33:38.558724 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.563328 kubelet[1378]: W0209 19:33:38.558752 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.563328 kubelet[1378]: E0209 19:33:38.558790 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.563328 kubelet[1378]: E0209 19:33:38.559190 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.563328 kubelet[1378]: W0209 19:33:38.559216 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.563328 kubelet[1378]: E0209 19:33:38.559252 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.579995 kubelet[1378]: E0209 19:33:38.579684 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.579995 kubelet[1378]: W0209 19:33:38.579729 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.579995 kubelet[1378]: E0209 19:33:38.579774 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.580504 kubelet[1378]: E0209 19:33:38.580372 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.580504 kubelet[1378]: W0209 19:33:38.580399 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.580504 kubelet[1378]: E0209 19:33:38.580461 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.581029 kubelet[1378]: E0209 19:33:38.580966 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.581029 kubelet[1378]: W0209 19:33:38.581008 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.581318 kubelet[1378]: E0209 19:33:38.581067 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.581674 kubelet[1378]: E0209 19:33:38.581571 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.581674 kubelet[1378]: W0209 19:33:38.581660 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.581937 kubelet[1378]: E0209 19:33:38.581880 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.582256 kubelet[1378]: E0209 19:33:38.582199 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.582256 kubelet[1378]: W0209 19:33:38.582236 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.582528 kubelet[1378]: E0209 19:33:38.582291 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.582873 kubelet[1378]: E0209 19:33:38.582836 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.582873 kubelet[1378]: W0209 19:33:38.582873 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.583144 kubelet[1378]: E0209 19:33:38.582923 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.583435 kubelet[1378]: E0209 19:33:38.583399 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.583435 kubelet[1378]: W0209 19:33:38.583434 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.583811 kubelet[1378]: E0209 19:33:38.583728 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.584115 kubelet[1378]: E0209 19:33:38.584079 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.584115 kubelet[1378]: W0209 19:33:38.584113 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.584376 kubelet[1378]: E0209 19:33:38.584163 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.584869 kubelet[1378]: E0209 19:33:38.584833 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.584869 kubelet[1378]: W0209 19:33:38.584869 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.585112 kubelet[1378]: E0209 19:33:38.584916 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.585934 kubelet[1378]: E0209 19:33:38.585894 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.585934 kubelet[1378]: W0209 19:33:38.585931 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.586316 kubelet[1378]: E0209 19:33:38.586285 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.586579 kubelet[1378]: E0209 19:33:38.586384 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.586851 kubelet[1378]: W0209 19:33:38.586815 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.587019 kubelet[1378]: E0209 19:33:38.586996 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:38.587939 kubelet[1378]: E0209 19:33:38.587906 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:38.588116 kubelet[1378]: W0209 19:33:38.588088 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:38.588294 kubelet[1378]: E0209 19:33:38.588270 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.197213 kubelet[1378]: E0209 19:33:39.197119 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:39.441730 kubelet[1378]: E0209 19:33:39.440997 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqgtg" podUID=52ed98cb-0e1f-483f-ada3-e6760f45d1cd Feb 9 19:33:39.489507 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3413694264.mount: Deactivated successfully. Feb 9 19:33:39.568577 kubelet[1378]: E0209 19:33:39.568218 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.568577 kubelet[1378]: W0209 19:33:39.568245 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.568577 kubelet[1378]: E0209 19:33:39.568272 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.568577 kubelet[1378]: E0209 19:33:39.568485 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.568577 kubelet[1378]: W0209 19:33:39.568493 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.568577 kubelet[1378]: E0209 19:33:39.568506 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.569268 kubelet[1378]: E0209 19:33:39.568960 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.569268 kubelet[1378]: W0209 19:33:39.568972 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.569268 kubelet[1378]: E0209 19:33:39.568986 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.569268 kubelet[1378]: E0209 19:33:39.569174 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.569268 kubelet[1378]: W0209 19:33:39.569183 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.569268 kubelet[1378]: E0209 19:33:39.569195 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.569837 kubelet[1378]: E0209 19:33:39.569519 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.569837 kubelet[1378]: W0209 19:33:39.569530 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.569837 kubelet[1378]: E0209 19:33:39.569543 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.569837 kubelet[1378]: E0209 19:33:39.569724 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.569837 kubelet[1378]: W0209 19:33:39.569733 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.569837 kubelet[1378]: E0209 19:33:39.569744 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.570204 kubelet[1378]: E0209 19:33:39.570082 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.570204 kubelet[1378]: W0209 19:33:39.570093 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.570204 kubelet[1378]: E0209 19:33:39.570105 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.570866 kubelet[1378]: E0209 19:33:39.570519 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.570866 kubelet[1378]: W0209 19:33:39.570529 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.570866 kubelet[1378]: E0209 19:33:39.570542 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.570866 kubelet[1378]: E0209 19:33:39.570731 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.570866 kubelet[1378]: W0209 19:33:39.570739 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.570866 kubelet[1378]: E0209 19:33:39.570750 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.571127 kubelet[1378]: E0209 19:33:39.571114 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.571193 kubelet[1378]: W0209 19:33:39.571181 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.571258 kubelet[1378]: E0209 19:33:39.571248 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.571472 kubelet[1378]: E0209 19:33:39.571460 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.571546 kubelet[1378]: W0209 19:33:39.571535 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.571646 kubelet[1378]: E0209 19:33:39.571633 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.571847 kubelet[1378]: E0209 19:33:39.571835 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.571914 kubelet[1378]: W0209 19:33:39.571903 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.571976 kubelet[1378]: E0209 19:33:39.571967 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.572229 kubelet[1378]: E0209 19:33:39.572208 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.572300 kubelet[1378]: W0209 19:33:39.572289 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.572376 kubelet[1378]: E0209 19:33:39.572366 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.572587 kubelet[1378]: E0209 19:33:39.572576 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.572686 kubelet[1378]: W0209 19:33:39.572674 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.572761 kubelet[1378]: E0209 19:33:39.572742 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.573117 kubelet[1378]: E0209 19:33:39.573104 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.573193 kubelet[1378]: W0209 19:33:39.573181 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.573261 kubelet[1378]: E0209 19:33:39.573251 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.573542 kubelet[1378]: E0209 19:33:39.573531 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.573722 kubelet[1378]: W0209 19:33:39.573705 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.573807 kubelet[1378]: E0209 19:33:39.573797 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.587464 kubelet[1378]: E0209 19:33:39.587413 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.587464 kubelet[1378]: W0209 19:33:39.587462 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.587687 kubelet[1378]: E0209 19:33:39.587516 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.588067 kubelet[1378]: E0209 19:33:39.588038 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.588142 kubelet[1378]: W0209 19:33:39.588069 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.588142 kubelet[1378]: E0209 19:33:39.588117 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.588585 kubelet[1378]: E0209 19:33:39.588556 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.588646 kubelet[1378]: W0209 19:33:39.588587 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.588696 kubelet[1378]: E0209 19:33:39.588668 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.589054 kubelet[1378]: E0209 19:33:39.589026 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.589054 kubelet[1378]: W0209 19:33:39.589056 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.589141 kubelet[1378]: E0209 19:33:39.589101 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.589470 kubelet[1378]: E0209 19:33:39.589443 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.589521 kubelet[1378]: W0209 19:33:39.589473 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.589683 kubelet[1378]: E0209 19:33:39.589629 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.589918 kubelet[1378]: E0209 19:33:39.589890 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.589973 kubelet[1378]: W0209 19:33:39.589926 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.590007 kubelet[1378]: E0209 19:33:39.589987 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.590375 kubelet[1378]: E0209 19:33:39.590346 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.590433 kubelet[1378]: W0209 19:33:39.590376 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.590433 kubelet[1378]: E0209 19:33:39.590423 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.590889 kubelet[1378]: E0209 19:33:39.590859 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.590943 kubelet[1378]: W0209 19:33:39.590891 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.590975 kubelet[1378]: E0209 19:33:39.590943 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.591360 kubelet[1378]: E0209 19:33:39.591330 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.591418 kubelet[1378]: W0209 19:33:39.591361 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.591750 kubelet[1378]: E0209 19:33:39.591515 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.591846 kubelet[1378]: E0209 19:33:39.591816 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.591899 kubelet[1378]: W0209 19:33:39.591848 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.591933 kubelet[1378]: E0209 19:33:39.591899 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.592347 kubelet[1378]: E0209 19:33:39.592281 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.592347 kubelet[1378]: W0209 19:33:39.592295 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.592347 kubelet[1378]: E0209 19:33:39.592313 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:39.592764 kubelet[1378]: E0209 19:33:39.592734 1378 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:33:39.592807 kubelet[1378]: W0209 19:33:39.592766 1378 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:33:39.592844 kubelet[1378]: E0209 19:33:39.592799 1378 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:33:40.198492 kubelet[1378]: E0209 19:33:40.198367 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:40.903374 env[1060]: time="2024-02-09T19:33:40.903228128Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:40.911890 env[1060]: time="2024-02-09T19:33:40.911812158Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:40.920514 env[1060]: time="2024-02-09T19:33:40.918681045Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:40.924417 env[1060]: time="2024-02-09T19:33:40.924369446Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:33:40.924582 env[1060]: time="2024-02-09T19:33:40.922668609Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:40.928437 env[1060]: time="2024-02-09T19:33:40.928327447Z" level=info msg="CreateContainer within sandbox \"8660cb1b1ae9e79cd93d815506d6dd7b0ce9b7d47baa660b44abe12bffd46fc5\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:33:40.969854 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3633693831.mount: Deactivated successfully. Feb 9 19:33:41.003850 env[1060]: time="2024-02-09T19:33:41.003667523Z" level=info msg="CreateContainer within sandbox \"8660cb1b1ae9e79cd93d815506d6dd7b0ce9b7d47baa660b44abe12bffd46fc5\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0c7e80f47eea0c484343cfb9b6d85747c9d02641950237edffed4b54e5f7be0c\"" Feb 9 19:33:41.005535 env[1060]: time="2024-02-09T19:33:41.005430025Z" level=info msg="StartContainer for \"0c7e80f47eea0c484343cfb9b6d85747c9d02641950237edffed4b54e5f7be0c\"" Feb 9 19:33:41.066946 systemd[1]: run-containerd-runc-k8s.io-0c7e80f47eea0c484343cfb9b6d85747c9d02641950237edffed4b54e5f7be0c-runc.EvApTd.mount: Deactivated successfully. Feb 9 19:33:41.076269 systemd[1]: Started cri-containerd-0c7e80f47eea0c484343cfb9b6d85747c9d02641950237edffed4b54e5f7be0c.scope. Feb 9 19:33:41.094000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.094000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1469 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:41.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063376538306634376565613063343834333433636662396236643835 Feb 9 19:33:41.094000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.094000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.094000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.094000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.094000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.094000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.094000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.094000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.094000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.094000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.094000 audit: BPF prog-id=72 op=LOAD Feb 9 19:33:41.094000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0000247e0 items=0 ppid=1469 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:41.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063376538306634376565613063343834333433636662396236643835 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit: BPF prog-id=73 op=LOAD Feb 9 19:33:41.096000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024828 items=0 ppid=1469 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:41.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063376538306634376565613063343834333433636662396236643835 Feb 9 19:33:41.096000 audit: BPF prog-id=73 op=UNLOAD Feb 9 19:33:41.096000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { perfmon } for pid=1749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit[1749]: AVC avc: denied { bpf } for pid=1749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:41.096000 audit: BPF prog-id=74 op=LOAD Feb 9 19:33:41.096000 audit[1749]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000248b8 items=0 ppid=1469 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:41.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063376538306634376565613063343834333433636662396236643835 Feb 9 19:33:41.126210 env[1060]: time="2024-02-09T19:33:41.126125660Z" level=info msg="StartContainer for \"0c7e80f47eea0c484343cfb9b6d85747c9d02641950237edffed4b54e5f7be0c\" returns successfully" Feb 9 19:33:41.131634 systemd[1]: cri-containerd-0c7e80f47eea0c484343cfb9b6d85747c9d02641950237edffed4b54e5f7be0c.scope: Deactivated successfully. Feb 9 19:33:41.134000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:33:41.201019 kubelet[1378]: E0209 19:33:41.199393 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:41.442257 kubelet[1378]: E0209 19:33:41.442167 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqgtg" podUID=52ed98cb-0e1f-483f-ada3-e6760f45d1cd Feb 9 19:33:41.625641 kubelet[1378]: I0209 19:33:41.625551 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-wv4cr" podStartSLOduration=6.826166438 podCreationTimestamp="2024-02-09 19:33:32 +0000 UTC" firstStartedPulling="2024-02-09 19:33:34.819137926 +0000 UTC m=+4.197146615" lastFinishedPulling="2024-02-09 19:33:37.618434429 +0000 UTC m=+6.996443198" observedRunningTime="2024-02-09 19:33:38.49159251 +0000 UTC m=+7.869601259" watchObservedRunningTime="2024-02-09 19:33:41.625463021 +0000 UTC m=+11.003471750" Feb 9 19:33:41.721012 env[1060]: time="2024-02-09T19:33:41.720719761Z" level=info msg="shim disconnected" id=0c7e80f47eea0c484343cfb9b6d85747c9d02641950237edffed4b54e5f7be0c Feb 9 19:33:41.721354 env[1060]: time="2024-02-09T19:33:41.721035238Z" level=warning msg="cleaning up after shim disconnected" id=0c7e80f47eea0c484343cfb9b6d85747c9d02641950237edffed4b54e5f7be0c namespace=k8s.io Feb 9 19:33:41.721354 env[1060]: time="2024-02-09T19:33:41.721070114Z" level=info msg="cleaning up dead shim" Feb 9 19:33:41.740504 env[1060]: time="2024-02-09T19:33:41.740383911Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:33:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1791 runtime=io.containerd.runc.v2\n" Feb 9 19:33:41.963674 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0c7e80f47eea0c484343cfb9b6d85747c9d02641950237edffed4b54e5f7be0c-rootfs.mount: Deactivated successfully. Feb 9 19:33:42.199709 kubelet[1378]: E0209 19:33:42.199588 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:42.504645 env[1060]: time="2024-02-09T19:33:42.504348380Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:33:43.200459 kubelet[1378]: E0209 19:33:43.200368 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:43.441350 kubelet[1378]: E0209 19:33:43.441258 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqgtg" podUID=52ed98cb-0e1f-483f-ada3-e6760f45d1cd Feb 9 19:33:44.201678 kubelet[1378]: E0209 19:33:44.201472 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:44.339359 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3907347749.mount: Deactivated successfully. Feb 9 19:33:45.201968 kubelet[1378]: E0209 19:33:45.201883 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:45.444149 kubelet[1378]: E0209 19:33:45.444089 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqgtg" podUID=52ed98cb-0e1f-483f-ada3-e6760f45d1cd Feb 9 19:33:46.203080 kubelet[1378]: E0209 19:33:46.202911 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:47.203969 kubelet[1378]: E0209 19:33:47.203794 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:47.440860 kubelet[1378]: E0209 19:33:47.440777 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqgtg" podUID=52ed98cb-0e1f-483f-ada3-e6760f45d1cd Feb 9 19:33:47.803691 update_engine[1054]: I0209 19:33:47.801883 1054 update_attempter.cc:509] Updating boot flags... Feb 9 19:33:48.204767 kubelet[1378]: E0209 19:33:48.204696 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:49.205439 kubelet[1378]: E0209 19:33:49.205274 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:49.443042 kubelet[1378]: E0209 19:33:49.442943 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqgtg" podUID=52ed98cb-0e1f-483f-ada3-e6760f45d1cd Feb 9 19:33:50.205972 kubelet[1378]: E0209 19:33:50.205859 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:51.189506 kubelet[1378]: E0209 19:33:51.189309 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:51.206890 kubelet[1378]: E0209 19:33:51.206748 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:51.275690 env[1060]: time="2024-02-09T19:33:51.275502708Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:51.281780 env[1060]: time="2024-02-09T19:33:51.281700913Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:51.285557 env[1060]: time="2024-02-09T19:33:51.285428606Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:51.291807 env[1060]: time="2024-02-09T19:33:51.291702981Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:33:51.293671 env[1060]: time="2024-02-09T19:33:51.293556710Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:33:51.300500 env[1060]: time="2024-02-09T19:33:51.300418434Z" level=info msg="CreateContainer within sandbox \"8660cb1b1ae9e79cd93d815506d6dd7b0ce9b7d47baa660b44abe12bffd46fc5\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:33:51.333165 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount639613955.mount: Deactivated successfully. Feb 9 19:33:51.442784 kubelet[1378]: E0209 19:33:51.441539 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqgtg" podUID=52ed98cb-0e1f-483f-ada3-e6760f45d1cd Feb 9 19:33:51.570272 env[1060]: time="2024-02-09T19:33:51.570164393Z" level=info msg="CreateContainer within sandbox \"8660cb1b1ae9e79cd93d815506d6dd7b0ce9b7d47baa660b44abe12bffd46fc5\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6c1c61e6337c10b0d18fa1cc1195766e566453b9fdf45dc927d14975ef8f5f2e\"" Feb 9 19:33:51.571265 env[1060]: time="2024-02-09T19:33:51.571179132Z" level=info msg="StartContainer for \"6c1c61e6337c10b0d18fa1cc1195766e566453b9fdf45dc927d14975ef8f5f2e\"" Feb 9 19:33:51.640080 systemd[1]: run-containerd-runc-k8s.io-6c1c61e6337c10b0d18fa1cc1195766e566453b9fdf45dc927d14975ef8f5f2e-runc.Pwnhxy.mount: Deactivated successfully. Feb 9 19:33:51.645292 systemd[1]: Started cri-containerd-6c1c61e6337c10b0d18fa1cc1195766e566453b9fdf45dc927d14975ef8f5f2e.scope. Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.676398 kernel: kauditd_printk_skb: 230 callbacks suppressed Feb 9 19:33:51.676491 kernel: audit: type=1400 audit(1707507231.672:651): avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1469 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:51.685428 kernel: audit: type=1300 audit(1707507231.672:651): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1469 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:51.685512 kernel: audit: type=1327 audit(1707507231.672:651): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316336316536333337633130623064313866613163633131393537 Feb 9 19:33:51.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316336316536333337633130623064313866613163633131393537 Feb 9 19:33:51.691651 kernel: audit: type=1400 audit(1707507231.672:652): avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.699762 kernel: audit: type=1400 audit(1707507231.672:652): avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.699841 kernel: audit: type=1400 audit(1707507231.672:652): avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.706736 kernel: audit: type=1400 audit(1707507231.672:652): avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.710629 kernel: audit: type=1400 audit(1707507231.672:652): avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.714362 kernel: audit: type=1400 audit(1707507231.672:652): avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.714495 kernel: audit: type=1400 audit(1707507231.672:652): avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit: BPF prog-id=75 op=LOAD Feb 9 19:33:51.672000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003e8330 items=0 ppid=1469 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:51.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316336316536333337633130623064313866613163633131393537 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.672000 audit: BPF prog-id=76 op=LOAD Feb 9 19:33:51.672000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003e8378 items=0 ppid=1469 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:51.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316336316536333337633130623064313866613163633131393537 Feb 9 19:33:51.673000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:33:51.673000 audit: BPF prog-id=75 op=UNLOAD Feb 9 19:33:51.673000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.673000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.673000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.673000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.673000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.673000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.673000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.673000 audit[1827]: AVC avc: denied { perfmon } for pid=1827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.673000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.673000 audit[1827]: AVC avc: denied { bpf } for pid=1827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:33:51.673000 audit: BPF prog-id=77 op=LOAD Feb 9 19:33:51.673000 audit[1827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003e8408 items=0 ppid=1469 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:33:51.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663316336316536333337633130623064313866613163633131393537 Feb 9 19:33:51.735733 env[1060]: time="2024-02-09T19:33:51.735651621Z" level=info msg="StartContainer for \"6c1c61e6337c10b0d18fa1cc1195766e566453b9fdf45dc927d14975ef8f5f2e\" returns successfully" Feb 9 19:33:52.207458 kubelet[1378]: E0209 19:33:52.207326 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:53.208559 kubelet[1378]: E0209 19:33:53.208508 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:53.440817 kubelet[1378]: E0209 19:33:53.440758 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xqgtg" podUID=52ed98cb-0e1f-483f-ada3-e6760f45d1cd Feb 9 19:33:53.510226 env[1060]: time="2024-02-09T19:33:53.509957930Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:33:53.517675 systemd[1]: cri-containerd-6c1c61e6337c10b0d18fa1cc1195766e566453b9fdf45dc927d14975ef8f5f2e.scope: Deactivated successfully. Feb 9 19:33:53.520000 audit: BPF prog-id=77 op=UNLOAD Feb 9 19:33:53.567138 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6c1c61e6337c10b0d18fa1cc1195766e566453b9fdf45dc927d14975ef8f5f2e-rootfs.mount: Deactivated successfully. Feb 9 19:33:53.615575 kubelet[1378]: I0209 19:33:53.615471 1378 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:33:54.237216 kubelet[1378]: E0209 19:33:54.210075 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:55.211411 kubelet[1378]: E0209 19:33:55.211271 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:55.305559 env[1060]: time="2024-02-09T19:33:55.305465826Z" level=info msg="shim disconnected" id=6c1c61e6337c10b0d18fa1cc1195766e566453b9fdf45dc927d14975ef8f5f2e Feb 9 19:33:55.306412 env[1060]: time="2024-02-09T19:33:55.306360826Z" level=warning msg="cleaning up after shim disconnected" id=6c1c61e6337c10b0d18fa1cc1195766e566453b9fdf45dc927d14975ef8f5f2e namespace=k8s.io Feb 9 19:33:55.306575 env[1060]: time="2024-02-09T19:33:55.306540405Z" level=info msg="cleaning up dead shim" Feb 9 19:33:55.325863 env[1060]: time="2024-02-09T19:33:55.325736144Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:33:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1877 runtime=io.containerd.runc.v2\n" Feb 9 19:33:55.453422 systemd[1]: Created slice kubepods-besteffort-pod52ed98cb_0e1f_483f_ada3_e6760f45d1cd.slice. Feb 9 19:33:55.458221 env[1060]: time="2024-02-09T19:33:55.458142476Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xqgtg,Uid:52ed98cb-0e1f-483f-ada3-e6760f45d1cd,Namespace:calico-system,Attempt:0,}" Feb 9 19:33:55.575431 env[1060]: time="2024-02-09T19:33:55.575043841Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:33:55.650915 env[1060]: time="2024-02-09T19:33:55.650825605Z" level=error msg="Failed to destroy network for sandbox \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:55.652415 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2-shm.mount: Deactivated successfully. Feb 9 19:33:55.653372 env[1060]: time="2024-02-09T19:33:55.653322108Z" level=error msg="encountered an error cleaning up failed sandbox \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:55.653451 env[1060]: time="2024-02-09T19:33:55.653401941Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xqgtg,Uid:52ed98cb-0e1f-483f-ada3-e6760f45d1cd,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:55.653818 kubelet[1378]: E0209 19:33:55.653777 1378 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:55.654104 kubelet[1378]: E0209 19:33:55.653862 1378 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xqgtg" Feb 9 19:33:55.654104 kubelet[1378]: E0209 19:33:55.653926 1378 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xqgtg" Feb 9 19:33:55.654104 kubelet[1378]: E0209 19:33:55.654017 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xqgtg_calico-system(52ed98cb-0e1f-483f-ada3-e6760f45d1cd)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xqgtg_calico-system(52ed98cb-0e1f-483f-ada3-e6760f45d1cd)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xqgtg" podUID=52ed98cb-0e1f-483f-ada3-e6760f45d1cd Feb 9 19:33:56.211874 kubelet[1378]: E0209 19:33:56.211763 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:56.571878 kubelet[1378]: I0209 19:33:56.570928 1378 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:33:56.573111 env[1060]: time="2024-02-09T19:33:56.573026586Z" level=info msg="StopPodSandbox for \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\"" Feb 9 19:33:56.633694 env[1060]: time="2024-02-09T19:33:56.633553645Z" level=error msg="StopPodSandbox for \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\" failed" error="failed to destroy network for sandbox \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:33:56.634505 kubelet[1378]: E0209 19:33:56.634154 1378 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:33:56.634505 kubelet[1378]: E0209 19:33:56.634293 1378 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2} Feb 9 19:33:56.634505 kubelet[1378]: E0209 19:33:56.634390 1378 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"52ed98cb-0e1f-483f-ada3-e6760f45d1cd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:33:56.634505 kubelet[1378]: E0209 19:33:56.634467 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"52ed98cb-0e1f-483f-ada3-e6760f45d1cd\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xqgtg" podUID=52ed98cb-0e1f-483f-ada3-e6760f45d1cd Feb 9 19:33:57.212820 kubelet[1378]: E0209 19:33:57.212766 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:58.213095 kubelet[1378]: E0209 19:33:58.212946 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:33:59.213753 kubelet[1378]: E0209 19:33:59.213629 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:00.214593 kubelet[1378]: E0209 19:34:00.214452 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:01.215381 kubelet[1378]: E0209 19:34:01.215231 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:01.567799 kubelet[1378]: I0209 19:34:01.567225 1378 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:34:01.577518 systemd[1]: Created slice kubepods-besteffort-podd1904e91_6b9b_4b10_b6be_5416a9f570d8.slice. Feb 9 19:34:01.737398 kubelet[1378]: I0209 19:34:01.737305 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wjg98\" (UniqueName: \"kubernetes.io/projected/d1904e91-6b9b-4b10-b6be-5416a9f570d8-kube-api-access-wjg98\") pod \"nginx-deployment-845c78c8b9-hxdz5\" (UID: \"d1904e91-6b9b-4b10-b6be-5416a9f570d8\") " pod="default/nginx-deployment-845c78c8b9-hxdz5" Feb 9 19:34:02.189086 env[1060]: time="2024-02-09T19:34:02.188939841Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-hxdz5,Uid:d1904e91-6b9b-4b10-b6be-5416a9f570d8,Namespace:default,Attempt:0,}" Feb 9 19:34:02.216214 kubelet[1378]: E0209 19:34:02.216049 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:02.356570 env[1060]: time="2024-02-09T19:34:02.356490329Z" level=error msg="Failed to destroy network for sandbox \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:34:02.357182 env[1060]: time="2024-02-09T19:34:02.357144860Z" level=error msg="encountered an error cleaning up failed sandbox \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:34:02.357302 env[1060]: time="2024-02-09T19:34:02.357272658Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-hxdz5,Uid:d1904e91-6b9b-4b10-b6be-5416a9f570d8,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:34:02.358128 kubelet[1378]: E0209 19:34:02.357685 1378 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:34:02.358128 kubelet[1378]: E0209 19:34:02.357755 1378 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-hxdz5" Feb 9 19:34:02.358128 kubelet[1378]: E0209 19:34:02.357783 1378 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-hxdz5" Feb 9 19:34:02.358337 kubelet[1378]: E0209 19:34:02.357851 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-hxdz5_default(d1904e91-6b9b-4b10-b6be-5416a9f570d8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-hxdz5_default(d1904e91-6b9b-4b10-b6be-5416a9f570d8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-hxdz5" podUID=d1904e91-6b9b-4b10-b6be-5416a9f570d8 Feb 9 19:34:02.358525 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab-shm.mount: Deactivated successfully. Feb 9 19:34:02.588421 kubelet[1378]: I0209 19:34:02.587040 1378 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:02.588780 env[1060]: time="2024-02-09T19:34:02.588743901Z" level=info msg="StopPodSandbox for \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\"" Feb 9 19:34:02.667952 env[1060]: time="2024-02-09T19:34:02.667825927Z" level=error msg="StopPodSandbox for \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\" failed" error="failed to destroy network for sandbox \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:34:02.668364 kubelet[1378]: E0209 19:34:02.668323 1378 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:02.668458 kubelet[1378]: E0209 19:34:02.668412 1378 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab} Feb 9 19:34:02.668547 kubelet[1378]: E0209 19:34:02.668518 1378 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d1904e91-6b9b-4b10-b6be-5416a9f570d8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:34:02.668678 kubelet[1378]: E0209 19:34:02.668661 1378 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d1904e91-6b9b-4b10-b6be-5416a9f570d8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-hxdz5" podUID=d1904e91-6b9b-4b10-b6be-5416a9f570d8 Feb 9 19:34:03.218955 kubelet[1378]: E0209 19:34:03.218873 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:04.220999 kubelet[1378]: E0209 19:34:04.220920 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:05.222023 kubelet[1378]: E0209 19:34:05.221935 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:06.222632 kubelet[1378]: E0209 19:34:06.222553 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:06.285361 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4196384787.mount: Deactivated successfully. Feb 9 19:34:06.848275 env[1060]: time="2024-02-09T19:34:06.848147628Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:06.860237 env[1060]: time="2024-02-09T19:34:06.860127507Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:06.866409 env[1060]: time="2024-02-09T19:34:06.866328046Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:06.869918 env[1060]: time="2024-02-09T19:34:06.869861917Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:06.871211 env[1060]: time="2024-02-09T19:34:06.871164388Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:34:06.901026 env[1060]: time="2024-02-09T19:34:06.899825548Z" level=info msg="CreateContainer within sandbox \"8660cb1b1ae9e79cd93d815506d6dd7b0ce9b7d47baa660b44abe12bffd46fc5\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:34:06.939226 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3544259107.mount: Deactivated successfully. Feb 9 19:34:06.969476 env[1060]: time="2024-02-09T19:34:06.969370829Z" level=info msg="CreateContainer within sandbox \"8660cb1b1ae9e79cd93d815506d6dd7b0ce9b7d47baa660b44abe12bffd46fc5\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e523ed1124e3d7358b2e9464d8b808dd17450a7ca2c79345e1a943e03f4c8894\"" Feb 9 19:34:06.970784 env[1060]: time="2024-02-09T19:34:06.970733113Z" level=info msg="StartContainer for \"e523ed1124e3d7358b2e9464d8b808dd17450a7ca2c79345e1a943e03f4c8894\"" Feb 9 19:34:07.002301 systemd[1]: Started cri-containerd-e523ed1124e3d7358b2e9464d8b808dd17450a7ca2c79345e1a943e03f4c8894.scope. Feb 9 19:34:07.029000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.032219 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:34:07.032378 kernel: audit: type=1400 audit(1707507247.029:658): avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.029000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1469 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:07.052139 kernel: audit: type=1300 audit(1707507247.029:658): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1469 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:07.052252 kernel: audit: type=1327 audit(1707507247.029:658): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323365643131323465336437333538623265393436346438623830 Feb 9 19:34:07.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323365643131323465336437333538623265393436346438623830 Feb 9 19:34:07.062965 kernel: audit: type=1400 audit(1707507247.037:659): avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.037000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.037000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.068679 kernel: audit: type=1400 audit(1707507247.037:659): avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.037000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.074620 kernel: audit: type=1400 audit(1707507247.037:659): avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.074671 kernel: audit: type=1400 audit(1707507247.037:659): avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.037000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.037000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.082639 kernel: audit: type=1400 audit(1707507247.037:659): avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.037000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.037000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.090649 kernel: audit: type=1400 audit(1707507247.037:659): avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.090775 kernel: audit: type=1400 audit(1707507247.037:659): avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.037000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.037000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.037000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.037000 audit: BPF prog-id=78 op=LOAD Feb 9 19:34:07.037000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f87b0 items=0 ppid=1469 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:07.037000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323365643131323465336437333538623265393436346438623830 Feb 9 19:34:07.039000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.039000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.039000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.039000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.039000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.039000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.039000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.039000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.039000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.039000 audit: BPF prog-id=79 op=LOAD Feb 9 19:34:07.039000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f87f8 items=0 ppid=1469 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:07.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323365643131323465336437333538623265393436346438623830 Feb 9 19:34:07.058000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:34:07.058000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:34:07.058000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.058000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.058000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.058000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.058000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.058000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.058000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.058000 audit[2006]: AVC avc: denied { perfmon } for pid=2006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.058000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.058000 audit[2006]: AVC avc: denied { bpf } for pid=2006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:07.058000 audit: BPF prog-id=80 op=LOAD Feb 9 19:34:07.058000 audit[2006]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8888 items=0 ppid=1469 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:07.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535323365643131323465336437333538623265393436346438623830 Feb 9 19:34:07.103974 env[1060]: time="2024-02-09T19:34:07.103515408Z" level=info msg="StartContainer for \"e523ed1124e3d7358b2e9464d8b808dd17450a7ca2c79345e1a943e03f4c8894\" returns successfully" Feb 9 19:34:07.223568 kubelet[1378]: E0209 19:34:07.223449 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:07.252557 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:34:07.252950 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:34:07.646732 kubelet[1378]: I0209 19:34:07.646656 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-hcll2" podStartSLOduration=3.599070224 podCreationTimestamp="2024-02-09 19:33:32 +0000 UTC" firstStartedPulling="2024-02-09 19:33:34.82412335 +0000 UTC m=+4.202132039" lastFinishedPulling="2024-02-09 19:34:06.871550034 +0000 UTC m=+36.249558723" observedRunningTime="2024-02-09 19:34:07.643971236 +0000 UTC m=+37.021980025" watchObservedRunningTime="2024-02-09 19:34:07.646496908 +0000 UTC m=+37.024505647" Feb 9 19:34:07.672153 systemd[1]: run-containerd-runc-k8s.io-e523ed1124e3d7358b2e9464d8b808dd17450a7ca2c79345e1a943e03f4c8894-runc.z8p4Ti.mount: Deactivated successfully. Feb 9 19:34:08.224380 kubelet[1378]: E0209 19:34:08.224310 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:08.649200 systemd[1]: run-containerd-runc-k8s.io-e523ed1124e3d7358b2e9464d8b808dd17450a7ca2c79345e1a943e03f4c8894-runc.61zyhb.mount: Deactivated successfully. Feb 9 19:34:08.804000 audit[2154]: AVC avc: denied { write } for pid=2154 comm="tee" name="fd" dev="proc" ino=18934 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:08.804000 audit[2154]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc7d47f96c a2=241 a3=1b6 items=1 ppid=2121 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:08.804000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:34:08.804000 audit: PATH item=0 name="/dev/fd/63" inode=18926 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:08.804000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:08.820000 audit[2163]: AVC avc: denied { write } for pid=2163 comm="tee" name="fd" dev="proc" ino=18945 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:08.820000 audit[2163]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1482897c a2=241 a3=1b6 items=1 ppid=2119 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:08.820000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:34:08.820000 audit: PATH item=0 name="/dev/fd/63" inode=18938 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:08.820000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:08.827000 audit[2173]: AVC avc: denied { write } for pid=2173 comm="tee" name="fd" dev="proc" ino=18949 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:08.827000 audit[2173]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2ad8097b a2=241 a3=1b6 items=1 ppid=2131 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:08.827000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:34:08.827000 audit: PATH item=0 name="/dev/fd/63" inode=18942 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:08.827000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:08.832000 audit[2166]: AVC avc: denied { write } for pid=2166 comm="tee" name="fd" dev="proc" ino=19486 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:08.833000 audit[2168]: AVC avc: denied { write } for pid=2168 comm="tee" name="fd" dev="proc" ino=19489 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:08.833000 audit[2168]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5f75e97d a2=241 a3=1b6 items=1 ppid=2127 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:08.833000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:34:08.833000 audit: PATH item=0 name="/dev/fd/63" inode=19472 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:08.833000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:08.832000 audit[2166]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc0d7cd97b a2=241 a3=1b6 items=1 ppid=2117 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:08.832000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:34:08.832000 audit: PATH item=0 name="/dev/fd/63" inode=18939 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:08.832000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:08.831000 audit[2170]: AVC avc: denied { write } for pid=2170 comm="tee" name="fd" dev="proc" ino=19499 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:08.831000 audit[2170]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5eefe97b a2=241 a3=1b6 items=1 ppid=2126 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:08.831000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:34:08.831000 audit: PATH item=0 name="/dev/fd/63" inode=19475 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:08.831000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:08.851000 audit[2188]: AVC avc: denied { write } for pid=2188 comm="tee" name="fd" dev="proc" ino=19506 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:34:08.851000 audit[2188]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe0db2596b a2=241 a3=1b6 items=1 ppid=2129 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:08.851000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:34:08.851000 audit: PATH item=0 name="/dev/fd/63" inode=19494 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:34:08.851000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:34:09.124663 kernel: Initializing XFRM netlink socket Feb 9 19:34:09.225735 kubelet[1378]: E0209 19:34:09.225680 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:09.259000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.259000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.259000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.259000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.259000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.259000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.259000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.259000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.259000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.259000 audit: BPF prog-id=81 op=LOAD Feb 9 19:34:09.259000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8a962590 a2=70 a3=7f027e5ae000 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.259000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:09.260000 audit: BPF prog-id=81 op=UNLOAD Feb 9 19:34:09.260000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.260000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.260000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.260000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.260000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.260000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.260000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.260000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.260000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.260000 audit: BPF prog-id=82 op=LOAD Feb 9 19:34:09.260000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8a962590 a2=70 a3=6e items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.260000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:09.261000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:34:09.261000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.261000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd8a962540 a2=70 a3=470860 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.261000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:09.261000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.261000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.261000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.261000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.261000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.261000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.261000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.261000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.261000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.261000 audit: BPF prog-id=83 op=LOAD Feb 9 19:34:09.261000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd8a962520 a2=70 a3=7ffd8a962590 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.261000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:09.261000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:34:09.261000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.261000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8a962600 a2=70 a3=0 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.261000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:09.261000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.261000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8a9625f0 a2=70 a3=0 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.261000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:09.262000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.262000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffd8a962630 a2=70 a3=fe00 items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:09.262000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.262000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.262000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.262000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.262000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.262000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.262000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.262000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.262000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.262000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.262000 audit: BPF prog-id=84 op=LOAD Feb 9 19:34:09.262000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd8a962550 a2=70 a3=ffffffff items=0 ppid=2118 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.262000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:34:09.269000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.269000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff1b10e200 a2=70 a3=ffff items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.269000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:34:09.270000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:09.270000 audit[2260]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff1b10e0d0 a2=70 a3=3 items=0 ppid=2118 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:34:09.277000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:34:09.277000 audit[2118]: SYSCALL arch=c000003e syscall=35 success=yes exit=0 a0=7f2042d8fda0 a1=0 a2=0 a3=7ffd9c56a080 items=0 ppid=2110 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="calico-node" exe="/usr/bin/calico-node" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.277000 audit: PROCTITLE proctitle=63616C69636F2D6E6F6465002D66656C6978 Feb 9 19:34:09.365000 audit[2281]: NETFILTER_CFG table=raw:65 family=2 entries=19 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:09.365000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fff0b836b00 a2=0 a3=7fff0b836aec items=0 ppid=2118 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.365000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:09.369000 audit[2285]: NETFILTER_CFG table=nat:66 family=2 entries=16 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:09.369000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffe1903c090 a2=0 a3=0 items=0 ppid=2118 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.369000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:09.370000 audit[2282]: NETFILTER_CFG table=filter:67 family=2 entries=39 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:09.370000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffd6174dee0 a2=0 a3=0 items=0 ppid=2118 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.370000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:09.371000 audit[2286]: NETFILTER_CFG table=mangle:68 family=2 entries=19 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:09.371000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff16354060 a2=0 a3=7fff1635404c items=0 ppid=2118 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:09.371000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:10.185993 systemd-networkd[971]: vxlan.calico: Link UP Feb 9 19:34:10.186029 systemd-networkd[971]: vxlan.calico: Gained carrier Feb 9 19:34:10.226373 kubelet[1378]: E0209 19:34:10.226313 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:10.442468 env[1060]: time="2024-02-09T19:34:10.442350966Z" level=info msg="StopPodSandbox for \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\"" Feb 9 19:34:11.189051 kubelet[1378]: E0209 19:34:11.188903 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:11.226823 kubelet[1378]: E0209 19:34:11.226768 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:11.293140 env[1060]: 2024-02-09 19:34:10.913 [INFO][2311] k8s.go 578: Cleaning up netns ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:34:11.293140 env[1060]: 2024-02-09 19:34:10.914 [INFO][2311] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" iface="eth0" netns="/var/run/netns/cni-b09d200a-941f-b86f-e843-633e0b67fe76" Feb 9 19:34:11.293140 env[1060]: 2024-02-09 19:34:10.927 [INFO][2311] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" iface="eth0" netns="/var/run/netns/cni-b09d200a-941f-b86f-e843-633e0b67fe76" Feb 9 19:34:11.293140 env[1060]: 2024-02-09 19:34:10.954 [INFO][2311] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" iface="eth0" netns="/var/run/netns/cni-b09d200a-941f-b86f-e843-633e0b67fe76" Feb 9 19:34:11.293140 env[1060]: 2024-02-09 19:34:10.954 [INFO][2311] k8s.go 585: Releasing IP address(es) ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:34:11.293140 env[1060]: 2024-02-09 19:34:10.954 [INFO][2311] utils.go 188: Calico CNI releasing IP address ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:34:11.293140 env[1060]: 2024-02-09 19:34:11.255 [INFO][2319] ipam_plugin.go 415: Releasing address using handleID ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" HandleID="k8s-pod-network.fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Workload="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:11.293140 env[1060]: 2024-02-09 19:34:11.255 [INFO][2319] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:11.293140 env[1060]: 2024-02-09 19:34:11.255 [INFO][2319] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:11.293140 env[1060]: 2024-02-09 19:34:11.281 [WARNING][2319] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" HandleID="k8s-pod-network.fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Workload="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:11.293140 env[1060]: 2024-02-09 19:34:11.281 [INFO][2319] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" HandleID="k8s-pod-network.fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Workload="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:11.293140 env[1060]: 2024-02-09 19:34:11.285 [INFO][2319] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:11.293140 env[1060]: 2024-02-09 19:34:11.288 [INFO][2311] k8s.go 591: Teardown processing complete. ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:34:11.303841 env[1060]: time="2024-02-09T19:34:11.296997003Z" level=info msg="TearDown network for sandbox \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\" successfully" Feb 9 19:34:11.303841 env[1060]: time="2024-02-09T19:34:11.297111766Z" level=info msg="StopPodSandbox for \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\" returns successfully" Feb 9 19:34:11.303841 env[1060]: time="2024-02-09T19:34:11.299111012Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xqgtg,Uid:52ed98cb-0e1f-483f-ada3-e6760f45d1cd,Namespace:calico-system,Attempt:1,}" Feb 9 19:34:11.301101 systemd[1]: run-netns-cni\x2db09d200a\x2d941f\x2db86f\x2de843\x2d633e0b67fe76.mount: Deactivated successfully. Feb 9 19:34:11.683747 systemd-networkd[971]: vxlan.calico: Gained IPv6LL Feb 9 19:34:11.972865 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:34:11.973154 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif618d65b76a: link becomes ready Feb 9 19:34:11.971942 systemd-networkd[971]: calif618d65b76a: Link UP Feb 9 19:34:11.975041 systemd-networkd[971]: calif618d65b76a: Gained carrier Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.658 [INFO][2326] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.156-k8s-csi--node--driver--xqgtg-eth0 csi-node-driver- calico-system 52ed98cb-0e1f-483f-ada3-e6760f45d1cd 1072 0 2024-02-09 19:33:32 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.156 csi-node-driver-xqgtg eth0 default [] [] [kns.calico-system ksa.calico-system.default] calif618d65b76a [] []}} ContainerID="4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" Namespace="calico-system" Pod="csi-node-driver-xqgtg" WorkloadEndpoint="172.24.4.156-k8s-csi--node--driver--xqgtg-" Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.664 [INFO][2326] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" Namespace="calico-system" Pod="csi-node-driver-xqgtg" WorkloadEndpoint="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.765 [INFO][2338] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" HandleID="k8s-pod-network.4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" Workload="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.808 [INFO][2338] ipam_plugin.go 268: Auto assigning IP ContainerID="4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" HandleID="k8s-pod-network.4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" Workload="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f0bc0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.156", "pod":"csi-node-driver-xqgtg", "timestamp":"2024-02-09 19:34:11.765975476 +0000 UTC"}, Hostname:"172.24.4.156", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.809 [INFO][2338] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.809 [INFO][2338] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.809 [INFO][2338] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.156' Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.812 [INFO][2338] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" host="172.24.4.156" Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.859 [INFO][2338] ipam.go 372: Looking up existing affinities for host host="172.24.4.156" Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.872 [INFO][2338] ipam.go 489: Trying affinity for 192.168.29.128/26 host="172.24.4.156" Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.877 [INFO][2338] ipam.go 155: Attempting to load block cidr=192.168.29.128/26 host="172.24.4.156" Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.883 [INFO][2338] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.128/26 host="172.24.4.156" Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.883 [INFO][2338] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.128/26 handle="k8s-pod-network.4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" host="172.24.4.156" Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.887 [INFO][2338] ipam.go 1682: Creating new handle: k8s-pod-network.4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693 Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.896 [INFO][2338] ipam.go 1203: Writing block in order to claim IPs block=192.168.29.128/26 handle="k8s-pod-network.4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" host="172.24.4.156" Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.918 [INFO][2338] ipam.go 1216: Successfully claimed IPs: [192.168.29.129/26] block=192.168.29.128/26 handle="k8s-pod-network.4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" host="172.24.4.156" Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.919 [INFO][2338] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.129/26] handle="k8s-pod-network.4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" host="172.24.4.156" Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.919 [INFO][2338] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:12.163370 env[1060]: 2024-02-09 19:34:11.920 [INFO][2338] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.29.129/26] IPv6=[] ContainerID="4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" HandleID="k8s-pod-network.4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" Workload="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:12.165881 env[1060]: 2024-02-09 19:34:11.927 [INFO][2326] k8s.go 385: Populated endpoint ContainerID="4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" Namespace="calico-system" Pod="csi-node-driver-xqgtg" WorkloadEndpoint="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-csi--node--driver--xqgtg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"52ed98cb-0e1f-483f-ada3-e6760f45d1cd", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"", Pod:"csi-node-driver-xqgtg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif618d65b76a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:12.165881 env[1060]: 2024-02-09 19:34:11.928 [INFO][2326] k8s.go 386: Calico CNI using IPs: [192.168.29.129/32] ContainerID="4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" Namespace="calico-system" Pod="csi-node-driver-xqgtg" WorkloadEndpoint="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:12.165881 env[1060]: 2024-02-09 19:34:11.928 [INFO][2326] dataplane_linux.go 68: Setting the host side veth name to calif618d65b76a ContainerID="4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" Namespace="calico-system" Pod="csi-node-driver-xqgtg" WorkloadEndpoint="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:12.165881 env[1060]: 2024-02-09 19:34:11.976 [INFO][2326] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" Namespace="calico-system" Pod="csi-node-driver-xqgtg" WorkloadEndpoint="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:12.165881 env[1060]: 2024-02-09 19:34:11.977 [INFO][2326] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" Namespace="calico-system" Pod="csi-node-driver-xqgtg" WorkloadEndpoint="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-csi--node--driver--xqgtg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"52ed98cb-0e1f-483f-ada3-e6760f45d1cd", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693", Pod:"csi-node-driver-xqgtg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif618d65b76a", MAC:"3e:94:55:a1:e7:6e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:12.165881 env[1060]: 2024-02-09 19:34:12.159 [INFO][2326] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693" Namespace="calico-system" Pod="csi-node-driver-xqgtg" WorkloadEndpoint="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:12.225000 audit[2359]: NETFILTER_CFG table=filter:69 family=2 entries=36 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:12.229673 kernel: kauditd_printk_skb: 153 callbacks suppressed Feb 9 19:34:12.229864 kernel: audit: type=1325 audit(1707507252.225:689): table=filter:69 family=2 entries=36 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:12.230801 kubelet[1378]: E0209 19:34:12.230702 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:12.225000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fff4f375ae0 a2=0 a3=7fff4f375acc items=0 ppid=2118 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.225000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:12.254458 kernel: audit: type=1300 audit(1707507252.225:689): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7fff4f375ae0 a2=0 a3=7fff4f375acc items=0 ppid=2118 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.254689 kernel: audit: type=1327 audit(1707507252.225:689): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:12.409434 env[1060]: time="2024-02-09T19:34:12.409256758Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:34:12.409833 env[1060]: time="2024-02-09T19:34:12.409366521Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:34:12.409833 env[1060]: time="2024-02-09T19:34:12.409469350Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:34:12.410290 env[1060]: time="2024-02-09T19:34:12.410189505Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693 pid=2366 runtime=io.containerd.runc.v2 Feb 9 19:34:12.467057 systemd[1]: run-containerd-runc-k8s.io-4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693-runc.Y0I9pe.mount: Deactivated successfully. Feb 9 19:34:12.471990 systemd[1]: Started cri-containerd-4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693.scope. Feb 9 19:34:12.501742 kernel: audit: type=1400 audit(1707507252.493:690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.501872 kernel: audit: type=1400 audit(1707507252.493:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505797 kernel: audit: type=1400 audit(1707507252.493:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.513354 kernel: audit: type=1400 audit(1707507252.493:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.517236 kernel: audit: type=1400 audit(1707507252.493:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.521002 kernel: audit: type=1400 audit(1707507252.493:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.521088 kernel: audit: type=1400 audit(1707507252.493:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.494000 audit: BPF prog-id=85 op=LOAD Feb 9 19:34:12.502000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.502000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2366 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636666316663376665323966353539383039646339633834346239 Feb 9 19:34:12.502000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.502000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2366 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636666316663376665323966353539383039646339633834346239 Feb 9 19:34:12.502000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.502000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.502000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.502000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.502000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.502000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.502000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.502000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.502000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.502000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.502000 audit: BPF prog-id=86 op=LOAD Feb 9 19:34:12.502000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000219210 items=0 ppid=2366 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636666316663376665323966353539383039646339633834346239 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit: BPF prog-id=87 op=LOAD Feb 9 19:34:12.505000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000219258 items=0 ppid=2366 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636666316663376665323966353539383039646339633834346239 Feb 9 19:34:12.505000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:34:12.505000 audit: BPF prog-id=86 op=UNLOAD Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:12.505000 audit: BPF prog-id=88 op=LOAD Feb 9 19:34:12.505000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000219668 items=0 ppid=2366 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:12.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464636666316663376665323966353539383039646339633834346239 Feb 9 19:34:12.543260 env[1060]: time="2024-02-09T19:34:12.543127145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xqgtg,Uid:52ed98cb-0e1f-483f-ada3-e6760f45d1cd,Namespace:calico-system,Attempt:1,} returns sandbox id \"4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693\"" Feb 9 19:34:12.545627 env[1060]: time="2024-02-09T19:34:12.545578922Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:34:13.231532 kubelet[1378]: E0209 19:34:13.231409 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:13.668850 systemd-networkd[971]: calif618d65b76a: Gained IPv6LL Feb 9 19:34:14.232999 kubelet[1378]: E0209 19:34:14.232684 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:14.927552 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2906895127.mount: Deactivated successfully. Feb 9 19:34:15.234059 kubelet[1378]: E0209 19:34:15.233175 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:16.233402 kubelet[1378]: E0209 19:34:16.233338 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:16.487011 systemd[1]: run-containerd-runc-k8s.io-e523ed1124e3d7358b2e9464d8b808dd17450a7ca2c79345e1a943e03f4c8894-runc.3xmm6M.mount: Deactivated successfully. Feb 9 19:34:16.844523 env[1060]: time="2024-02-09T19:34:16.843792639Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:16.860436 env[1060]: time="2024-02-09T19:34:16.860335415Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:16.866107 env[1060]: time="2024-02-09T19:34:16.866014972Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:16.876025 env[1060]: time="2024-02-09T19:34:16.875923886Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:16.876809 env[1060]: time="2024-02-09T19:34:16.876697538Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:34:16.883339 env[1060]: time="2024-02-09T19:34:16.883247451Z" level=info msg="CreateContainer within sandbox \"4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:34:16.925192 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount15360311.mount: Deactivated successfully. Feb 9 19:34:16.934347 env[1060]: time="2024-02-09T19:34:16.934259376Z" level=info msg="CreateContainer within sandbox \"4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"802ca6fc3b9397185f84e73c1887aeec520dcd4faffad515c923d1558da755c1\"" Feb 9 19:34:16.936276 env[1060]: time="2024-02-09T19:34:16.936067465Z" level=info msg="StartContainer for \"802ca6fc3b9397185f84e73c1887aeec520dcd4faffad515c923d1558da755c1\"" Feb 9 19:34:16.987855 systemd[1]: Started cri-containerd-802ca6fc3b9397185f84e73c1887aeec520dcd4faffad515c923d1558da755c1.scope. Feb 9 19:34:17.007000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.007000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2366 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:17.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326361366663336239333937313835663834653733633138383761 Feb 9 19:34:17.007000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.007000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.007000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.007000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.007000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.007000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.007000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.007000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.007000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.007000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.007000 audit: BPF prog-id=89 op=LOAD Feb 9 19:34:17.007000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000396690 items=0 ppid=2366 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:17.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326361366663336239333937313835663834653733633138383761 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit: BPF prog-id=90 op=LOAD Feb 9 19:34:17.008000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003966d8 items=0 ppid=2366 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:17.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326361366663336239333937313835663834653733633138383761 Feb 9 19:34:17.008000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:34:17.008000 audit: BPF prog-id=89 op=UNLOAD Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { perfmon } for pid=2438 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit[2438]: AVC avc: denied { bpf } for pid=2438 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:17.008000 audit: BPF prog-id=91 op=LOAD Feb 9 19:34:17.008000 audit[2438]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000396768 items=0 ppid=2366 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:17.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830326361366663336239333937313835663834653733633138383761 Feb 9 19:34:17.036101 env[1060]: time="2024-02-09T19:34:17.036022253Z" level=info msg="StartContainer for \"802ca6fc3b9397185f84e73c1887aeec520dcd4faffad515c923d1558da755c1\" returns successfully" Feb 9 19:34:17.037929 env[1060]: time="2024-02-09T19:34:17.037895367Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:34:17.234329 kubelet[1378]: E0209 19:34:17.234164 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:17.443132 env[1060]: time="2024-02-09T19:34:17.443030342Z" level=info msg="StopPodSandbox for \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\"" Feb 9 19:34:17.614390 env[1060]: 2024-02-09 19:34:17.543 [INFO][2480] k8s.go 578: Cleaning up netns ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:17.614390 env[1060]: 2024-02-09 19:34:17.544 [INFO][2480] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" iface="eth0" netns="/var/run/netns/cni-f4878dc4-9e93-8095-cd06-ebdf8b0e31b7" Feb 9 19:34:17.614390 env[1060]: 2024-02-09 19:34:17.544 [INFO][2480] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" iface="eth0" netns="/var/run/netns/cni-f4878dc4-9e93-8095-cd06-ebdf8b0e31b7" Feb 9 19:34:17.614390 env[1060]: 2024-02-09 19:34:17.544 [INFO][2480] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" iface="eth0" netns="/var/run/netns/cni-f4878dc4-9e93-8095-cd06-ebdf8b0e31b7" Feb 9 19:34:17.614390 env[1060]: 2024-02-09 19:34:17.545 [INFO][2480] k8s.go 585: Releasing IP address(es) ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:17.614390 env[1060]: 2024-02-09 19:34:17.545 [INFO][2480] utils.go 188: Calico CNI releasing IP address ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:17.614390 env[1060]: 2024-02-09 19:34:17.574 [INFO][2486] ipam_plugin.go 415: Releasing address using handleID ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" HandleID="k8s-pod-network.6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Workload="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:17.614390 env[1060]: 2024-02-09 19:34:17.575 [INFO][2486] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:17.614390 env[1060]: 2024-02-09 19:34:17.575 [INFO][2486] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:17.614390 env[1060]: 2024-02-09 19:34:17.598 [WARNING][2486] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" HandleID="k8s-pod-network.6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Workload="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:17.614390 env[1060]: 2024-02-09 19:34:17.598 [INFO][2486] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" HandleID="k8s-pod-network.6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Workload="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:17.614390 env[1060]: 2024-02-09 19:34:17.609 [INFO][2486] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:17.614390 env[1060]: 2024-02-09 19:34:17.612 [INFO][2480] k8s.go 591: Teardown processing complete. ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:17.618819 systemd[1]: run-netns-cni\x2df4878dc4\x2d9e93\x2d8095\x2dcd06\x2debdf8b0e31b7.mount: Deactivated successfully. Feb 9 19:34:17.620597 env[1060]: time="2024-02-09T19:34:17.620510189Z" level=info msg="TearDown network for sandbox \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\" successfully" Feb 9 19:34:17.620933 env[1060]: time="2024-02-09T19:34:17.620853992Z" level=info msg="StopPodSandbox for \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\" returns successfully" Feb 9 19:34:17.622509 env[1060]: time="2024-02-09T19:34:17.622449277Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-hxdz5,Uid:d1904e91-6b9b-4b10-b6be-5416a9f570d8,Namespace:default,Attempt:1,}" Feb 9 19:34:17.946677 systemd-networkd[971]: cali1c5e9c9fd41: Link UP Feb 9 19:34:17.948710 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:34:17.953779 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1c5e9c9fd41: link becomes ready Feb 9 19:34:17.954670 systemd-networkd[971]: cali1c5e9c9fd41: Gained carrier Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.719 [INFO][2493] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0 nginx-deployment-845c78c8b9- default d1904e91-6b9b-4b10-b6be-5416a9f570d8 1097 0 2024-02-09 19:34:01 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.156 nginx-deployment-845c78c8b9-hxdz5 eth0 default [] [] [kns.default ksa.default.default] cali1c5e9c9fd41 [] []}} ContainerID="bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" Namespace="default" Pod="nginx-deployment-845c78c8b9-hxdz5" WorkloadEndpoint="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-" Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.719 [INFO][2493] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" Namespace="default" Pod="nginx-deployment-845c78c8b9-hxdz5" WorkloadEndpoint="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.782 [INFO][2506] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" HandleID="k8s-pod-network.bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" Workload="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.810 [INFO][2506] ipam_plugin.go 268: Auto assigning IP ContainerID="bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" HandleID="k8s-pod-network.bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" Workload="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d7b0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.156", "pod":"nginx-deployment-845c78c8b9-hxdz5", "timestamp":"2024-02-09 19:34:17.782693363 +0000 UTC"}, Hostname:"172.24.4.156", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.810 [INFO][2506] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.810 [INFO][2506] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.810 [INFO][2506] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.156' Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.816 [INFO][2506] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" host="172.24.4.156" Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.873 [INFO][2506] ipam.go 372: Looking up existing affinities for host host="172.24.4.156" Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.885 [INFO][2506] ipam.go 489: Trying affinity for 192.168.29.128/26 host="172.24.4.156" Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.891 [INFO][2506] ipam.go 155: Attempting to load block cidr=192.168.29.128/26 host="172.24.4.156" Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.899 [INFO][2506] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.128/26 host="172.24.4.156" Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.899 [INFO][2506] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.128/26 handle="k8s-pod-network.bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" host="172.24.4.156" Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.903 [INFO][2506] ipam.go 1682: Creating new handle: k8s-pod-network.bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493 Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.913 [INFO][2506] ipam.go 1203: Writing block in order to claim IPs block=192.168.29.128/26 handle="k8s-pod-network.bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" host="172.24.4.156" Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.924 [INFO][2506] ipam.go 1216: Successfully claimed IPs: [192.168.29.130/26] block=192.168.29.128/26 handle="k8s-pod-network.bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" host="172.24.4.156" Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.924 [INFO][2506] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.130/26] handle="k8s-pod-network.bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" host="172.24.4.156" Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.924 [INFO][2506] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:17.993512 env[1060]: 2024-02-09 19:34:17.925 [INFO][2506] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.29.130/26] IPv6=[] ContainerID="bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" HandleID="k8s-pod-network.bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" Workload="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:17.997886 env[1060]: 2024-02-09 19:34:17.928 [INFO][2493] k8s.go 385: Populated endpoint ContainerID="bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" Namespace="default" Pod="nginx-deployment-845c78c8b9-hxdz5" WorkloadEndpoint="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"d1904e91-6b9b-4b10-b6be-5416a9f570d8", ResourceVersion:"1097", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-hxdz5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1c5e9c9fd41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:17.997886 env[1060]: 2024-02-09 19:34:17.929 [INFO][2493] k8s.go 386: Calico CNI using IPs: [192.168.29.130/32] ContainerID="bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" Namespace="default" Pod="nginx-deployment-845c78c8b9-hxdz5" WorkloadEndpoint="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:17.997886 env[1060]: 2024-02-09 19:34:17.935 [INFO][2493] dataplane_linux.go 68: Setting the host side veth name to cali1c5e9c9fd41 ContainerID="bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" Namespace="default" Pod="nginx-deployment-845c78c8b9-hxdz5" WorkloadEndpoint="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:17.997886 env[1060]: 2024-02-09 19:34:17.957 [INFO][2493] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" Namespace="default" Pod="nginx-deployment-845c78c8b9-hxdz5" WorkloadEndpoint="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:17.997886 env[1060]: 2024-02-09 19:34:17.961 [INFO][2493] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" Namespace="default" Pod="nginx-deployment-845c78c8b9-hxdz5" WorkloadEndpoint="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"d1904e91-6b9b-4b10-b6be-5416a9f570d8", ResourceVersion:"1097", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493", Pod:"nginx-deployment-845c78c8b9-hxdz5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1c5e9c9fd41", MAC:"c6:f2:a5:bc:64:0b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:17.997886 env[1060]: 2024-02-09 19:34:17.988 [INFO][2493] k8s.go 491: Wrote updated endpoint to datastore ContainerID="bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493" Namespace="default" Pod="nginx-deployment-845c78c8b9-hxdz5" WorkloadEndpoint="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:18.019886 env[1060]: time="2024-02-09T19:34:18.019773170Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:34:18.020043 env[1060]: time="2024-02-09T19:34:18.019888452Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:34:18.020043 env[1060]: time="2024-02-09T19:34:18.019921257Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:34:18.020108 env[1060]: time="2024-02-09T19:34:18.020080368Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493 pid=2537 runtime=io.containerd.runc.v2 Feb 9 19:34:18.025358 kernel: kauditd_printk_skb: 93 callbacks suppressed Feb 9 19:34:18.025441 kernel: audit: type=1325 audit(1707507258.021:714): table=filter:70 family=2 entries=40 op=nft_register_chain pid=2529 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:18.021000 audit[2529]: NETFILTER_CFG table=filter:70 family=2 entries=40 op=nft_register_chain pid=2529 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:18.021000 audit[2529]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffd60bfc030 a2=0 a3=7ffd60bfc01c items=0 ppid=2118 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:18.035723 kernel: audit: type=1300 audit(1707507258.021:714): arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffd60bfc030 a2=0 a3=7ffd60bfc01c items=0 ppid=2118 pid=2529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:18.021000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:18.039922 kernel: audit: type=1327 audit(1707507258.021:714): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:18.047849 systemd[1]: Started cri-containerd-bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493.scope. Feb 9 19:34:18.072270 kernel: audit: type=1400 audit(1707507258.064:715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072416 kernel: audit: type=1400 audit(1707507258.064:716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.078969 kernel: audit: type=1400 audit(1707507258.064:717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.084011 kernel: audit: type=1400 audit(1707507258.064:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.084069 kernel: audit: type=1400 audit(1707507258.064:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.091338 kernel: audit: type=1400 audit(1707507258.064:720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.071000 audit: BPF prog-id=92 op=LOAD Feb 9 19:34:18.072000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2537 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:18.098750 kernel: audit: type=1400 audit(1707507258.064:721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633733663934393566333833313836386563656439653561373439 Feb 9 19:34:18.072000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2537 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:18.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633733663934393566333833313836386563656439653561373439 Feb 9 19:34:18.072000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.072000 audit: BPF prog-id=93 op=LOAD Feb 9 19:34:18.072000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00036ea50 items=0 ppid=2537 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:18.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633733663934393566333833313836386563656439653561373439 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit: BPF prog-id=94 op=LOAD Feb 9 19:34:18.073000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00036ea98 items=0 ppid=2537 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:18.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633733663934393566333833313836386563656439653561373439 Feb 9 19:34:18.073000 audit: BPF prog-id=94 op=UNLOAD Feb 9 19:34:18.073000 audit: BPF prog-id=93 op=UNLOAD Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { perfmon } for pid=2547 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit[2547]: AVC avc: denied { bpf } for pid=2547 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:18.073000 audit: BPF prog-id=95 op=LOAD Feb 9 19:34:18.073000 audit[2547]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00036eea8 items=0 ppid=2537 pid=2547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:18.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633733663934393566333833313836386563656439653561373439 Feb 9 19:34:18.127043 env[1060]: time="2024-02-09T19:34:18.126969788Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-hxdz5,Uid:d1904e91-6b9b-4b10-b6be-5416a9f570d8,Namespace:default,Attempt:1,} returns sandbox id \"bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493\"" Feb 9 19:34:18.234853 kubelet[1378]: E0209 19:34:18.234597 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:19.182387 env[1060]: time="2024-02-09T19:34:19.182292456Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:19.186700 env[1060]: time="2024-02-09T19:34:19.186581185Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:19.188701 env[1060]: time="2024-02-09T19:34:19.188664011Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:19.192913 env[1060]: time="2024-02-09T19:34:19.192868260Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:19.195530 env[1060]: time="2024-02-09T19:34:19.195448285Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:34:19.196882 env[1060]: time="2024-02-09T19:34:19.196811966Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:34:19.199659 env[1060]: time="2024-02-09T19:34:19.199585961Z" level=info msg="CreateContainer within sandbox \"4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:34:19.228750 env[1060]: time="2024-02-09T19:34:19.228702226Z" level=info msg="CreateContainer within sandbox \"4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"deb81172585759bab931084a2ab691460905dcceb8583ac063be8ccac2012893\"" Feb 9 19:34:19.230003 env[1060]: time="2024-02-09T19:34:19.229945785Z" level=info msg="StartContainer for \"deb81172585759bab931084a2ab691460905dcceb8583ac063be8ccac2012893\"" Feb 9 19:34:19.236536 kubelet[1378]: E0209 19:34:19.236436 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:19.261720 systemd[1]: Started cri-containerd-deb81172585759bab931084a2ab691460905dcceb8583ac063be8ccac2012893.scope. Feb 9 19:34:19.288000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.288000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2366 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:19.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623831313732353835373539626162393331303834613261623639 Feb 9 19:34:19.288000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.288000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.288000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.288000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.288000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.288000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.288000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.288000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.288000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.288000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.288000 audit: BPF prog-id=96 op=LOAD Feb 9 19:34:19.288000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00027f330 items=0 ppid=2366 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:19.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623831313732353835373539626162393331303834613261623639 Feb 9 19:34:19.290000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.290000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.290000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.290000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.290000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.290000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.290000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.290000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.290000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.290000 audit: BPF prog-id=97 op=LOAD Feb 9 19:34:19.290000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00027f378 items=0 ppid=2366 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:19.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623831313732353835373539626162393331303834613261623639 Feb 9 19:34:19.291000 audit: BPF prog-id=97 op=UNLOAD Feb 9 19:34:19.291000 audit: BPF prog-id=96 op=UNLOAD Feb 9 19:34:19.291000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.291000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.291000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.291000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.291000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.291000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.291000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.291000 audit[2578]: AVC avc: denied { perfmon } for pid=2578 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.291000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.291000 audit[2578]: AVC avc: denied { bpf } for pid=2578 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:19.291000 audit: BPF prog-id=98 op=LOAD Feb 9 19:34:19.291000 audit[2578]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00027f408 items=0 ppid=2366 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:19.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465623831313732353835373539626162393331303834613261623639 Feb 9 19:34:19.361118 kubelet[1378]: I0209 19:34:19.361066 1378 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:34:19.370306 kubelet[1378]: I0209 19:34:19.370049 1378 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:34:19.397097 env[1060]: time="2024-02-09T19:34:19.397008721Z" level=info msg="StartContainer for \"deb81172585759bab931084a2ab691460905dcceb8583ac063be8ccac2012893\" returns successfully" Feb 9 19:34:19.702404 kubelet[1378]: I0209 19:34:19.702329 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-xqgtg" podStartSLOduration=41.05097597 podCreationTimestamp="2024-02-09 19:33:32 +0000 UTC" firstStartedPulling="2024-02-09 19:34:12.5448946 +0000 UTC m=+41.922903289" lastFinishedPulling="2024-02-09 19:34:19.196136609 +0000 UTC m=+48.574145338" observedRunningTime="2024-02-09 19:34:19.700663555 +0000 UTC m=+49.078672334" watchObservedRunningTime="2024-02-09 19:34:19.702218019 +0000 UTC m=+49.080226758" Feb 9 19:34:19.811554 systemd-networkd[971]: cali1c5e9c9fd41: Gained IPv6LL Feb 9 19:34:20.237691 kubelet[1378]: E0209 19:34:20.237546 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:21.237850 kubelet[1378]: E0209 19:34:21.237743 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:22.238062 kubelet[1378]: E0209 19:34:22.237987 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:23.137786 kernel: kauditd_printk_skb: 93 callbacks suppressed Feb 9 19:34:23.138065 kernel: audit: type=1325 audit(1707507263.126:739): table=filter:71 family=2 entries=9 op=nft_register_rule pid=2618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:23.138128 kernel: audit: type=1300 audit(1707507263.126:739): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd647ef9d0 a2=0 a3=7ffd647ef9bc items=0 ppid=1543 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:23.126000 audit[2618]: NETFILTER_CFG table=filter:71 family=2 entries=9 op=nft_register_rule pid=2618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:23.126000 audit[2618]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd647ef9d0 a2=0 a3=7ffd647ef9bc items=0 ppid=1543 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:23.154387 kernel: audit: type=1327 audit(1707507263.126:739): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:23.154638 kernel: audit: type=1325 audit(1707507263.129:740): table=nat:72 family=2 entries=20 op=nft_register_rule pid=2618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:23.154682 kernel: audit: type=1300 audit(1707507263.129:740): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd647ef9d0 a2=0 a3=7ffd647ef9bc items=0 ppid=1543 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:23.126000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:23.129000 audit[2618]: NETFILTER_CFG table=nat:72 family=2 entries=20 op=nft_register_rule pid=2618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:23.129000 audit[2618]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd647ef9d0 a2=0 a3=7ffd647ef9bc items=0 ppid=1543 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:23.155091 kubelet[1378]: I0209 19:34:23.142680 1378 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:34:23.129000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:23.158625 kernel: audit: type=1327 audit(1707507263.129:740): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:23.164000 audit[2623]: NETFILTER_CFG table=filter:73 family=2 entries=10 op=nft_register_rule pid=2623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:23.168631 kernel: audit: type=1325 audit(1707507263.164:741): table=filter:73 family=2 entries=10 op=nft_register_rule pid=2623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:23.164000 audit[2623]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe68400760 a2=0 a3=7ffe6840074c items=0 ppid=1543 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:23.176307 kernel: audit: type=1300 audit(1707507263.164:741): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe68400760 a2=0 a3=7ffe6840074c items=0 ppid=1543 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:23.177807 systemd[1]: Created slice kubepods-besteffort-podf812b914_9815_42bf_9781_627da1e73202.slice. Feb 9 19:34:23.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:23.182760 kernel: audit: type=1327 audit(1707507263.164:741): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:23.182833 kernel: audit: type=1325 audit(1707507263.164:742): table=nat:74 family=2 entries=20 op=nft_register_rule pid=2623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:23.164000 audit[2623]: NETFILTER_CFG table=nat:74 family=2 entries=20 op=nft_register_rule pid=2623 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:23.164000 audit[2623]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe68400760 a2=0 a3=7ffe6840074c items=0 ppid=1543 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:23.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:23.221674 kubelet[1378]: I0209 19:34:23.219041 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xbmv6\" (UniqueName: \"kubernetes.io/projected/f812b914-9815-42bf-9781-627da1e73202-kube-api-access-xbmv6\") pod \"calico-apiserver-65f98665d6-kd87c\" (UID: \"f812b914-9815-42bf-9781-627da1e73202\") " pod="calico-apiserver/calico-apiserver-65f98665d6-kd87c" Feb 9 19:34:23.221674 kubelet[1378]: I0209 19:34:23.219106 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f812b914-9815-42bf-9781-627da1e73202-calico-apiserver-certs\") pod \"calico-apiserver-65f98665d6-kd87c\" (UID: \"f812b914-9815-42bf-9781-627da1e73202\") " pod="calico-apiserver/calico-apiserver-65f98665d6-kd87c" Feb 9 19:34:23.238298 kubelet[1378]: E0209 19:34:23.238190 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:23.321189 kubelet[1378]: E0209 19:34:23.319769 1378 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 9 19:34:23.321189 kubelet[1378]: E0209 19:34:23.319937 1378 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f812b914-9815-42bf-9781-627da1e73202-calico-apiserver-certs podName:f812b914-9815-42bf-9781-627da1e73202 nodeName:}" failed. No retries permitted until 2024-02-09 19:34:23.819888533 +0000 UTC m=+53.197897272 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/f812b914-9815-42bf-9781-627da1e73202-calico-apiserver-certs") pod "calico-apiserver-65f98665d6-kd87c" (UID: "f812b914-9815-42bf-9781-627da1e73202") : secret "calico-apiserver-certs" not found Feb 9 19:34:24.087447 env[1060]: time="2024-02-09T19:34:24.087337359Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65f98665d6-kd87c,Uid:f812b914-9815-42bf-9781-627da1e73202,Namespace:calico-apiserver,Attempt:0,}" Feb 9 19:34:24.227725 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1776387376.mount: Deactivated successfully. Feb 9 19:34:24.239060 kubelet[1378]: E0209 19:34:24.238976 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:24.363295 systemd-networkd[971]: calieb83ab044bd: Link UP Feb 9 19:34:24.366076 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:34:24.366264 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calieb83ab044bd: link becomes ready Feb 9 19:34:24.366532 systemd-networkd[971]: calieb83ab044bd: Gained carrier Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.210 [INFO][2626] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-eth0 calico-apiserver-65f98665d6- calico-apiserver f812b914-9815-42bf-9781-627da1e73202 1158 0 2024-02-09 19:34:23 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65f98665d6 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s 172.24.4.156 calico-apiserver-65f98665d6-kd87c eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calieb83ab044bd [] []}} ContainerID="2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" Namespace="calico-apiserver" Pod="calico-apiserver-65f98665d6-kd87c" WorkloadEndpoint="172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-" Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.210 [INFO][2626] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" Namespace="calico-apiserver" Pod="calico-apiserver-65f98665d6-kd87c" WorkloadEndpoint="172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-eth0" Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.269 [INFO][2638] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" HandleID="k8s-pod-network.2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" Workload="172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-eth0" Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.286 [INFO][2638] ipam_plugin.go 268: Auto assigning IP ContainerID="2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" HandleID="k8s-pod-network.2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" Workload="172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c5de0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"172.24.4.156", "pod":"calico-apiserver-65f98665d6-kd87c", "timestamp":"2024-02-09 19:34:24.269923739 +0000 UTC"}, Hostname:"172.24.4.156", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.286 [INFO][2638] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.286 [INFO][2638] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.286 [INFO][2638] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.156' Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.290 [INFO][2638] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" host="172.24.4.156" Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.297 [INFO][2638] ipam.go 372: Looking up existing affinities for host host="172.24.4.156" Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.314 [INFO][2638] ipam.go 489: Trying affinity for 192.168.29.128/26 host="172.24.4.156" Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.320 [INFO][2638] ipam.go 155: Attempting to load block cidr=192.168.29.128/26 host="172.24.4.156" Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.324 [INFO][2638] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.128/26 host="172.24.4.156" Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.324 [INFO][2638] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.128/26 handle="k8s-pod-network.2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" host="172.24.4.156" Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.326 [INFO][2638] ipam.go 1682: Creating new handle: k8s-pod-network.2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.338 [INFO][2638] ipam.go 1203: Writing block in order to claim IPs block=192.168.29.128/26 handle="k8s-pod-network.2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" host="172.24.4.156" Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.349 [INFO][2638] ipam.go 1216: Successfully claimed IPs: [192.168.29.131/26] block=192.168.29.128/26 handle="k8s-pod-network.2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" host="172.24.4.156" Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.349 [INFO][2638] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.131/26] handle="k8s-pod-network.2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" host="172.24.4.156" Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.349 [INFO][2638] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:24.389732 env[1060]: 2024-02-09 19:34:24.349 [INFO][2638] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.29.131/26] IPv6=[] ContainerID="2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" HandleID="k8s-pod-network.2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" Workload="172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-eth0" Feb 9 19:34:24.391477 env[1060]: 2024-02-09 19:34:24.350 [INFO][2626] k8s.go 385: Populated endpoint ContainerID="2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" Namespace="calico-apiserver" Pod="calico-apiserver-65f98665d6-kd87c" WorkloadEndpoint="172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-eth0", GenerateName:"calico-apiserver-65f98665d6-", Namespace:"calico-apiserver", SelfLink:"", UID:"f812b914-9815-42bf-9781-627da1e73202", ResourceVersion:"1158", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65f98665d6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"", Pod:"calico-apiserver-65f98665d6-kd87c", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.29.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calieb83ab044bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:24.391477 env[1060]: 2024-02-09 19:34:24.350 [INFO][2626] k8s.go 386: Calico CNI using IPs: [192.168.29.131/32] ContainerID="2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" Namespace="calico-apiserver" Pod="calico-apiserver-65f98665d6-kd87c" WorkloadEndpoint="172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-eth0" Feb 9 19:34:24.391477 env[1060]: 2024-02-09 19:34:24.351 [INFO][2626] dataplane_linux.go 68: Setting the host side veth name to calieb83ab044bd ContainerID="2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" Namespace="calico-apiserver" Pod="calico-apiserver-65f98665d6-kd87c" WorkloadEndpoint="172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-eth0" Feb 9 19:34:24.391477 env[1060]: 2024-02-09 19:34:24.367 [INFO][2626] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" Namespace="calico-apiserver" Pod="calico-apiserver-65f98665d6-kd87c" WorkloadEndpoint="172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-eth0" Feb 9 19:34:24.391477 env[1060]: 2024-02-09 19:34:24.368 [INFO][2626] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" Namespace="calico-apiserver" Pod="calico-apiserver-65f98665d6-kd87c" WorkloadEndpoint="172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-eth0", GenerateName:"calico-apiserver-65f98665d6-", Namespace:"calico-apiserver", SelfLink:"", UID:"f812b914-9815-42bf-9781-627da1e73202", ResourceVersion:"1158", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65f98665d6", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d", Pod:"calico-apiserver-65f98665d6-kd87c", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.29.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calieb83ab044bd", MAC:"ee:ab:67:77:15:3a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:24.391477 env[1060]: 2024-02-09 19:34:24.385 [INFO][2626] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d" Namespace="calico-apiserver" Pod="calico-apiserver-65f98665d6-kd87c" WorkloadEndpoint="172.24.4.156-k8s-calico--apiserver--65f98665d6--kd87c-eth0" Feb 9 19:34:24.446596 env[1060]: time="2024-02-09T19:34:24.446507848Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:34:24.446596 env[1060]: time="2024-02-09T19:34:24.446555744Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:34:24.446898 env[1060]: time="2024-02-09T19:34:24.446570774Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:34:24.447176 env[1060]: time="2024-02-09T19:34:24.447109300Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d pid=2669 runtime=io.containerd.runc.v2 Feb 9 19:34:24.452000 audit[2673]: NETFILTER_CFG table=filter:75 family=2 entries=51 op=nft_register_chain pid=2673 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:24.452000 audit[2673]: SYSCALL arch=c000003e syscall=46 success=yes exit=26916 a0=3 a1=7fff7e1071e0 a2=0 a3=7fff7e1071cc items=0 ppid=2118 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:24.452000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:24.470311 systemd[1]: Started cri-containerd-2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d.scope. Feb 9 19:34:24.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.496000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.496000 audit: BPF prog-id=99 op=LOAD Feb 9 19:34:24.497000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.497000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2669 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:24.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262613337306539616665376434626161653965393131376338666537 Feb 9 19:34:24.497000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.497000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2669 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:24.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262613337306539616665376434626161653965393131376338666537 Feb 9 19:34:24.498000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.498000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.498000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.498000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.498000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.498000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.498000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.498000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.498000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.498000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.498000 audit: BPF prog-id=100 op=LOAD Feb 9 19:34:24.498000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000025060 items=0 ppid=2669 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:24.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262613337306539616665376434626161653965393131376338666537 Feb 9 19:34:24.499000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.499000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.499000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.499000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.499000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.499000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.499000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.499000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.499000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.499000 audit: BPF prog-id=101 op=LOAD Feb 9 19:34:24.499000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000250a8 items=0 ppid=2669 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:24.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262613337306539616665376434626161653965393131376338666537 Feb 9 19:34:24.499000 audit: BPF prog-id=101 op=UNLOAD Feb 9 19:34:24.499000 audit: BPF prog-id=100 op=UNLOAD Feb 9 19:34:24.500000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.500000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.500000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.500000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.500000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.500000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.500000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.500000 audit[2680]: AVC avc: denied { perfmon } for pid=2680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.500000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.500000 audit[2680]: AVC avc: denied { bpf } for pid=2680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:24.500000 audit: BPF prog-id=102 op=LOAD Feb 9 19:34:24.500000 audit[2680]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000254b8 items=0 ppid=2669 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:24.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262613337306539616665376434626161653965393131376338666537 Feb 9 19:34:24.542072 env[1060]: time="2024-02-09T19:34:24.541987076Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65f98665d6-kd87c,Uid:f812b914-9815-42bf-9781-627da1e73202,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d\"" Feb 9 19:34:25.239803 kubelet[1378]: E0209 19:34:25.239732 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:25.765489 systemd-networkd[971]: calieb83ab044bd: Gained IPv6LL Feb 9 19:34:26.012082 env[1060]: time="2024-02-09T19:34:26.011995709Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:26.019995 env[1060]: time="2024-02-09T19:34:26.019825563Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:26.028086 env[1060]: time="2024-02-09T19:34:26.028024834Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:26.034665 env[1060]: time="2024-02-09T19:34:26.034550678Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:26.039036 env[1060]: time="2024-02-09T19:34:26.037306733Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:34:26.041518 env[1060]: time="2024-02-09T19:34:26.041462510Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 9 19:34:26.044002 env[1060]: time="2024-02-09T19:34:26.043921144Z" level=info msg="CreateContainer within sandbox \"bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 19:34:26.071510 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2287355901.mount: Deactivated successfully. Feb 9 19:34:26.091172 env[1060]: time="2024-02-09T19:34:26.091081649Z" level=info msg="CreateContainer within sandbox \"bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"664d9e135bea68dc3edab4bbc4448305933b6ab250c79685160169c03fec175e\"" Feb 9 19:34:26.093061 env[1060]: time="2024-02-09T19:34:26.093003191Z" level=info msg="StartContainer for \"664d9e135bea68dc3edab4bbc4448305933b6ab250c79685160169c03fec175e\"" Feb 9 19:34:26.142126 systemd[1]: Started cri-containerd-664d9e135bea68dc3edab4bbc4448305933b6ab250c79685160169c03fec175e.scope. Feb 9 19:34:26.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.173000 audit: BPF prog-id=103 op=LOAD Feb 9 19:34:26.177000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.177000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2537 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:26.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636346439653133356265613638646333656461623462626334343438 Feb 9 19:34:26.178000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.178000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2537 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:26.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636346439653133356265613638646333656461623462626334343438 Feb 9 19:34:26.179000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.179000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.179000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.179000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.179000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.179000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.179000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.179000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.179000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.179000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.179000 audit: BPF prog-id=104 op=LOAD Feb 9 19:34:26.179000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003c80a0 items=0 ppid=2537 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:26.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636346439653133356265613638646333656461623462626334343438 Feb 9 19:34:26.182000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.182000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.182000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.182000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.182000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.182000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.182000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.182000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.182000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.182000 audit: BPF prog-id=105 op=LOAD Feb 9 19:34:26.182000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003c80e8 items=0 ppid=2537 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:26.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636346439653133356265613638646333656461623462626334343438 Feb 9 19:34:26.184000 audit: BPF prog-id=105 op=UNLOAD Feb 9 19:34:26.184000 audit: BPF prog-id=104 op=UNLOAD Feb 9 19:34:26.184000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.184000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.184000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.184000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.184000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.184000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.184000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.184000 audit[2711]: AVC avc: denied { perfmon } for pid=2711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.184000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.184000 audit[2711]: AVC avc: denied { bpf } for pid=2711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:26.184000 audit: BPF prog-id=106 op=LOAD Feb 9 19:34:26.184000 audit[2711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c84f8 items=0 ppid=2537 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:26.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636346439653133356265613638646333656461623462626334343438 Feb 9 19:34:26.211909 env[1060]: time="2024-02-09T19:34:26.211838137Z" level=info msg="StartContainer for \"664d9e135bea68dc3edab4bbc4448305933b6ab250c79685160169c03fec175e\" returns successfully" Feb 9 19:34:26.240824 kubelet[1378]: E0209 19:34:26.240763 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:26.748204 kubelet[1378]: I0209 19:34:26.748118 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-hxdz5" podStartSLOduration=17.836815144 podCreationTimestamp="2024-02-09 19:34:01 +0000 UTC" firstStartedPulling="2024-02-09 19:34:18.128725983 +0000 UTC m=+47.506734672" lastFinishedPulling="2024-02-09 19:34:26.039941568 +0000 UTC m=+55.417950297" observedRunningTime="2024-02-09 19:34:26.747981832 +0000 UTC m=+56.125990571" watchObservedRunningTime="2024-02-09 19:34:26.748030769 +0000 UTC m=+56.126039519" Feb 9 19:34:27.241633 kubelet[1378]: E0209 19:34:27.241485 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:27.629936 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2314999134.mount: Deactivated successfully. Feb 9 19:34:28.242750 kubelet[1378]: E0209 19:34:28.242667 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:29.243942 kubelet[1378]: E0209 19:34:29.243478 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:30.244981 kubelet[1378]: E0209 19:34:30.244825 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:30.885206 env[1060]: time="2024-02-09T19:34:30.885143096Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:30.888934 env[1060]: time="2024-02-09T19:34:30.888903010Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:30.892710 env[1060]: time="2024-02-09T19:34:30.892578366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:30.895755 env[1060]: time="2024-02-09T19:34:30.895725974Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:30.897816 env[1060]: time="2024-02-09T19:34:30.897744777Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 9 19:34:30.901850 env[1060]: time="2024-02-09T19:34:30.901756361Z" level=info msg="CreateContainer within sandbox \"2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 9 19:34:30.918878 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1671394649.mount: Deactivated successfully. Feb 9 19:34:30.928292 env[1060]: time="2024-02-09T19:34:30.928210912Z" level=info msg="CreateContainer within sandbox \"2ba370e9afe7d4baae9e9117c8fe76fc7f795f8b2543fd1c36f8522455fe570d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"811d2550a6fb735314195e83c2eff69fef5dcff3e345cdeb169713fc1f26847d\"" Feb 9 19:34:30.929646 env[1060]: time="2024-02-09T19:34:30.929583521Z" level=info msg="StartContainer for \"811d2550a6fb735314195e83c2eff69fef5dcff3e345cdeb169713fc1f26847d\"" Feb 9 19:34:30.968022 systemd[1]: Started cri-containerd-811d2550a6fb735314195e83c2eff69fef5dcff3e345cdeb169713fc1f26847d.scope. Feb 9 19:34:30.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.996102 kernel: kauditd_printk_skb: 119 callbacks suppressed Feb 9 19:34:30.996233 kernel: audit: type=1400 audit(1707507270.991:780): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.011488 kernel: audit: type=1400 audit(1707507270.991:781): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.011701 kernel: audit: type=1400 audit(1707507270.991:782): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.020551 kernel: audit: type=1400 audit(1707507270.991:783): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.020668 kernel: audit: type=1400 audit(1707507270.991:784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.027906 kernel: audit: type=1400 audit(1707507270.991:785): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.028032 kernel: audit: type=1400 audit(1707507270.991:786): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.031364 kernel: audit: type=1400 audit(1707507270.991:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.034969 kernel: audit: type=1400 audit(1707507270.991:788): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.044632 kernel: audit: type=1400 audit(1707507270.992:789): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit: BPF prog-id=107 op=LOAD Feb 9 19:34:30.992000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2669 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:30.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831316432353530613666623733353331343139356538336332656666 Feb 9 19:34:30.992000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2669 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:30.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831316432353530613666623733353331343139356538336332656666 Feb 9 19:34:30.992000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:30.992000 audit: BPF prog-id=108 op=LOAD Feb 9 19:34:30.992000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001b8670 items=0 ppid=2669 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:30.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831316432353530613666623733353331343139356538336332656666 Feb 9 19:34:31.002000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.002000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.002000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.002000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.002000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.002000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.002000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.002000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.002000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.002000 audit: BPF prog-id=109 op=LOAD Feb 9 19:34:31.002000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001b86b8 items=0 ppid=2669 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:31.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831316432353530613666623733353331343139356538336332656666 Feb 9 19:34:31.016000 audit: BPF prog-id=109 op=UNLOAD Feb 9 19:34:31.016000 audit: BPF prog-id=108 op=UNLOAD Feb 9 19:34:31.016000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.016000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.016000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.016000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.016000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.016000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.016000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.016000 audit[2778]: AVC avc: denied { perfmon } for pid=2778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.016000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.016000 audit[2778]: AVC avc: denied { bpf } for pid=2778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:31.016000 audit: BPF prog-id=110 op=LOAD Feb 9 19:34:31.016000 audit[2778]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001b8ac8 items=0 ppid=2669 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:31.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831316432353530613666623733353331343139356538336332656666 Feb 9 19:34:31.078804 env[1060]: time="2024-02-09T19:34:31.078751070Z" level=info msg="StartContainer for \"811d2550a6fb735314195e83c2eff69fef5dcff3e345cdeb169713fc1f26847d\" returns successfully" Feb 9 19:34:31.189010 kubelet[1378]: E0209 19:34:31.188818 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:31.208823 env[1060]: time="2024-02-09T19:34:31.208784591Z" level=info msg="StopPodSandbox for \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\"" Feb 9 19:34:31.245762 kubelet[1378]: E0209 19:34:31.245693 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:31.348951 env[1060]: 2024-02-09 19:34:31.292 [WARNING][2822] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"d1904e91-6b9b-4b10-b6be-5416a9f570d8", ResourceVersion:"1193", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493", Pod:"nginx-deployment-845c78c8b9-hxdz5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1c5e9c9fd41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:31.348951 env[1060]: 2024-02-09 19:34:31.293 [INFO][2822] k8s.go 578: Cleaning up netns ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:31.348951 env[1060]: 2024-02-09 19:34:31.293 [INFO][2822] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" iface="eth0" netns="" Feb 9 19:34:31.348951 env[1060]: 2024-02-09 19:34:31.293 [INFO][2822] k8s.go 585: Releasing IP address(es) ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:31.348951 env[1060]: 2024-02-09 19:34:31.293 [INFO][2822] utils.go 188: Calico CNI releasing IP address ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:31.348951 env[1060]: 2024-02-09 19:34:31.324 [INFO][2828] ipam_plugin.go 415: Releasing address using handleID ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" HandleID="k8s-pod-network.6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Workload="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:31.348951 env[1060]: 2024-02-09 19:34:31.324 [INFO][2828] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:31.348951 env[1060]: 2024-02-09 19:34:31.325 [INFO][2828] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:31.348951 env[1060]: 2024-02-09 19:34:31.339 [WARNING][2828] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" HandleID="k8s-pod-network.6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Workload="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:31.348951 env[1060]: 2024-02-09 19:34:31.339 [INFO][2828] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" HandleID="k8s-pod-network.6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Workload="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:31.348951 env[1060]: 2024-02-09 19:34:31.342 [INFO][2828] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:31.348951 env[1060]: 2024-02-09 19:34:31.347 [INFO][2822] k8s.go 591: Teardown processing complete. ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:31.349502 env[1060]: time="2024-02-09T19:34:31.349030080Z" level=info msg="TearDown network for sandbox \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\" successfully" Feb 9 19:34:31.349502 env[1060]: time="2024-02-09T19:34:31.349153085Z" level=info msg="StopPodSandbox for \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\" returns successfully" Feb 9 19:34:31.349860 env[1060]: time="2024-02-09T19:34:31.349827405Z" level=info msg="RemovePodSandbox for \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\"" Feb 9 19:34:31.349917 env[1060]: time="2024-02-09T19:34:31.349866031Z" level=info msg="Forcibly stopping sandbox \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\"" Feb 9 19:34:31.483524 env[1060]: 2024-02-09 19:34:31.409 [WARNING][2848] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"d1904e91-6b9b-4b10-b6be-5416a9f570d8", ResourceVersion:"1193", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"bfc73f9495f3831868eced9e5a749ef4c0d83aaf51788095c384a74b39483493", Pod:"nginx-deployment-845c78c8b9-hxdz5", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali1c5e9c9fd41", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:31.483524 env[1060]: 2024-02-09 19:34:31.410 [INFO][2848] k8s.go 578: Cleaning up netns ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:31.483524 env[1060]: 2024-02-09 19:34:31.410 [INFO][2848] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" iface="eth0" netns="" Feb 9 19:34:31.483524 env[1060]: 2024-02-09 19:34:31.410 [INFO][2848] k8s.go 585: Releasing IP address(es) ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:31.483524 env[1060]: 2024-02-09 19:34:31.410 [INFO][2848] utils.go 188: Calico CNI releasing IP address ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:31.483524 env[1060]: 2024-02-09 19:34:31.457 [INFO][2854] ipam_plugin.go 415: Releasing address using handleID ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" HandleID="k8s-pod-network.6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Workload="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:31.483524 env[1060]: 2024-02-09 19:34:31.457 [INFO][2854] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:31.483524 env[1060]: 2024-02-09 19:34:31.463 [INFO][2854] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:31.483524 env[1060]: 2024-02-09 19:34:31.475 [WARNING][2854] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" HandleID="k8s-pod-network.6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Workload="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:31.483524 env[1060]: 2024-02-09 19:34:31.475 [INFO][2854] ipam_plugin.go 443: Releasing address using workloadID ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" HandleID="k8s-pod-network.6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Workload="172.24.4.156-k8s-nginx--deployment--845c78c8b9--hxdz5-eth0" Feb 9 19:34:31.483524 env[1060]: 2024-02-09 19:34:31.481 [INFO][2854] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:31.483524 env[1060]: 2024-02-09 19:34:31.482 [INFO][2848] k8s.go 591: Teardown processing complete. ContainerID="6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab" Feb 9 19:34:31.484573 env[1060]: time="2024-02-09T19:34:31.483490136Z" level=info msg="TearDown network for sandbox \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\" successfully" Feb 9 19:34:31.526432 env[1060]: time="2024-02-09T19:34:31.526337118Z" level=info msg="RemovePodSandbox \"6f932e987c9e01b8c67a926b7fd1baedb3e7a5c1174d219676c4dcd3a9b8aeab\" returns successfully" Feb 9 19:34:31.527406 env[1060]: time="2024-02-09T19:34:31.527346434Z" level=info msg="StopPodSandbox for \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\"" Feb 9 19:34:31.672999 env[1060]: 2024-02-09 19:34:31.624 [WARNING][2877] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-csi--node--driver--xqgtg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"52ed98cb-0e1f-483f-ada3-e6760f45d1cd", ResourceVersion:"1113", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693", Pod:"csi-node-driver-xqgtg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif618d65b76a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:31.672999 env[1060]: 2024-02-09 19:34:31.624 [INFO][2877] k8s.go 578: Cleaning up netns ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:34:31.672999 env[1060]: 2024-02-09 19:34:31.624 [INFO][2877] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" iface="eth0" netns="" Feb 9 19:34:31.672999 env[1060]: 2024-02-09 19:34:31.624 [INFO][2877] k8s.go 585: Releasing IP address(es) ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:34:31.672999 env[1060]: 2024-02-09 19:34:31.624 [INFO][2877] utils.go 188: Calico CNI releasing IP address ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:34:31.672999 env[1060]: 2024-02-09 19:34:31.654 [INFO][2883] ipam_plugin.go 415: Releasing address using handleID ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" HandleID="k8s-pod-network.fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Workload="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:31.672999 env[1060]: 2024-02-09 19:34:31.654 [INFO][2883] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:31.672999 env[1060]: 2024-02-09 19:34:31.654 [INFO][2883] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:31.672999 env[1060]: 2024-02-09 19:34:31.664 [WARNING][2883] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" HandleID="k8s-pod-network.fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Workload="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:31.672999 env[1060]: 2024-02-09 19:34:31.664 [INFO][2883] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" HandleID="k8s-pod-network.fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Workload="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:31.672999 env[1060]: 2024-02-09 19:34:31.668 [INFO][2883] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:31.672999 env[1060]: 2024-02-09 19:34:31.670 [INFO][2877] k8s.go 591: Teardown processing complete. ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:34:31.673697 env[1060]: time="2024-02-09T19:34:31.673085376Z" level=info msg="TearDown network for sandbox \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\" successfully" Feb 9 19:34:31.673697 env[1060]: time="2024-02-09T19:34:31.673255174Z" level=info msg="StopPodSandbox for \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\" returns successfully" Feb 9 19:34:31.674895 env[1060]: time="2024-02-09T19:34:31.674857386Z" level=info msg="RemovePodSandbox for \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\"" Feb 9 19:34:31.675017 env[1060]: time="2024-02-09T19:34:31.674971023Z" level=info msg="Forcibly stopping sandbox \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\"" Feb 9 19:34:31.773000 audit[2912]: NETFILTER_CFG table=filter:76 family=2 entries=10 op=nft_register_rule pid=2912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:31.773000 audit[2912]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd09e3daf0 a2=0 a3=7ffd09e3dadc items=0 ppid=1543 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:31.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:31.774000 audit[2912]: NETFILTER_CFG table=nat:77 family=2 entries=20 op=nft_register_rule pid=2912 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:31.774000 audit[2912]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd09e3daf0 a2=0 a3=7ffd09e3dadc items=0 ppid=1543 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:31.774000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:31.801000 audit[2789]: AVC avc: denied { watch } for pid=2789 comm="apiserver" path="/calico-apiserver-certs/..2024_02_09_19_34_23.3603799767/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c639,c836 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c639,c836 tclass=file permissive=0 Feb 9 19:34:31.801000 audit[2789]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000776080 a2=fc6 a3=0 items=0 ppid=2669 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c639,c836 key=(null) Feb 9 19:34:31.801000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 9 19:34:31.843154 env[1060]: 2024-02-09 19:34:31.763 [WARNING][2901] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-csi--node--driver--xqgtg-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"52ed98cb-0e1f-483f-ada3-e6760f45d1cd", ResourceVersion:"1113", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 33, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"4dcff1fc7fe29f559809dc9c844b9fe7bf5498e9cdf0d22d13e8da9170e87693", Pod:"csi-node-driver-xqgtg", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif618d65b76a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:31.843154 env[1060]: 2024-02-09 19:34:31.764 [INFO][2901] k8s.go 578: Cleaning up netns ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:34:31.843154 env[1060]: 2024-02-09 19:34:31.764 [INFO][2901] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" iface="eth0" netns="" Feb 9 19:34:31.843154 env[1060]: 2024-02-09 19:34:31.764 [INFO][2901] k8s.go 585: Releasing IP address(es) ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:34:31.843154 env[1060]: 2024-02-09 19:34:31.764 [INFO][2901] utils.go 188: Calico CNI releasing IP address ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:34:31.843154 env[1060]: 2024-02-09 19:34:31.796 [INFO][2908] ipam_plugin.go 415: Releasing address using handleID ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" HandleID="k8s-pod-network.fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Workload="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:31.843154 env[1060]: 2024-02-09 19:34:31.796 [INFO][2908] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:31.843154 env[1060]: 2024-02-09 19:34:31.796 [INFO][2908] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:31.843154 env[1060]: 2024-02-09 19:34:31.830 [WARNING][2908] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" HandleID="k8s-pod-network.fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Workload="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:31.843154 env[1060]: 2024-02-09 19:34:31.830 [INFO][2908] ipam_plugin.go 443: Releasing address using workloadID ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" HandleID="k8s-pod-network.fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Workload="172.24.4.156-k8s-csi--node--driver--xqgtg-eth0" Feb 9 19:34:31.843154 env[1060]: 2024-02-09 19:34:31.839 [INFO][2908] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:31.843154 env[1060]: 2024-02-09 19:34:31.841 [INFO][2901] k8s.go 591: Teardown processing complete. ContainerID="fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2" Feb 9 19:34:31.843853 env[1060]: time="2024-02-09T19:34:31.843786460Z" level=info msg="TearDown network for sandbox \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\" successfully" Feb 9 19:34:31.850712 env[1060]: time="2024-02-09T19:34:31.850648653Z" level=info msg="RemovePodSandbox \"fea6fe9699213376cddfc678ae1c4a407840a588acbf4b20f97547975d608fd2\" returns successfully" Feb 9 19:34:31.916169 systemd[1]: run-containerd-runc-k8s.io-811d2550a6fb735314195e83c2eff69fef5dcff3e345cdeb169713fc1f26847d-runc.K6tGVQ.mount: Deactivated successfully. Feb 9 19:34:32.246398 kubelet[1378]: E0209 19:34:32.246328 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:32.303000 audit[2916]: NETFILTER_CFG table=filter:78 family=2 entries=10 op=nft_register_rule pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:32.303000 audit[2916]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd6d30a9d0 a2=0 a3=7ffd6d30a9bc items=0 ppid=1543 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:32.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:32.306000 audit[2916]: NETFILTER_CFG table=nat:79 family=2 entries=20 op=nft_register_rule pid=2916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:32.306000 audit[2916]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd6d30a9d0 a2=0 a3=7ffd6d30a9bc items=0 ppid=1543 pid=2916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:32.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:33.246996 kubelet[1378]: E0209 19:34:33.246923 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:34.248570 kubelet[1378]: E0209 19:34:34.248518 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:35.250065 kubelet[1378]: E0209 19:34:35.249998 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:36.251290 kubelet[1378]: E0209 19:34:36.251220 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:37.252460 kubelet[1378]: E0209 19:34:37.252346 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:38.253713 kubelet[1378]: E0209 19:34:38.253649 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:39.255104 kubelet[1378]: E0209 19:34:39.255001 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:40.255359 kubelet[1378]: E0209 19:34:40.255276 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:40.627000 audit[2922]: NETFILTER_CFG table=filter:80 family=2 entries=22 op=nft_register_rule pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:40.630709 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 9 19:34:40.630857 kernel: audit: type=1325 audit(1707507280.627:803): table=filter:80 family=2 entries=22 op=nft_register_rule pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:40.627000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffe1bf020e0 a2=0 a3=7ffe1bf020cc items=0 ppid=1543 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:40.650854 kernel: audit: type=1300 audit(1707507280.627:803): arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffe1bf020e0 a2=0 a3=7ffe1bf020cc items=0 ppid=1543 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:40.653816 kernel: audit: type=1327 audit(1707507280.627:803): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:40.627000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:40.659000 audit[2922]: NETFILTER_CFG table=nat:81 family=2 entries=20 op=nft_register_rule pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:40.659000 audit[2922]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe1bf020e0 a2=0 a3=4f4e203b7374726f items=0 ppid=1543 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:40.682147 kernel: audit: type=1325 audit(1707507280.659:804): table=nat:81 family=2 entries=20 op=nft_register_rule pid=2922 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:40.682367 kernel: audit: type=1300 audit(1707507280.659:804): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe1bf020e0 a2=0 a3=4f4e203b7374726f items=0 ppid=1543 pid=2922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:40.659000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:40.690654 kernel: audit: type=1327 audit(1707507280.659:804): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:40.688000 audit[2924]: NETFILTER_CFG table=filter:82 family=2 entries=34 op=nft_register_rule pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:40.688000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffd70e0c310 a2=0 a3=7ffd70e0c2fc items=0 ppid=1543 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:40.710651 kernel: audit: type=1325 audit(1707507280.688:805): table=filter:82 family=2 entries=34 op=nft_register_rule pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:40.710730 kernel: audit: type=1300 audit(1707507280.688:805): arch=c000003e syscall=46 success=yes exit=11996 a0=3 a1=7ffd70e0c310 a2=0 a3=7ffd70e0c2fc items=0 ppid=1543 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:40.688000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:40.717851 kernel: audit: type=1327 audit(1707507280.688:805): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:40.692000 audit[2924]: NETFILTER_CFG table=nat:83 family=2 entries=20 op=nft_register_rule pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:40.725410 kernel: audit: type=1325 audit(1707507280.692:806): table=nat:83 family=2 entries=20 op=nft_register_rule pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:40.692000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd70e0c310 a2=0 a3=4f4e203b7374726f items=0 ppid=1543 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:40.692000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:41.256845 kubelet[1378]: E0209 19:34:41.256730 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:41.275516 kubelet[1378]: I0209 19:34:41.275467 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65f98665d6-kd87c" podStartSLOduration=11.921045085 podCreationTimestamp="2024-02-09 19:34:23 +0000 UTC" firstStartedPulling="2024-02-09 19:34:24.543809398 +0000 UTC m=+53.921818087" lastFinishedPulling="2024-02-09 19:34:30.898157287 +0000 UTC m=+60.276165986" observedRunningTime="2024-02-09 19:34:31.744741652 +0000 UTC m=+61.122750341" watchObservedRunningTime="2024-02-09 19:34:41.275392984 +0000 UTC m=+70.653401723" Feb 9 19:34:41.276543 kubelet[1378]: I0209 19:34:41.276508 1378 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:34:41.284669 systemd[1]: Created slice kubepods-besteffort-pod319f5e62_5893_43c5_81ba_f32c45282117.slice. Feb 9 19:34:41.363570 kubelet[1378]: I0209 19:34:41.363532 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/319f5e62-5893-43c5-81ba-f32c45282117-data\") pod \"nfs-server-provisioner-0\" (UID: \"319f5e62-5893-43c5-81ba-f32c45282117\") " pod="default/nfs-server-provisioner-0" Feb 9 19:34:41.364755 kubelet[1378]: I0209 19:34:41.364728 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qwh2r\" (UniqueName: \"kubernetes.io/projected/319f5e62-5893-43c5-81ba-f32c45282117-kube-api-access-qwh2r\") pod \"nfs-server-provisioner-0\" (UID: \"319f5e62-5893-43c5-81ba-f32c45282117\") " pod="default/nfs-server-provisioner-0" Feb 9 19:34:41.590800 env[1060]: time="2024-02-09T19:34:41.590471038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:319f5e62-5893-43c5-81ba-f32c45282117,Namespace:default,Attempt:0,}" Feb 9 19:34:41.891039 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:34:41.891240 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 19:34:41.884857 systemd-networkd[971]: cali60e51b789ff: Link UP Feb 9 19:34:41.892303 systemd-networkd[971]: cali60e51b789ff: Gained carrier Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.701 [INFO][2928] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.156-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 319f5e62-5893-43c5-81ba-f32c45282117 1255 0 2024-02-09 19:34:41 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.156 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.156-k8s-nfs--server--provisioner--0-" Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.701 [INFO][2928] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.156-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.779 [INFO][2939] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" HandleID="k8s-pod-network.fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" Workload="172.24.4.156-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.805 [INFO][2939] ipam_plugin.go 268: Auto assigning IP ContainerID="fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" HandleID="k8s-pod-network.fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" Workload="172.24.4.156-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bf950), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.156", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 19:34:41.779466307 +0000 UTC"}, Hostname:"172.24.4.156", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.805 [INFO][2939] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.805 [INFO][2939] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.805 [INFO][2939] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.156' Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.812 [INFO][2939] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" host="172.24.4.156" Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.824 [INFO][2939] ipam.go 372: Looking up existing affinities for host host="172.24.4.156" Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.835 [INFO][2939] ipam.go 489: Trying affinity for 192.168.29.128/26 host="172.24.4.156" Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.841 [INFO][2939] ipam.go 155: Attempting to load block cidr=192.168.29.128/26 host="172.24.4.156" Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.847 [INFO][2939] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.128/26 host="172.24.4.156" Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.848 [INFO][2939] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.128/26 handle="k8s-pod-network.fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" host="172.24.4.156" Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.852 [INFO][2939] ipam.go 1682: Creating new handle: k8s-pod-network.fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544 Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.861 [INFO][2939] ipam.go 1203: Writing block in order to claim IPs block=192.168.29.128/26 handle="k8s-pod-network.fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" host="172.24.4.156" Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.874 [INFO][2939] ipam.go 1216: Successfully claimed IPs: [192.168.29.132/26] block=192.168.29.128/26 handle="k8s-pod-network.fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" host="172.24.4.156" Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.875 [INFO][2939] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.132/26] handle="k8s-pod-network.fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" host="172.24.4.156" Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.875 [INFO][2939] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:34:41.914523 env[1060]: 2024-02-09 19:34:41.875 [INFO][2939] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.29.132/26] IPv6=[] ContainerID="fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" HandleID="k8s-pod-network.fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" Workload="172.24.4.156-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:34:41.916311 env[1060]: 2024-02-09 19:34:41.879 [INFO][2928] k8s.go 385: Populated endpoint ContainerID="fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.156-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"319f5e62-5893-43c5-81ba-f32c45282117", ResourceVersion:"1255", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.29.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:41.916311 env[1060]: 2024-02-09 19:34:41.879 [INFO][2928] k8s.go 386: Calico CNI using IPs: [192.168.29.132/32] ContainerID="fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.156-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:34:41.916311 env[1060]: 2024-02-09 19:34:41.879 [INFO][2928] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.156-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:34:41.916311 env[1060]: 2024-02-09 19:34:41.893 [INFO][2928] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.156-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:34:41.916859 env[1060]: 2024-02-09 19:34:41.894 [INFO][2928] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.156-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"319f5e62-5893-43c5-81ba-f32c45282117", ResourceVersion:"1255", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.29.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"9a:af:d7:18:2d:c8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:34:41.916859 env[1060]: 2024-02-09 19:34:41.911 [INFO][2928] k8s.go 491: Wrote updated endpoint to datastore ContainerID="fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.156-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:34:41.966368 env[1060]: time="2024-02-09T19:34:41.966239731Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:34:41.966518 env[1060]: time="2024-02-09T19:34:41.966422813Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:34:41.966592 env[1060]: time="2024-02-09T19:34:41.966539799Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:34:41.967072 env[1060]: time="2024-02-09T19:34:41.966982627Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544 pid=2971 runtime=io.containerd.runc.v2 Feb 9 19:34:41.974000 audit[2978]: NETFILTER_CFG table=filter:84 family=2 entries=42 op=nft_register_chain pid=2978 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:34:41.974000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=20688 a0=3 a1=7fff51842360 a2=0 a3=7fff5184234c items=0 ppid=2118 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:41.974000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:34:41.993670 systemd[1]: Started cri-containerd-fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544.scope. Feb 9 19:34:42.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.006000 audit: BPF prog-id=111 op=LOAD Feb 9 19:34:42.008000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.008000 audit[2982]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2971 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:42.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665356535323864646633643233383864643539323738306632646263 Feb 9 19:34:42.008000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.008000 audit[2982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2971 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:42.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665356535323864646633643233383864643539323738306632646263 Feb 9 19:34:42.008000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.008000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.008000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.008000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.008000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.008000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.008000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.008000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.008000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.008000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.008000 audit: BPF prog-id=112 op=LOAD Feb 9 19:34:42.008000 audit[2982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001da2c0 items=0 ppid=2971 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:42.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665356535323864646633643233383864643539323738306632646263 Feb 9 19:34:42.009000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.009000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.009000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.009000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.009000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.009000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.009000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.009000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.009000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.009000 audit: BPF prog-id=113 op=LOAD Feb 9 19:34:42.009000 audit[2982]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001da308 items=0 ppid=2971 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:42.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665356535323864646633643233383864643539323738306632646263 Feb 9 19:34:42.012000 audit: BPF prog-id=113 op=UNLOAD Feb 9 19:34:42.012000 audit: BPF prog-id=112 op=UNLOAD Feb 9 19:34:42.012000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.012000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.012000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.012000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.012000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.012000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.012000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.012000 audit[2982]: AVC avc: denied { perfmon } for pid=2982 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.012000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.012000 audit[2982]: AVC avc: denied { bpf } for pid=2982 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:42.012000 audit: BPF prog-id=114 op=LOAD Feb 9 19:34:42.012000 audit[2982]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001da718 items=0 ppid=2971 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:42.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665356535323864646633643233383864643539323738306632646263 Feb 9 19:34:42.048474 env[1060]: time="2024-02-09T19:34:42.048394603Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:319f5e62-5893-43c5-81ba-f32c45282117,Namespace:default,Attempt:0,} returns sandbox id \"fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544\"" Feb 9 19:34:42.050450 env[1060]: time="2024-02-09T19:34:42.050337149Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 19:34:42.258698 kubelet[1378]: E0209 19:34:42.257783 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:42.500388 systemd[1]: run-containerd-runc-k8s.io-fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544-runc.QLZk31.mount: Deactivated successfully. Feb 9 19:34:42.981941 systemd-networkd[971]: cali60e51b789ff: Gained IPv6LL Feb 9 19:34:43.259079 kubelet[1378]: E0209 19:34:43.258914 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:44.260284 kubelet[1378]: E0209 19:34:44.260174 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:45.262508 kubelet[1378]: E0209 19:34:45.262406 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:46.263708 kubelet[1378]: E0209 19:34:46.263638 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:46.307508 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount967784312.mount: Deactivated successfully. Feb 9 19:34:46.496470 systemd[1]: run-containerd-runc-k8s.io-e523ed1124e3d7358b2e9464d8b808dd17450a7ca2c79345e1a943e03f4c8894-runc.eeAnK1.mount: Deactivated successfully. Feb 9 19:34:47.264488 kubelet[1378]: E0209 19:34:47.264392 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:48.264622 kubelet[1378]: E0209 19:34:48.264549 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:49.265061 kubelet[1378]: E0209 19:34:49.264975 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:49.819663 env[1060]: time="2024-02-09T19:34:49.819536335Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:49.822779 env[1060]: time="2024-02-09T19:34:49.822724381Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:49.825764 env[1060]: time="2024-02-09T19:34:49.825719520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:49.829658 env[1060]: time="2024-02-09T19:34:49.829592197Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:34:49.831267 env[1060]: time="2024-02-09T19:34:49.831223131Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 19:34:49.833972 env[1060]: time="2024-02-09T19:34:49.833915334Z" level=info msg="CreateContainer within sandbox \"fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 19:34:49.859109 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2769501786.mount: Deactivated successfully. Feb 9 19:34:49.862904 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1492195940.mount: Deactivated successfully. Feb 9 19:34:49.869371 env[1060]: time="2024-02-09T19:34:49.869252378Z" level=info msg="CreateContainer within sandbox \"fe5e528ddf3d2388dd592780f2dbc934f5709030f00ad256f73308698731b544\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"4839df98f9dd0a002def023faf74a56ac5cb7273cfcb0893c43a5d80278bdc0b\"" Feb 9 19:34:49.870444 env[1060]: time="2024-02-09T19:34:49.870392699Z" level=info msg="StartContainer for \"4839df98f9dd0a002def023faf74a56ac5cb7273cfcb0893c43a5d80278bdc0b\"" Feb 9 19:34:49.912018 systemd[1]: Started cri-containerd-4839df98f9dd0a002def023faf74a56ac5cb7273cfcb0893c43a5d80278bdc0b.scope. Feb 9 19:34:49.942647 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 9 19:34:49.942779 kernel: audit: type=1400 audit(1707507289.936:826): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.942816 kernel: audit: type=1400 audit(1707507289.936:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.948520 kernel: audit: type=1400 audit(1707507289.936:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.948583 kernel: audit: type=1400 audit(1707507289.936:829): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.951664 kernel: audit: type=1400 audit(1707507289.936:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.958465 kernel: audit: type=1400 audit(1707507289.936:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.958510 kernel: audit: type=1400 audit(1707507289.936:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.967709 kernel: audit: type=1400 audit(1707507289.936:833): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.979021 kernel: audit: type=1400 audit(1707507289.936:834): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.979169 kernel: audit: type=1400 audit(1707507289.940:835): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.940000 audit: BPF prog-id=115 op=LOAD Feb 9 19:34:49.944000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.944000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2971 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:49.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438333964663938663964643061303032646566303233666166373461 Feb 9 19:34:49.944000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.944000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2971 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:49.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438333964663938663964643061303032646566303233666166373461 Feb 9 19:34:49.944000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.944000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.944000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.944000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.944000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.944000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.944000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.944000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.944000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.944000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.944000 audit: BPF prog-id=116 op=LOAD Feb 9 19:34:49.944000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000290860 items=0 ppid=2971 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:49.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438333964663938663964643061303032646566303233666166373461 Feb 9 19:34:49.953000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.953000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.953000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.953000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.953000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.953000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.953000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.953000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.953000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.953000 audit: BPF prog-id=117 op=LOAD Feb 9 19:34:49.953000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002908a8 items=0 ppid=2971 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:49.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438333964663938663964643061303032646566303233666166373461 Feb 9 19:34:49.960000 audit: BPF prog-id=117 op=UNLOAD Feb 9 19:34:49.960000 audit: BPF prog-id=116 op=UNLOAD Feb 9 19:34:49.960000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.960000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.960000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.960000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.960000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.960000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.960000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.960000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.960000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.960000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:34:49.960000 audit: BPF prog-id=118 op=LOAD Feb 9 19:34:49.960000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000290cb8 items=0 ppid=2971 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:49.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438333964663938663964643061303032646566303233666166373461 Feb 9 19:34:49.994089 env[1060]: time="2024-02-09T19:34:49.994035879Z" level=info msg="StartContainer for \"4839df98f9dd0a002def023faf74a56ac5cb7273cfcb0893c43a5d80278bdc0b\" returns successfully" Feb 9 19:34:50.038000 audit[3072]: AVC avc: denied { search } for pid=3072 comm="rpcbind" name="crypto" dev="proc" ino=22446 scontext=system_u:system_r:svirt_lxc_net_t:s0:c979,c992 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:34:50.038000 audit[3072]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f9d576bf0c0 a2=0 a3=0 items=0 ppid=3055 pid=3072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c979,c992 key=(null) Feb 9 19:34:50.038000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 19:34:50.079000 audit[3077]: AVC avc: denied { search } for pid=3077 comm="dbus-daemon" name="crypto" dev="proc" ino=22446 scontext=system_u:system_r:svirt_lxc_net_t:s0:c979,c992 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:34:50.079000 audit[3077]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff34682b0c0 a2=0 a3=0 items=0 ppid=3055 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c979,c992 key=(null) Feb 9 19:34:50.079000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:34:50.085000 audit[3078]: AVC avc: denied { watch } for pid=3078 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538201 scontext=system_u:system_r:svirt_lxc_net_t:s0:c979,c992 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c979,c992 tclass=dir permissive=0 Feb 9 19:34:50.085000 audit[3078]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=5637539e0d30 a2=2c8 a3=7ffce3e53bfc items=0 ppid=3055 pid=3078 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c979,c992 key=(null) Feb 9 19:34:50.085000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:34:50.089000 audit[3079]: AVC avc: denied { read } for pid=3079 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22470 scontext=system_u:system_r:svirt_lxc_net_t:s0:c979,c992 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 19:34:50.089000 audit[3079]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f546336d320 a1=80000 a2=d a3=7fff568c1590 items=0 ppid=3055 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c979,c992 key=(null) Feb 9 19:34:50.089000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:34:50.089000 audit[3079]: AVC avc: denied { search } for pid=3079 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22446 scontext=system_u:system_r:svirt_lxc_net_t:s0:c979,c992 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:34:50.089000 audit[3079]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f54628c10c0 a2=0 a3=0 items=0 ppid=3055 pid=3079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c979,c992 key=(null) Feb 9 19:34:50.089000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:34:50.266133 kubelet[1378]: E0209 19:34:50.265870 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:50.848305 kubelet[1378]: I0209 19:34:50.848251 1378 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.0667814939999998 podCreationTimestamp="2024-02-09 19:34:41 +0000 UTC" firstStartedPulling="2024-02-09 19:34:42.050041187 +0000 UTC m=+71.428049886" lastFinishedPulling="2024-02-09 19:34:49.831426146 +0000 UTC m=+79.209434835" observedRunningTime="2024-02-09 19:34:50.8459132 +0000 UTC m=+80.223921989" watchObservedRunningTime="2024-02-09 19:34:50.848166443 +0000 UTC m=+80.226175173" Feb 9 19:34:50.890000 audit[3084]: NETFILTER_CFG table=filter:85 family=2 entries=22 op=nft_register_rule pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:50.890000 audit[3084]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fff4174e130 a2=0 a3=7fff4174e11c items=0 ppid=1543 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:50.890000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:50.898000 audit[3084]: NETFILTER_CFG table=nat:86 family=2 entries=104 op=nft_register_chain pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:50.898000 audit[3084]: SYSCALL arch=c000003e syscall=46 success=yes exit=47436 a0=3 a1=7fff4174e130 a2=0 a3=7fff4174e11c items=0 ppid=1543 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:50.898000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:51.189430 kubelet[1378]: E0209 19:34:51.189239 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:51.266701 kubelet[1378]: E0209 19:34:51.266581 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:52.267257 kubelet[1378]: E0209 19:34:52.267119 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:53.267583 kubelet[1378]: E0209 19:34:53.267479 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:54.142082 systemd[1]: run-containerd-runc-k8s.io-811d2550a6fb735314195e83c2eff69fef5dcff3e345cdeb169713fc1f26847d-runc.qpyYoZ.mount: Deactivated successfully. Feb 9 19:34:54.241000 audit[3110]: NETFILTER_CFG table=filter:87 family=2 entries=9 op=nft_register_rule pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:54.241000 audit[3110]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd423ef090 a2=0 a3=7ffd423ef07c items=0 ppid=1543 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:54.241000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:54.245000 audit[3110]: NETFILTER_CFG table=nat:88 family=2 entries=51 op=nft_register_chain pid=3110 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:54.245000 audit[3110]: SYSCALL arch=c000003e syscall=46 success=yes exit=17716 a0=3 a1=7ffd423ef090 a2=0 a3=7ffd423ef07c items=0 ppid=1543 pid=3110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:54.245000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:54.268657 kubelet[1378]: E0209 19:34:54.268560 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:55.219000 audit[3113]: NETFILTER_CFG table=filter:89 family=2 entries=8 op=nft_register_rule pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:55.227080 kernel: kauditd_printk_skb: 74 callbacks suppressed Feb 9 19:34:55.227197 kernel: audit: type=1325 audit(1707507295.219:853): table=filter:89 family=2 entries=8 op=nft_register_rule pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:55.219000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe8c679480 a2=0 a3=7ffe8c67946c items=0 ppid=1543 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:55.250967 kernel: audit: type=1300 audit(1707507295.219:853): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe8c679480 a2=0 a3=7ffe8c67946c items=0 ppid=1543 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:55.219000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:55.261681 kernel: audit: type=1327 audit(1707507295.219:853): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:55.266000 audit[3113]: NETFILTER_CFG table=nat:90 family=2 entries=58 op=nft_register_chain pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:55.274910 kernel: audit: type=1325 audit(1707507295.266:854): table=nat:90 family=2 entries=58 op=nft_register_chain pid=3113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:34:55.275113 kubelet[1378]: E0209 19:34:55.275044 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:55.266000 audit[3113]: SYSCALL arch=c000003e syscall=46 success=yes exit=19604 a0=3 a1=7ffe8c679480 a2=0 a3=7ffe8c67946c items=0 ppid=1543 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:55.286671 kernel: audit: type=1300 audit(1707507295.266:854): arch=c000003e syscall=46 success=yes exit=19604 a0=3 a1=7ffe8c679480 a2=0 a3=7ffe8c67946c items=0 ppid=1543 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:34:55.266000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:55.291750 kernel: audit: type=1327 audit(1707507295.266:854): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:34:56.275590 kubelet[1378]: E0209 19:34:56.275404 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:57.276824 kubelet[1378]: E0209 19:34:57.276745 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:58.278462 kubelet[1378]: E0209 19:34:58.278239 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:34:59.279658 kubelet[1378]: E0209 19:34:59.279544 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:00.281959 kubelet[1378]: E0209 19:35:00.281752 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:01.282152 kubelet[1378]: E0209 19:35:01.282045 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:02.282758 kubelet[1378]: E0209 19:35:02.282674 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:03.283657 kubelet[1378]: E0209 19:35:03.283508 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:04.284013 kubelet[1378]: E0209 19:35:04.283895 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:05.284439 kubelet[1378]: E0209 19:35:05.284354 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:06.286304 kubelet[1378]: E0209 19:35:06.286243 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:07.287451 kubelet[1378]: E0209 19:35:07.287362 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:08.288780 kubelet[1378]: E0209 19:35:08.288715 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:09.289731 kubelet[1378]: E0209 19:35:09.289666 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:10.291598 kubelet[1378]: E0209 19:35:10.291482 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:11.188961 kubelet[1378]: E0209 19:35:11.188902 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:11.293399 kubelet[1378]: E0209 19:35:11.293344 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:12.295090 kubelet[1378]: E0209 19:35:12.295014 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:13.295797 kubelet[1378]: E0209 19:35:13.295679 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:14.296041 kubelet[1378]: E0209 19:35:14.295930 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:15.296540 kubelet[1378]: E0209 19:35:15.296400 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:15.503452 kubelet[1378]: I0209 19:35:15.503311 1378 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:35:15.516232 systemd[1]: Created slice kubepods-besteffort-podd07f8f06_73c8_409b_971e_3238c736d16c.slice. Feb 9 19:35:15.544918 kubelet[1378]: I0209 19:35:15.544861 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-5cfe3c52-e6ff-4581-bd8e-c4c0f6e39791\" (UniqueName: \"kubernetes.io/nfs/d07f8f06-73c8-409b-971e-3238c736d16c-pvc-5cfe3c52-e6ff-4581-bd8e-c4c0f6e39791\") pod \"test-pod-1\" (UID: \"d07f8f06-73c8-409b-971e-3238c736d16c\") " pod="default/test-pod-1" Feb 9 19:35:15.545215 kubelet[1378]: I0209 19:35:15.545176 1378 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6jjjs\" (UniqueName: \"kubernetes.io/projected/d07f8f06-73c8-409b-971e-3238c736d16c-kube-api-access-6jjjs\") pod \"test-pod-1\" (UID: \"d07f8f06-73c8-409b-971e-3238c736d16c\") " pod="default/test-pod-1" Feb 9 19:35:15.728131 kernel: Failed to create system directory netfs Feb 9 19:35:15.728389 kernel: audit: type=1400 audit(1707507315.709:855): avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.728454 kernel: Failed to create system directory netfs Feb 9 19:35:15.709000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.739261 kernel: audit: type=1400 audit(1707507315.709:855): avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.739369 kernel: Failed to create system directory netfs Feb 9 19:35:15.709000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.750503 kernel: audit: type=1400 audit(1707507315.709:855): avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.750653 kernel: Failed to create system directory netfs Feb 9 19:35:15.709000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.761830 kernel: audit: type=1400 audit(1707507315.709:855): avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.709000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.709000 audit[3136]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56267852f5e0 a1=153bc a2=56267757a2b0 a3=5 items=0 ppid=204 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:15.709000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:35:15.776570 kernel: audit: type=1300 audit(1707507315.709:855): arch=c000003e syscall=175 success=yes exit=0 a0=56267852f5e0 a1=153bc a2=56267757a2b0 a3=5 items=0 ppid=204 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:15.776790 kernel: audit: type=1327 audit(1707507315.709:855): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.790809 kernel: Failed to create system directory fscache Feb 9 19:35:15.790970 kernel: audit: type=1400 audit(1707507315.780:856): avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.791047 kernel: Failed to create system directory fscache Feb 9 19:35:15.800993 kernel: audit: type=1400 audit(1707507315.780:856): avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.801132 kernel: Failed to create system directory fscache Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.810715 kernel: audit: type=1400 audit(1707507315.780:856): avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.810827 kernel: Failed to create system directory fscache Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.820704 kernel: audit: type=1400 audit(1707507315.780:856): avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.820845 kernel: Failed to create system directory fscache Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.821642 kernel: Failed to create system directory fscache Feb 9 19:35:15.822649 kernel: Failed to create system directory fscache Feb 9 19:35:15.823773 kernel: Failed to create system directory fscache Feb 9 19:35:15.825589 kernel: Failed to create system directory fscache Feb 9 19:35:15.825711 kernel: Failed to create system directory fscache Feb 9 19:35:15.826555 kernel: Failed to create system directory fscache Feb 9 19:35:15.827562 kernel: Failed to create system directory fscache Feb 9 19:35:15.828571 kernel: Failed to create system directory fscache Feb 9 19:35:15.829512 kernel: Failed to create system directory fscache Feb 9 19:35:15.834911 kernel: FS-Cache: Loaded Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.780000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.780000 audit[3136]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5626787449c0 a1=4c0fc a2=56267757a2b0 a3=5 items=0 ppid=204 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:15.780000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.877700 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.877841 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.877866 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.879733 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.879799 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.881628 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.881682 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.883543 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.883592 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.885441 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.885498 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.887337 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.887394 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.889272 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.889305 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.890186 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.892100 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.892159 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.893986 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.894032 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.894952 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.896779 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.896819 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.897692 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.898682 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.901491 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.901540 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.901569 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.903353 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.903413 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.904361 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.905302 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.909074 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.909159 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.910439 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.911489 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.911562 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.913362 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.913403 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.914274 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.916123 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.916170 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.918188 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.918230 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.920197 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.920247 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.922112 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.922173 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.924227 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.924262 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.926059 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.926105 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.926996 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.928892 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.928925 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.929885 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.930804 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.931752 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.932676 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.934502 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.934534 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.935437 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.937315 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.937358 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.938237 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.940248 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.940297 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.942180 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.942249 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.943131 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.944944 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.945004 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.946802 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.946845 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.948667 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.948706 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.950569 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.950647 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.952557 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.952613 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.954385 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.954423 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.955329 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.956321 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.957282 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.958201 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.959135 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.961096 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.961143 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.962022 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.962954 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.963884 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.964809 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.965731 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.966648 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.968482 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.968524 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.969404 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.971364 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.971412 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.972281 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.973200 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.975138 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.975213 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.976049 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.977882 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.977938 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.978834 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.985685 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.985898 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.985972 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.986020 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.986095 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.986149 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.986225 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.987797 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.987875 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.989791 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.989853 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.992862 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.992974 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.993031 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.995558 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.995677 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.995722 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:15.997003 kernel: Failed to create system directory sunrpc Feb 9 19:35:15.858000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.011154 kernel: RPC: Registered named UNIX socket transport module. Feb 9 19:35:16.011351 kernel: RPC: Registered udp transport module. Feb 9 19:35:16.011416 kernel: RPC: Registered tcp transport module. Feb 9 19:35:16.012089 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 19:35:15.858000 audit[3136]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562678790ad0 a1=1588c4 a2=56267757a2b0 a3=5 items=6 ppid=204 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:15.858000 audit: CWD cwd="/" Feb 9 19:35:15.858000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:35:15.858000 audit: PATH item=1 name=(null) inode=24783 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:35:15.858000 audit: PATH item=2 name=(null) inode=24783 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:35:15.858000 audit: PATH item=3 name=(null) inode=24784 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:35:15.858000 audit: PATH item=4 name=(null) inode=24783 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:35:15.858000 audit: PATH item=5 name=(null) inode=24785 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:35:15.858000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.056167 kernel: Failed to create system directory nfs Feb 9 19:35:16.056281 kernel: Failed to create system directory nfs Feb 9 19:35:16.056333 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.057041 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.057909 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.058791 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.060599 kernel: Failed to create system directory nfs Feb 9 19:35:16.060869 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.063778 kernel: Failed to create system directory nfs Feb 9 19:35:16.063879 kernel: Failed to create system directory nfs Feb 9 19:35:16.063951 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.064712 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.065539 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.066425 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.067296 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.068199 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.069079 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.069977 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.074510 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.075432 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.076399 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.077287 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.078178 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.079084 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.079940 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.081733 kernel: Failed to create system directory nfs Feb 9 19:35:16.081903 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.082553 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.083507 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.084449 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.085394 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.086573 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.087398 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.088336 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.089206 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.090080 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.091014 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.091908 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.092732 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.093824 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.095678 kernel: Failed to create system directory nfs Feb 9 19:35:16.095825 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.096540 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.097382 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.098194 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.099275 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.100206 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.101091 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.102083 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.103001 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.103930 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.104869 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.105794 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.107506 kernel: Failed to create system directory nfs Feb 9 19:35:16.107682 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.108363 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.109225 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.110104 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.110995 kernel: Failed to create system directory nfs Feb 9 19:35:16.043000 audit[3136]: AVC avc: denied { confidentiality } for pid=3136 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.043000 audit[3136]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562678933680 a1=e29dc a2=56267757a2b0 a3=5 items=0 ppid=204 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:16.130005 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 19:35:16.043000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.180414 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.180574 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.180668 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.181264 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.182152 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.183130 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.184014 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.184919 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.185809 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.186920 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.188698 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.188835 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.189589 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.190570 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.191508 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.192455 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.193428 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.194326 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.195199 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.196267 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.197211 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.198139 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.199107 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.200048 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.201001 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.201959 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.202966 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.204837 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.204950 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.206659 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.206749 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.207587 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.208542 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.209418 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.210296 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.211201 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.212145 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.213038 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.213931 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.214803 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.216721 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.216855 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.217638 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.218544 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.219471 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.220409 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.221288 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.222205 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.223122 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.224062 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.224973 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.225845 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.227716 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.227851 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.228595 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.229501 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.230439 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.231338 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.232291 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.233272 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.234168 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.235129 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.236066 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.244109 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.244264 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.244645 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.244718 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.244758 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.244803 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.244841 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.244882 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.248433 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.248515 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.248590 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.248677 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.250224 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.250348 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.251173 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.252977 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.253113 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.255103 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.255245 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.255836 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.256866 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.257815 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.258825 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.259739 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.260814 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.262644 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.262730 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.264484 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.264667 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.266435 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.266586 kernel: Failed to create system directory nfs4 Feb 9 19:35:16.159000 audit[3141]: AVC avc: denied { confidentiality } for pid=3141 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.296805 kubelet[1378]: E0209 19:35:16.296686 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:16.444505 kernel: NFS: Registering the id_resolver key type Feb 9 19:35:16.444751 kernel: Key type id_resolver registered Feb 9 19:35:16.444842 kernel: Key type id_legacy registered Feb 9 19:35:16.159000 audit[3141]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f57463d9010 a1=1d3cc4 a2=56072b2ec2b0 a3=5 items=0 ppid=204 pid=3141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:16.159000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.465524 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.465702 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.465756 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.465802 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.466646 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.468485 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.468599 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.469480 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.471389 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.471628 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.473499 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.473581 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.475330 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.475441 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.477323 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.477425 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.479254 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.479370 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.481306 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.481440 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.483517 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.483687 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.485532 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.485688 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.457000 audit[3143]: AVC avc: denied { confidentiality } for pid=3143 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:35:16.492396 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.493802 kernel: Failed to create system directory rpcgss Feb 9 19:35:16.457000 audit[3143]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fb1c81c9010 a1=4f524 a2=55e6f1d0a2b0 a3=5 items=0 ppid=204 pid=3143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:16.457000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 19:35:16.573253 nfsidmap[3165]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Feb 9 19:35:16.581792 nfsidmap[3171]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Feb 9 19:35:16.589000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:35:16.589000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:35:16.589000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:35:16.591000 audit[1125]: AVC avc: denied { watch_reads } for pid=1125 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:35:16.591000 audit[1125]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55e3717ff930 a2=10 a3=290aa4bfe357e16c items=0 ppid=1 pid=1125 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:16.591000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:35:16.591000 audit[1125]: AVC avc: denied { watch_reads } for pid=1125 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:35:16.591000 audit[1125]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55e3717ff930 a2=10 a3=290aa4bfe357e16c items=0 ppid=1 pid=1125 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:16.591000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:35:16.591000 audit[1125]: AVC avc: denied { watch_reads } for pid=1125 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2541 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:35:16.591000 audit[1125]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=55e3717ff930 a2=10 a3=290aa4bfe357e16c items=0 ppid=1 pid=1125 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:16.591000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:35:16.723678 env[1060]: time="2024-02-09T19:35:16.723508336Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d07f8f06-73c8-409b-971e-3238c736d16c,Namespace:default,Attempt:0,}" Feb 9 19:35:16.962814 systemd-networkd[971]: cali5ec59c6bf6e: Link UP Feb 9 19:35:16.968594 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:35:16.968755 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 19:35:16.969109 systemd-networkd[971]: cali5ec59c6bf6e: Gained carrier Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.835 [INFO][3172] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.156-k8s-test--pod--1-eth0 default d07f8f06-73c8-409b-971e-3238c736d16c 1374 0 2024-02-09 19:34:44 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.156 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.156-k8s-test--pod--1-" Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.835 [INFO][3172] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.156-k8s-test--pod--1-eth0" Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.876 [INFO][3184] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" HandleID="k8s-pod-network.6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" Workload="172.24.4.156-k8s-test--pod--1-eth0" Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.899 [INFO][3184] ipam_plugin.go 268: Auto assigning IP ContainerID="6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" HandleID="k8s-pod-network.6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" Workload="172.24.4.156-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cbd0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.156", "pod":"test-pod-1", "timestamp":"2024-02-09 19:35:16.876462465 +0000 UTC"}, Hostname:"172.24.4.156", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.899 [INFO][3184] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.899 [INFO][3184] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.899 [INFO][3184] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.156' Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.903 [INFO][3184] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" host="172.24.4.156" Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.910 [INFO][3184] ipam.go 372: Looking up existing affinities for host host="172.24.4.156" Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.918 [INFO][3184] ipam.go 489: Trying affinity for 192.168.29.128/26 host="172.24.4.156" Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.923 [INFO][3184] ipam.go 155: Attempting to load block cidr=192.168.29.128/26 host="172.24.4.156" Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.927 [INFO][3184] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.29.128/26 host="172.24.4.156" Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.928 [INFO][3184] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.29.128/26 handle="k8s-pod-network.6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" host="172.24.4.156" Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.931 [INFO][3184] ipam.go 1682: Creating new handle: k8s-pod-network.6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.941 [INFO][3184] ipam.go 1203: Writing block in order to claim IPs block=192.168.29.128/26 handle="k8s-pod-network.6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" host="172.24.4.156" Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.955 [INFO][3184] ipam.go 1216: Successfully claimed IPs: [192.168.29.133/26] block=192.168.29.128/26 handle="k8s-pod-network.6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" host="172.24.4.156" Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.955 [INFO][3184] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.29.133/26] handle="k8s-pod-network.6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" host="172.24.4.156" Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.955 [INFO][3184] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.955 [INFO][3184] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.29.133/26] IPv6=[] ContainerID="6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" HandleID="k8s-pod-network.6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" Workload="172.24.4.156-k8s-test--pod--1-eth0" Feb 9 19:35:16.991943 env[1060]: 2024-02-09 19:35:16.957 [INFO][3172] k8s.go 385: Populated endpoint ContainerID="6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.156-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d07f8f06-73c8-409b-971e-3238c736d16c", ResourceVersion:"1374", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:35:16.993198 env[1060]: 2024-02-09 19:35:16.957 [INFO][3172] k8s.go 386: Calico CNI using IPs: [192.168.29.133/32] ContainerID="6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.156-k8s-test--pod--1-eth0" Feb 9 19:35:16.993198 env[1060]: 2024-02-09 19:35:16.958 [INFO][3172] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.156-k8s-test--pod--1-eth0" Feb 9 19:35:16.993198 env[1060]: 2024-02-09 19:35:16.970 [INFO][3172] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.156-k8s-test--pod--1-eth0" Feb 9 19:35:16.993198 env[1060]: 2024-02-09 19:35:16.971 [INFO][3172] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.156-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.156-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"d07f8f06-73c8-409b-971e-3238c736d16c", ResourceVersion:"1374", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 34, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.156", ContainerID:"6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.29.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"22:62:cd:3f:2e:ea", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:35:16.993198 env[1060]: 2024-02-09 19:35:16.986 [INFO][3172] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.156-k8s-test--pod--1-eth0" Feb 9 19:35:17.008000 audit[3203]: NETFILTER_CFG table=filter:91 family=2 entries=42 op=nft_register_chain pid=3203 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:35:17.008000 audit[3203]: SYSCALL arch=c000003e syscall=46 success=yes exit=20268 a0=3 a1=7ffd569d2370 a2=0 a3=7ffd569d235c items=0 ppid=2118 pid=3203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:17.008000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:35:17.042828 env[1060]: time="2024-02-09T19:35:17.042703864Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:35:17.043241 env[1060]: time="2024-02-09T19:35:17.042819312Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:35:17.043241 env[1060]: time="2024-02-09T19:35:17.042839830Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:35:17.043381 env[1060]: time="2024-02-09T19:35:17.043303253Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b pid=3212 runtime=io.containerd.runc.v2 Feb 9 19:35:17.073751 systemd[1]: Started cri-containerd-6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b.scope. Feb 9 19:35:17.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.102000 audit: BPF prog-id=119 op=LOAD Feb 9 19:35:17.103000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.103000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3212 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:17.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323565373064326366326338356361633931313232313239363436 Feb 9 19:35:17.103000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.103000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3212 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:17.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323565373064326366326338356361633931313232313239363436 Feb 9 19:35:17.103000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.103000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.103000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.103000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.103000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.103000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.103000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.103000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.103000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.103000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.103000 audit: BPF prog-id=120 op=LOAD Feb 9 19:35:17.103000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a06b0 items=0 ppid=3212 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:17.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323565373064326366326338356361633931313232313239363436 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit: BPF prog-id=121 op=LOAD Feb 9 19:35:17.104000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a06f8 items=0 ppid=3212 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:17.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323565373064326366326338356361633931313232313239363436 Feb 9 19:35:17.104000 audit: BPF prog-id=121 op=UNLOAD Feb 9 19:35:17.104000 audit: BPF prog-id=120 op=UNLOAD Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { perfmon } for pid=3220 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit[3220]: AVC avc: denied { bpf } for pid=3220 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.104000 audit: BPF prog-id=122 op=LOAD Feb 9 19:35:17.104000 audit[3220]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a0b08 items=0 ppid=3212 pid=3220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:17.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639323565373064326366326338356361633931313232313239363436 Feb 9 19:35:17.138208 env[1060]: time="2024-02-09T19:35:17.138148048Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:d07f8f06-73c8-409b-971e-3238c736d16c,Namespace:default,Attempt:0,} returns sandbox id \"6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b\"" Feb 9 19:35:17.140778 env[1060]: time="2024-02-09T19:35:17.140736704Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:35:17.297516 kubelet[1378]: E0209 19:35:17.297212 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:17.593910 env[1060]: time="2024-02-09T19:35:17.593679206Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:35:17.599786 env[1060]: time="2024-02-09T19:35:17.599711207Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:35:17.604864 env[1060]: time="2024-02-09T19:35:17.604779563Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:35:17.609754 env[1060]: time="2024-02-09T19:35:17.609674322Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:35:17.611650 env[1060]: time="2024-02-09T19:35:17.611525328Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:35:17.619076 env[1060]: time="2024-02-09T19:35:17.618999134Z" level=info msg="CreateContainer within sandbox \"6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 19:35:17.676155 env[1060]: time="2024-02-09T19:35:17.676062520Z" level=info msg="CreateContainer within sandbox \"6925e70d2cf2c85cac911221296461026ad71d20c59db5c20bb8a0309ce3018b\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"267de4b33e40dfd62daefcd80e9f358b574ff967f1a218ec1f3c411577f0356e\"" Feb 9 19:35:17.677917 env[1060]: time="2024-02-09T19:35:17.677716905Z" level=info msg="StartContainer for \"267de4b33e40dfd62daefcd80e9f358b574ff967f1a218ec1f3c411577f0356e\"" Feb 9 19:35:17.718223 systemd[1]: Started cri-containerd-267de4b33e40dfd62daefcd80e9f358b574ff967f1a218ec1f3c411577f0356e.scope. Feb 9 19:35:17.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.763000 audit: BPF prog-id=123 op=LOAD Feb 9 19:35:17.764000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.764000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3212 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:17.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236376465346233336534306466643632646165666364383065396633 Feb 9 19:35:17.765000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.765000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3212 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:17.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236376465346233336534306466643632646165666364383065396633 Feb 9 19:35:17.766000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.766000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.766000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.766000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.766000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.766000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.766000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.766000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.766000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.766000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.766000 audit: BPF prog-id=124 op=LOAD Feb 9 19:35:17.766000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a7430 items=0 ppid=3212 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:17.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236376465346233336534306466643632646165666364383065396633 Feb 9 19:35:17.770000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.770000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.770000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.770000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.770000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.770000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.770000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.770000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.770000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.770000 audit: BPF prog-id=125 op=LOAD Feb 9 19:35:17.770000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a7478 items=0 ppid=3212 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:17.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236376465346233336534306466643632646165666364383065396633 Feb 9 19:35:17.771000 audit: BPF prog-id=125 op=UNLOAD Feb 9 19:35:17.772000 audit: BPF prog-id=124 op=UNLOAD Feb 9 19:35:17.772000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.772000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.772000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.772000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.772000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.772000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.772000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.772000 audit[3252]: AVC avc: denied { perfmon } for pid=3252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.772000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.772000 audit[3252]: AVC avc: denied { bpf } for pid=3252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:35:17.772000 audit: BPF prog-id=126 op=LOAD Feb 9 19:35:17.772000 audit[3252]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a7888 items=0 ppid=3212 pid=3252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:35:17.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236376465346233336534306466643632646165666364383065396633 Feb 9 19:35:17.806696 env[1060]: time="2024-02-09T19:35:17.806537573Z" level=info msg="StartContainer for \"267de4b33e40dfd62daefcd80e9f358b574ff967f1a218ec1f3c411577f0356e\" returns successfully" Feb 9 19:35:18.298511 kubelet[1378]: E0209 19:35:18.298421 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:18.563333 systemd-networkd[971]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 19:35:19.299279 kubelet[1378]: E0209 19:35:19.299071 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:20.299909 kubelet[1378]: E0209 19:35:20.299849 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:21.301189 kubelet[1378]: E0209 19:35:21.301107 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:22.302849 kubelet[1378]: E0209 19:35:22.302748 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:23.304733 kubelet[1378]: E0209 19:35:23.304678 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:24.128848 systemd[1]: run-containerd-runc-k8s.io-811d2550a6fb735314195e83c2eff69fef5dcff3e345cdeb169713fc1f26847d-runc.jIxfHb.mount: Deactivated successfully. Feb 9 19:35:24.305728 kubelet[1378]: E0209 19:35:24.305549 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:25.306457 kubelet[1378]: E0209 19:35:25.306397 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:26.308574 kubelet[1378]: E0209 19:35:26.308494 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:27.310004 kubelet[1378]: E0209 19:35:27.309903 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:28.310989 kubelet[1378]: E0209 19:35:28.310918 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:29.313150 kubelet[1378]: E0209 19:35:29.313064 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:30.314530 kubelet[1378]: E0209 19:35:30.314463 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:31.188876 kubelet[1378]: E0209 19:35:31.188810 1378 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:35:31.316874 kubelet[1378]: E0209 19:35:31.316753 1378 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"