Feb 12 20:25:01.047942 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 20:25:01.047980 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:25:01.048002 kernel: BIOS-provided physical RAM map: Feb 12 20:25:01.048015 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 20:25:01.048028 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 20:25:01.048040 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 20:25:01.048055 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Feb 12 20:25:01.048068 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Feb 12 20:25:01.048084 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 12 20:25:01.048096 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 20:25:01.048108 kernel: NX (Execute Disable) protection: active Feb 12 20:25:01.048121 kernel: SMBIOS 2.8 present. Feb 12 20:25:01.048134 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Feb 12 20:25:01.048146 kernel: Hypervisor detected: KVM Feb 12 20:25:01.048161 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 20:25:01.048179 kernel: kvm-clock: cpu 0, msr 54faa001, primary cpu clock Feb 12 20:25:01.048192 kernel: kvm-clock: using sched offset of 5615901189 cycles Feb 12 20:25:01.048207 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 20:25:01.048221 kernel: tsc: Detected 1996.249 MHz processor Feb 12 20:25:01.048235 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 20:25:01.048249 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 20:25:01.048263 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Feb 12 20:25:01.048277 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 20:25:01.048295 kernel: ACPI: Early table checksum verification disabled Feb 12 20:25:01.048308 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Feb 12 20:25:01.048322 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:25:01.048336 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:25:01.048350 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:25:01.048364 kernel: ACPI: FACS 0x000000007FFE0000 000040 Feb 12 20:25:01.048377 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:25:01.048392 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 20:25:01.048405 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Feb 12 20:25:01.048422 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Feb 12 20:25:01.048435 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Feb 12 20:25:01.048449 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Feb 12 20:25:01.048462 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Feb 12 20:25:01.048475 kernel: No NUMA configuration found Feb 12 20:25:01.048489 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Feb 12 20:25:01.048550 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Feb 12 20:25:01.048565 kernel: Zone ranges: Feb 12 20:25:01.048587 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 20:25:01.048602 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Feb 12 20:25:01.048616 kernel: Normal empty Feb 12 20:25:01.048630 kernel: Movable zone start for each node Feb 12 20:25:01.048644 kernel: Early memory node ranges Feb 12 20:25:01.048659 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 20:25:01.048675 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Feb 12 20:25:01.048690 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Feb 12 20:25:01.048704 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 20:25:01.048719 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 20:25:01.048733 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Feb 12 20:25:01.048747 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 12 20:25:01.048761 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 20:25:01.048776 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 20:25:01.048790 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 12 20:25:01.048807 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 20:25:01.048821 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 20:25:01.048836 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 20:25:01.048850 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 20:25:01.048865 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 20:25:01.048879 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 20:25:01.048893 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Feb 12 20:25:01.048908 kernel: Booting paravirtualized kernel on KVM Feb 12 20:25:01.048922 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 20:25:01.048937 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 20:25:01.048955 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 20:25:01.048970 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 20:25:01.048984 kernel: pcpu-alloc: [0] 0 1 Feb 12 20:25:01.048998 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Feb 12 20:25:01.049013 kernel: kvm-guest: PV spinlocks disabled, no host support Feb 12 20:25:01.049027 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Feb 12 20:25:01.049042 kernel: Policy zone: DMA32 Feb 12 20:25:01.049058 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:25:01.049078 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 20:25:01.049093 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 20:25:01.049107 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 20:25:01.049122 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 20:25:01.049137 kernel: Memory: 1975340K/2096620K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121020K reserved, 0K cma-reserved) Feb 12 20:25:01.049151 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 20:25:01.049166 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 20:25:01.049180 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 20:25:01.049199 kernel: rcu: Hierarchical RCU implementation. Feb 12 20:25:01.049215 kernel: rcu: RCU event tracing is enabled. Feb 12 20:25:01.049230 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 20:25:01.049245 kernel: Rude variant of Tasks RCU enabled. Feb 12 20:25:01.049259 kernel: Tracing variant of Tasks RCU enabled. Feb 12 20:25:01.049274 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 20:25:01.049288 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 20:25:01.049302 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 20:25:01.049316 kernel: Console: colour VGA+ 80x25 Feb 12 20:25:01.049333 kernel: printk: console [tty0] enabled Feb 12 20:25:01.049347 kernel: printk: console [ttyS0] enabled Feb 12 20:25:01.049362 kernel: ACPI: Core revision 20210730 Feb 12 20:25:01.049376 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 20:25:01.049390 kernel: x2apic enabled Feb 12 20:25:01.049404 kernel: Switched APIC routing to physical x2apic. Feb 12 20:25:01.049419 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 20:25:01.049433 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Feb 12 20:25:01.049448 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Feb 12 20:25:01.049462 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Feb 12 20:25:01.049480 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Feb 12 20:25:01.051556 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 20:25:01.051573 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 20:25:01.051583 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 20:25:01.051593 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 20:25:01.051603 kernel: Speculative Store Bypass: Vulnerable Feb 12 20:25:01.051613 kernel: x86/fpu: x87 FPU will use FXSAVE Feb 12 20:25:01.051622 kernel: Freeing SMP alternatives memory: 32K Feb 12 20:25:01.051629 kernel: pid_max: default: 32768 minimum: 301 Feb 12 20:25:01.051640 kernel: LSM: Security Framework initializing Feb 12 20:25:01.051648 kernel: SELinux: Initializing. Feb 12 20:25:01.051656 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 20:25:01.051663 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 20:25:01.051672 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Feb 12 20:25:01.051679 kernel: Performance Events: AMD PMU driver. Feb 12 20:25:01.051687 kernel: ... version: 0 Feb 12 20:25:01.051694 kernel: ... bit width: 48 Feb 12 20:25:01.051702 kernel: ... generic registers: 4 Feb 12 20:25:01.051717 kernel: ... value mask: 0000ffffffffffff Feb 12 20:25:01.051725 kernel: ... max period: 00007fffffffffff Feb 12 20:25:01.051735 kernel: ... fixed-purpose events: 0 Feb 12 20:25:01.051742 kernel: ... event mask: 000000000000000f Feb 12 20:25:01.051750 kernel: signal: max sigframe size: 1440 Feb 12 20:25:01.051758 kernel: rcu: Hierarchical SRCU implementation. Feb 12 20:25:01.051766 kernel: smp: Bringing up secondary CPUs ... Feb 12 20:25:01.051775 kernel: x86: Booting SMP configuration: Feb 12 20:25:01.051784 kernel: .... node #0, CPUs: #1 Feb 12 20:25:01.051792 kernel: kvm-clock: cpu 1, msr 54faa041, secondary cpu clock Feb 12 20:25:01.051800 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Feb 12 20:25:01.051810 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 20:25:01.051818 kernel: smpboot: Max logical packages: 2 Feb 12 20:25:01.051827 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Feb 12 20:25:01.051835 kernel: devtmpfs: initialized Feb 12 20:25:01.051844 kernel: x86/mm: Memory block size: 128MB Feb 12 20:25:01.051853 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 20:25:01.051863 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 20:25:01.051871 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 20:25:01.051880 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 20:25:01.051888 kernel: audit: initializing netlink subsys (disabled) Feb 12 20:25:01.051897 kernel: audit: type=2000 audit(1707769500.333:1): state=initialized audit_enabled=0 res=1 Feb 12 20:25:01.051905 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 20:25:01.051914 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 20:25:01.051922 kernel: cpuidle: using governor menu Feb 12 20:25:01.051931 kernel: ACPI: bus type PCI registered Feb 12 20:25:01.051941 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 20:25:01.051949 kernel: dca service started, version 1.12.1 Feb 12 20:25:01.051958 kernel: PCI: Using configuration type 1 for base access Feb 12 20:25:01.051966 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 20:25:01.051975 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 20:25:01.051983 kernel: ACPI: Added _OSI(Module Device) Feb 12 20:25:01.051992 kernel: ACPI: Added _OSI(Processor Device) Feb 12 20:25:01.052000 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 20:25:01.052009 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 20:25:01.052019 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 20:25:01.052028 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 20:25:01.052036 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 20:25:01.052045 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 20:25:01.052053 kernel: ACPI: Interpreter enabled Feb 12 20:25:01.052062 kernel: ACPI: PM: (supports S0 S3 S5) Feb 12 20:25:01.052070 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 20:25:01.052079 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 20:25:01.052088 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 12 20:25:01.052098 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 20:25:01.052271 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 20:25:01.052365 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 20:25:01.052379 kernel: acpiphp: Slot [3] registered Feb 12 20:25:01.052387 kernel: acpiphp: Slot [4] registered Feb 12 20:25:01.052396 kernel: acpiphp: Slot [5] registered Feb 12 20:25:01.052404 kernel: acpiphp: Slot [6] registered Feb 12 20:25:01.052416 kernel: acpiphp: Slot [7] registered Feb 12 20:25:01.052425 kernel: acpiphp: Slot [8] registered Feb 12 20:25:01.052433 kernel: acpiphp: Slot [9] registered Feb 12 20:25:01.052442 kernel: acpiphp: Slot [10] registered Feb 12 20:25:01.052450 kernel: acpiphp: Slot [11] registered Feb 12 20:25:01.052458 kernel: acpiphp: Slot [12] registered Feb 12 20:25:01.052467 kernel: acpiphp: Slot [13] registered Feb 12 20:25:01.052475 kernel: acpiphp: Slot [14] registered Feb 12 20:25:01.052484 kernel: acpiphp: Slot [15] registered Feb 12 20:25:01.052509 kernel: acpiphp: Slot [16] registered Feb 12 20:25:01.052521 kernel: acpiphp: Slot [17] registered Feb 12 20:25:01.052529 kernel: acpiphp: Slot [18] registered Feb 12 20:25:01.052538 kernel: acpiphp: Slot [19] registered Feb 12 20:25:01.052546 kernel: acpiphp: Slot [20] registered Feb 12 20:25:01.052555 kernel: acpiphp: Slot [21] registered Feb 12 20:25:01.052563 kernel: acpiphp: Slot [22] registered Feb 12 20:25:01.052572 kernel: acpiphp: Slot [23] registered Feb 12 20:25:01.052580 kernel: acpiphp: Slot [24] registered Feb 12 20:25:01.052588 kernel: acpiphp: Slot [25] registered Feb 12 20:25:01.052599 kernel: acpiphp: Slot [26] registered Feb 12 20:25:01.052607 kernel: acpiphp: Slot [27] registered Feb 12 20:25:01.052616 kernel: acpiphp: Slot [28] registered Feb 12 20:25:01.052624 kernel: acpiphp: Slot [29] registered Feb 12 20:25:01.052633 kernel: acpiphp: Slot [30] registered Feb 12 20:25:01.052641 kernel: acpiphp: Slot [31] registered Feb 12 20:25:01.052649 kernel: PCI host bridge to bus 0000:00 Feb 12 20:25:01.052763 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 20:25:01.052852 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 20:25:01.052937 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 20:25:01.053015 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 12 20:25:01.053092 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 12 20:25:01.053177 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 20:25:01.053281 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 20:25:01.053386 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 20:25:01.057530 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 12 20:25:01.057641 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Feb 12 20:25:01.057741 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 20:25:01.057855 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 20:25:01.057950 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 20:25:01.058039 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 20:25:01.058137 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 20:25:01.058231 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 12 20:25:01.058319 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 12 20:25:01.058429 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 12 20:25:01.058538 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 12 20:25:01.058633 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 12 20:25:01.058734 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Feb 12 20:25:01.058828 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Feb 12 20:25:01.058916 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 20:25:01.059043 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 12 20:25:01.059135 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Feb 12 20:25:01.059221 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Feb 12 20:25:01.059308 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 12 20:25:01.059394 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Feb 12 20:25:01.059520 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Feb 12 20:25:01.059619 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Feb 12 20:25:01.059708 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Feb 12 20:25:01.059795 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 12 20:25:01.059891 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Feb 12 20:25:01.059977 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Feb 12 20:25:01.060065 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 12 20:25:01.060177 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Feb 12 20:25:01.060267 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Feb 12 20:25:01.060355 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 12 20:25:01.060367 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 20:25:01.060376 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 20:25:01.060385 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 20:25:01.060393 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 20:25:01.060402 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 20:25:01.060414 kernel: iommu: Default domain type: Translated Feb 12 20:25:01.060423 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 20:25:01.060543 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 12 20:25:01.060634 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 20:25:01.060715 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 12 20:25:01.060727 kernel: vgaarb: loaded Feb 12 20:25:01.060735 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 20:25:01.060743 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 20:25:01.060751 kernel: PTP clock support registered Feb 12 20:25:01.060762 kernel: PCI: Using ACPI for IRQ routing Feb 12 20:25:01.060770 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 20:25:01.060778 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 20:25:01.060786 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Feb 12 20:25:01.060794 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 20:25:01.060802 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 20:25:01.060809 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 20:25:01.060818 kernel: pnp: PnP ACPI init Feb 12 20:25:01.060900 kernel: pnp 00:03: [dma 2] Feb 12 20:25:01.060916 kernel: pnp: PnP ACPI: found 5 devices Feb 12 20:25:01.060924 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 20:25:01.060932 kernel: NET: Registered PF_INET protocol family Feb 12 20:25:01.060940 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 20:25:01.060949 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 20:25:01.060957 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 20:25:01.060965 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 20:25:01.060973 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 20:25:01.060983 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 20:25:01.060991 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 20:25:01.060999 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 20:25:01.061007 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 20:25:01.061015 kernel: NET: Registered PF_XDP protocol family Feb 12 20:25:01.061089 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 20:25:01.061162 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 20:25:01.061235 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 20:25:01.061306 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 12 20:25:01.061380 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 12 20:25:01.061471 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 12 20:25:01.064602 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 20:25:01.064694 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 20:25:01.064706 kernel: PCI: CLS 0 bytes, default 64 Feb 12 20:25:01.064715 kernel: Initialise system trusted keyrings Feb 12 20:25:01.064723 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 20:25:01.064736 kernel: Key type asymmetric registered Feb 12 20:25:01.064744 kernel: Asymmetric key parser 'x509' registered Feb 12 20:25:01.064752 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 20:25:01.064760 kernel: io scheduler mq-deadline registered Feb 12 20:25:01.064768 kernel: io scheduler kyber registered Feb 12 20:25:01.064776 kernel: io scheduler bfq registered Feb 12 20:25:01.064784 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 20:25:01.064793 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 12 20:25:01.064801 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 20:25:01.064809 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 12 20:25:01.064819 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 20:25:01.064827 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 20:25:01.064836 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 20:25:01.064844 kernel: random: crng init done Feb 12 20:25:01.064852 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 20:25:01.064860 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 20:25:01.064868 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 20:25:01.064959 kernel: rtc_cmos 00:04: RTC can wake from S4 Feb 12 20:25:01.064975 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 20:25:01.065048 kernel: rtc_cmos 00:04: registered as rtc0 Feb 12 20:25:01.065121 kernel: rtc_cmos 00:04: setting system clock to 2024-02-12T20:25:00 UTC (1707769500) Feb 12 20:25:01.065193 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Feb 12 20:25:01.065205 kernel: NET: Registered PF_INET6 protocol family Feb 12 20:25:01.065213 kernel: Segment Routing with IPv6 Feb 12 20:25:01.065221 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 20:25:01.065229 kernel: NET: Registered PF_PACKET protocol family Feb 12 20:25:01.065237 kernel: Key type dns_resolver registered Feb 12 20:25:01.065248 kernel: IPI shorthand broadcast: enabled Feb 12 20:25:01.065256 kernel: sched_clock: Marking stable (699551911, 129316440)->(851483137, -22614786) Feb 12 20:25:01.065264 kernel: registered taskstats version 1 Feb 12 20:25:01.065272 kernel: Loading compiled-in X.509 certificates Feb 12 20:25:01.065281 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 20:25:01.065289 kernel: Key type .fscrypt registered Feb 12 20:25:01.065297 kernel: Key type fscrypt-provisioning registered Feb 12 20:25:01.065305 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 20:25:01.065315 kernel: ima: Allocated hash algorithm: sha1 Feb 12 20:25:01.065323 kernel: ima: No architecture policies found Feb 12 20:25:01.065331 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 20:25:01.065339 kernel: Write protecting the kernel read-only data: 28672k Feb 12 20:25:01.065347 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 20:25:01.065355 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 20:25:01.065363 kernel: Run /init as init process Feb 12 20:25:01.065371 kernel: with arguments: Feb 12 20:25:01.065379 kernel: /init Feb 12 20:25:01.065388 kernel: with environment: Feb 12 20:25:01.065396 kernel: HOME=/ Feb 12 20:25:01.065403 kernel: TERM=linux Feb 12 20:25:01.065411 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 20:25:01.065422 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:25:01.065433 systemd[1]: Detected virtualization kvm. Feb 12 20:25:01.065442 systemd[1]: Detected architecture x86-64. Feb 12 20:25:01.065451 systemd[1]: Running in initrd. Feb 12 20:25:01.065462 systemd[1]: No hostname configured, using default hostname. Feb 12 20:25:01.065470 systemd[1]: Hostname set to . Feb 12 20:25:01.065479 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:25:01.065487 systemd[1]: Queued start job for default target initrd.target. Feb 12 20:25:01.065510 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:25:01.065519 systemd[1]: Reached target cryptsetup.target. Feb 12 20:25:01.065527 systemd[1]: Reached target paths.target. Feb 12 20:25:01.065536 systemd[1]: Reached target slices.target. Feb 12 20:25:01.065546 systemd[1]: Reached target swap.target. Feb 12 20:25:01.065555 systemd[1]: Reached target timers.target. Feb 12 20:25:01.065564 systemd[1]: Listening on iscsid.socket. Feb 12 20:25:01.065572 systemd[1]: Listening on iscsiuio.socket. Feb 12 20:25:01.065581 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 20:25:01.065590 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 20:25:01.065598 systemd[1]: Listening on systemd-journald.socket. Feb 12 20:25:01.065607 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:25:01.065617 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:25:01.065625 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:25:01.065634 systemd[1]: Reached target sockets.target. Feb 12 20:25:01.065643 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:25:01.065661 systemd[1]: Finished network-cleanup.service. Feb 12 20:25:01.065673 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 20:25:01.065685 systemd[1]: Starting systemd-journald.service... Feb 12 20:25:01.065693 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:25:01.065702 systemd[1]: Starting systemd-resolved.service... Feb 12 20:25:01.065711 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 20:25:01.065720 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:25:01.065729 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 20:25:01.065742 systemd-journald[184]: Journal started Feb 12 20:25:01.065787 systemd-journald[184]: Runtime Journal (/run/log/journal/3065d20ac8b248059d6fc3436738145d) is 4.9M, max 39.5M, 34.5M free. Feb 12 20:25:01.028041 systemd-modules-load[185]: Inserted module 'overlay' Feb 12 20:25:01.096641 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 20:25:01.096668 kernel: Bridge firewalling registered Feb 12 20:25:01.096688 systemd[1]: Started systemd-journald.service. Feb 12 20:25:01.096704 kernel: audit: type=1130 audit(1707769501.091:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.083945 systemd-resolved[186]: Positive Trust Anchors: Feb 12 20:25:01.112881 kernel: audit: type=1130 audit(1707769501.096:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.112911 kernel: audit: type=1130 audit(1707769501.108:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.083960 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:25:01.114621 kernel: SCSI subsystem initialized Feb 12 20:25:01.083997 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:25:01.122845 kernel: audit: type=1130 audit(1707769501.116:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.086046 systemd-modules-load[185]: Inserted module 'br_netfilter' Feb 12 20:25:01.127964 kernel: audit: type=1130 audit(1707769501.122:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.097833 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 20:25:01.101196 systemd-resolved[186]: Defaulting to hostname 'linux'. Feb 12 20:25:01.108056 systemd[1]: Started systemd-resolved.service. Feb 12 20:25:01.108724 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 20:25:01.117675 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 20:25:01.123567 systemd[1]: Reached target nss-lookup.target. Feb 12 20:25:01.140542 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 20:25:01.140570 kernel: device-mapper: uevent: version 1.0.3 Feb 12 20:25:01.140588 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 20:25:01.130097 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 20:25:01.141781 systemd-modules-load[185]: Inserted module 'dm_multipath' Feb 12 20:25:01.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.142804 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:25:01.150522 kernel: audit: type=1130 audit(1707769501.143:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.144238 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:25:01.153097 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 20:25:01.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.157520 kernel: audit: type=1130 audit(1707769501.153:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.157669 systemd[1]: Starting dracut-cmdline.service... Feb 12 20:25:01.158985 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:25:01.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.163756 kernel: audit: type=1130 audit(1707769501.159:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.170896 dracut-cmdline[208]: dracut-dracut-053 Feb 12 20:25:01.173769 dracut-cmdline[208]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 20:25:01.240519 kernel: Loading iSCSI transport class v2.0-870. Feb 12 20:25:01.255520 kernel: iscsi: registered transport (tcp) Feb 12 20:25:01.280741 kernel: iscsi: registered transport (qla4xxx) Feb 12 20:25:01.280786 kernel: QLogic iSCSI HBA Driver Feb 12 20:25:01.335392 systemd[1]: Finished dracut-cmdline.service. Feb 12 20:25:01.336831 systemd[1]: Starting dracut-pre-udev.service... Feb 12 20:25:01.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.342555 kernel: audit: type=1130 audit(1707769501.335:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.403636 kernel: raid6: sse2x4 gen() 12354 MB/s Feb 12 20:25:01.420602 kernel: raid6: sse2x4 xor() 6607 MB/s Feb 12 20:25:01.437594 kernel: raid6: sse2x2 gen() 14034 MB/s Feb 12 20:25:01.454597 kernel: raid6: sse2x2 xor() 8633 MB/s Feb 12 20:25:01.471580 kernel: raid6: sse2x1 gen() 10861 MB/s Feb 12 20:25:01.489429 kernel: raid6: sse2x1 xor() 6552 MB/s Feb 12 20:25:01.489575 kernel: raid6: using algorithm sse2x2 gen() 14034 MB/s Feb 12 20:25:01.489614 kernel: raid6: .... xor() 8633 MB/s, rmw enabled Feb 12 20:25:01.490303 kernel: raid6: using ssse3x2 recovery algorithm Feb 12 20:25:01.507272 kernel: xor: measuring software checksum speed Feb 12 20:25:01.507378 kernel: prefetch64-sse : 13808 MB/sec Feb 12 20:25:01.509767 kernel: generic_sse : 15697 MB/sec Feb 12 20:25:01.509844 kernel: xor: using function: generic_sse (15697 MB/sec) Feb 12 20:25:01.626595 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 20:25:01.641944 systemd[1]: Finished dracut-pre-udev.service. Feb 12 20:25:01.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.642000 audit: BPF prog-id=7 op=LOAD Feb 12 20:25:01.642000 audit: BPF prog-id=8 op=LOAD Feb 12 20:25:01.643453 systemd[1]: Starting systemd-udevd.service... Feb 12 20:25:01.658094 systemd-udevd[385]: Using default interface naming scheme 'v252'. Feb 12 20:25:01.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.669746 systemd[1]: Started systemd-udevd.service. Feb 12 20:25:01.674317 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 20:25:01.690806 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Feb 12 20:25:01.741995 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 20:25:01.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.745086 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:25:01.782042 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:25:01.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:01.851543 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Feb 12 20:25:01.865054 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 20:25:01.865102 kernel: GPT:17805311 != 41943039 Feb 12 20:25:01.865124 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 20:25:01.866085 kernel: GPT:17805311 != 41943039 Feb 12 20:25:01.866843 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 20:25:01.869337 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:25:01.883538 kernel: libata version 3.00 loaded. Feb 12 20:25:01.887016 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 12 20:25:01.903520 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (445) Feb 12 20:25:01.904526 kernel: scsi host0: ata_piix Feb 12 20:25:01.907522 kernel: scsi host1: ata_piix Feb 12 20:25:01.907658 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Feb 12 20:25:01.907672 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Feb 12 20:25:01.918244 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 20:25:01.964453 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 20:25:01.966133 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 20:25:01.976620 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 20:25:01.986693 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:25:01.989565 systemd[1]: Starting disk-uuid.service... Feb 12 20:25:02.075332 disk-uuid[461]: Primary Header is updated. Feb 12 20:25:02.075332 disk-uuid[461]: Secondary Entries is updated. Feb 12 20:25:02.075332 disk-uuid[461]: Secondary Header is updated. Feb 12 20:25:02.093567 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:25:02.107545 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:25:03.137586 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 20:25:03.138731 disk-uuid[462]: The operation has completed successfully. Feb 12 20:25:03.210972 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 20:25:03.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:03.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:03.211185 systemd[1]: Finished disk-uuid.service. Feb 12 20:25:03.223870 systemd[1]: Starting verity-setup.service... Feb 12 20:25:03.252525 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Feb 12 20:25:03.369224 systemd[1]: Found device dev-mapper-usr.device. Feb 12 20:25:03.371960 systemd[1]: Mounting sysusr-usr.mount... Feb 12 20:25:03.378576 systemd[1]: Finished verity-setup.service. Feb 12 20:25:03.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:03.518614 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 20:25:03.518724 systemd[1]: Mounted sysusr-usr.mount. Feb 12 20:25:03.519383 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 20:25:03.520123 systemd[1]: Starting ignition-setup.service... Feb 12 20:25:03.527294 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 20:25:03.535785 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:25:03.535853 kernel: BTRFS info (device vda6): using free space tree Feb 12 20:25:03.535882 kernel: BTRFS info (device vda6): has skinny extents Feb 12 20:25:03.554687 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 20:25:03.567457 systemd[1]: Finished ignition-setup.service. Feb 12 20:25:03.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:03.570485 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 20:25:03.669486 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 20:25:03.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:03.671000 audit: BPF prog-id=9 op=LOAD Feb 12 20:25:03.672796 systemd[1]: Starting systemd-networkd.service... Feb 12 20:25:03.702519 systemd-networkd[633]: lo: Link UP Feb 12 20:25:03.702527 systemd-networkd[633]: lo: Gained carrier Feb 12 20:25:03.703078 systemd-networkd[633]: Enumeration completed Feb 12 20:25:03.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:03.703298 systemd-networkd[633]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:25:03.704591 systemd-networkd[633]: eth0: Link UP Feb 12 20:25:03.704595 systemd-networkd[633]: eth0: Gained carrier Feb 12 20:25:03.706266 systemd[1]: Started systemd-networkd.service. Feb 12 20:25:03.708192 systemd[1]: Reached target network.target. Feb 12 20:25:03.711568 systemd[1]: Starting iscsiuio.service... Feb 12 20:25:03.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:03.720375 systemd[1]: Started iscsiuio.service. Feb 12 20:25:03.721630 systemd-networkd[633]: eth0: DHCPv4 address 172.24.4.150/24, gateway 172.24.4.1 acquired from 172.24.4.1 Feb 12 20:25:03.724683 systemd[1]: Starting iscsid.service... Feb 12 20:25:03.730278 iscsid[641]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:25:03.730278 iscsid[641]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 20:25:03.730278 iscsid[641]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 20:25:03.730278 iscsid[641]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 20:25:03.730278 iscsid[641]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 20:25:03.730278 iscsid[641]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 20:25:03.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:03.733189 systemd[1]: Started iscsid.service. Feb 12 20:25:03.736636 systemd[1]: Starting dracut-initqueue.service... Feb 12 20:25:03.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:03.750609 systemd[1]: Finished dracut-initqueue.service. Feb 12 20:25:03.751268 systemd[1]: Reached target remote-fs-pre.target. Feb 12 20:25:03.751751 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:25:03.752239 systemd[1]: Reached target remote-fs.target. Feb 12 20:25:03.753712 systemd[1]: Starting dracut-pre-mount.service... Feb 12 20:25:03.763902 systemd[1]: Finished dracut-pre-mount.service. Feb 12 20:25:03.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:03.875113 ignition[540]: Ignition 2.14.0 Feb 12 20:25:03.875127 ignition[540]: Stage: fetch-offline Feb 12 20:25:03.875186 ignition[540]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:25:03.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:03.878011 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 20:25:03.875208 ignition[540]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:25:03.879646 systemd[1]: Starting ignition-fetch.service... Feb 12 20:25:03.876273 ignition[540]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:25:03.876383 ignition[540]: parsed url from cmdline: "" Feb 12 20:25:03.876387 ignition[540]: no config URL provided Feb 12 20:25:03.876393 ignition[540]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:25:03.876401 ignition[540]: no config at "/usr/lib/ignition/user.ign" Feb 12 20:25:03.876406 ignition[540]: failed to fetch config: resource requires networking Feb 12 20:25:03.876680 ignition[540]: Ignition finished successfully Feb 12 20:25:03.893627 ignition[655]: Ignition 2.14.0 Feb 12 20:25:03.894481 ignition[655]: Stage: fetch Feb 12 20:25:03.895213 ignition[655]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:25:03.896006 ignition[655]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:25:03.896961 ignition[655]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:25:03.897789 ignition[655]: parsed url from cmdline: "" Feb 12 20:25:03.897847 ignition[655]: no config URL provided Feb 12 20:25:03.898315 ignition[655]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 20:25:03.899017 ignition[655]: no config at "/usr/lib/ignition/user.ign" Feb 12 20:25:03.902659 ignition[655]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Feb 12 20:25:03.902691 ignition[655]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Feb 12 20:25:03.903230 ignition[655]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Feb 12 20:25:04.201762 ignition[655]: GET result: OK Feb 12 20:25:04.202534 ignition[655]: parsing config with SHA512: f58b38a741106efeba2ffdf0c9d50166492ceda227680f5598c43c8515f33cba732fc8892aba1d372eb964c43dda4800dd30c4c7fb17c4fea5a0122d5c082324 Feb 12 20:25:04.257201 unknown[655]: fetched base config from "system" Feb 12 20:25:04.257230 unknown[655]: fetched base config from "system" Feb 12 20:25:04.258368 ignition[655]: fetch: fetch complete Feb 12 20:25:04.257245 unknown[655]: fetched user config from "openstack" Feb 12 20:25:04.258381 ignition[655]: fetch: fetch passed Feb 12 20:25:04.258453 ignition[655]: Ignition finished successfully Feb 12 20:25:04.263989 systemd[1]: Finished ignition-fetch.service. Feb 12 20:25:04.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:04.266583 systemd[1]: Starting ignition-kargs.service... Feb 12 20:25:04.285945 ignition[661]: Ignition 2.14.0 Feb 12 20:25:04.285970 ignition[661]: Stage: kargs Feb 12 20:25:04.286210 ignition[661]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:25:04.286252 ignition[661]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:25:04.288468 ignition[661]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:25:04.291076 ignition[661]: kargs: kargs passed Feb 12 20:25:04.293195 systemd[1]: Finished ignition-kargs.service. Feb 12 20:25:04.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:04.291160 ignition[661]: Ignition finished successfully Feb 12 20:25:04.305748 systemd[1]: Starting ignition-disks.service... Feb 12 20:25:04.326957 ignition[666]: Ignition 2.14.0 Feb 12 20:25:04.329049 ignition[666]: Stage: disks Feb 12 20:25:04.331036 ignition[666]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:25:04.333051 ignition[666]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:25:04.335883 ignition[666]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:25:04.340606 ignition[666]: disks: disks passed Feb 12 20:25:04.341992 ignition[666]: Ignition finished successfully Feb 12 20:25:04.344798 systemd[1]: Finished ignition-disks.service. Feb 12 20:25:04.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:04.345705 systemd[1]: Reached target initrd-root-device.target. Feb 12 20:25:04.347243 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:25:04.348866 systemd[1]: Reached target local-fs.target. Feb 12 20:25:04.350439 systemd[1]: Reached target sysinit.target. Feb 12 20:25:04.352021 systemd[1]: Reached target basic.target. Feb 12 20:25:04.354479 systemd[1]: Starting systemd-fsck-root.service... Feb 12 20:25:04.375467 systemd-fsck[673]: ROOT: clean, 602/1628000 files, 124050/1617920 blocks Feb 12 20:25:04.382449 systemd[1]: Finished systemd-fsck-root.service. Feb 12 20:25:04.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:04.384540 systemd[1]: Mounting sysroot.mount... Feb 12 20:25:04.404576 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 20:25:04.404576 systemd[1]: Mounted sysroot.mount. Feb 12 20:25:04.405180 systemd[1]: Reached target initrd-root-fs.target. Feb 12 20:25:04.408321 systemd[1]: Mounting sysroot-usr.mount... Feb 12 20:25:04.409242 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Feb 12 20:25:04.410050 systemd[1]: Starting flatcar-openstack-hostname.service... Feb 12 20:25:04.410641 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 20:25:04.410679 systemd[1]: Reached target ignition-diskful.target. Feb 12 20:25:04.421874 systemd[1]: Mounted sysroot-usr.mount. Feb 12 20:25:04.432057 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:25:04.435196 systemd[1]: Starting initrd-setup-root.service... Feb 12 20:25:04.446988 initrd-setup-root[685]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 20:25:04.462584 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (680) Feb 12 20:25:04.466328 initrd-setup-root[693]: cut: /sysroot/etc/group: No such file or directory Feb 12 20:25:04.473524 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:25:04.473576 kernel: BTRFS info (device vda6): using free space tree Feb 12 20:25:04.473593 kernel: BTRFS info (device vda6): has skinny extents Feb 12 20:25:04.484265 initrd-setup-root[717]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 20:25:04.493837 initrd-setup-root[727]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 20:25:04.495025 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:25:04.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:04.570804 systemd[1]: Finished initrd-setup-root.service. Feb 12 20:25:04.572161 systemd[1]: Starting ignition-mount.service... Feb 12 20:25:04.577863 systemd[1]: Starting sysroot-boot.service... Feb 12 20:25:04.583357 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 20:25:04.583469 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 20:25:04.607030 ignition[748]: INFO : Ignition 2.14.0 Feb 12 20:25:04.607030 ignition[748]: INFO : Stage: mount Feb 12 20:25:04.608244 ignition[748]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:25:04.608244 ignition[748]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:25:04.610007 ignition[748]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:25:04.610007 ignition[748]: INFO : mount: mount passed Feb 12 20:25:04.610007 ignition[748]: INFO : Ignition finished successfully Feb 12 20:25:04.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:04.620530 systemd[1]: Finished ignition-mount.service. Feb 12 20:25:04.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:04.632013 systemd[1]: Finished sysroot-boot.service. Feb 12 20:25:04.636385 coreos-metadata[679]: Feb 12 20:25:04.636 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Feb 12 20:25:04.649900 coreos-metadata[679]: Feb 12 20:25:04.649 INFO Fetch successful Feb 12 20:25:04.650573 coreos-metadata[679]: Feb 12 20:25:04.650 INFO wrote hostname ci-3510-3-2-1-baeec26020.novalocal to /sysroot/etc/hostname Feb 12 20:25:04.653307 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Feb 12 20:25:04.653414 systemd[1]: Finished flatcar-openstack-hostname.service. Feb 12 20:25:04.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:04.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:04.655522 systemd[1]: Starting ignition-files.service... Feb 12 20:25:04.663605 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 20:25:04.681553 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (756) Feb 12 20:25:04.688522 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 20:25:04.688588 kernel: BTRFS info (device vda6): using free space tree Feb 12 20:25:04.688601 kernel: BTRFS info (device vda6): has skinny extents Feb 12 20:25:04.705068 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 20:25:04.728904 ignition[775]: INFO : Ignition 2.14.0 Feb 12 20:25:04.728904 ignition[775]: INFO : Stage: files Feb 12 20:25:04.731967 ignition[775]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:25:04.731967 ignition[775]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:25:04.731967 ignition[775]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:25:04.736618 ignition[775]: DEBUG : files: compiled without relabeling support, skipping Feb 12 20:25:04.737869 ignition[775]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 20:25:04.737869 ignition[775]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 20:25:04.742368 ignition[775]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 20:25:04.744198 ignition[775]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 20:25:04.745979 unknown[775]: wrote ssh authorized keys file for user: core Feb 12 20:25:04.747361 ignition[775]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 20:25:04.750666 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 20:25:04.750666 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-amd64-v1.1.1.tgz: attempt #1 Feb 12 20:25:04.936025 systemd-networkd[633]: eth0: Gained IPv6LL Feb 12 20:25:05.333449 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 20:25:06.099843 ignition[775]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4d0ed0abb5951b9cf83cba938ef84bdc5b681f4ac869da8143974f6a53a3ff30c666389fa462b9d14d30af09bf03f6cdf77598c572f8fb3ea00cecdda467a48d Feb 12 20:25:06.099843 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.1.1.tgz" Feb 12 20:25:06.099843 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 20:25:06.107391 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-amd64.tar.gz: attempt #1 Feb 12 20:25:06.348675 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 20:25:06.808861 ignition[775]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: a3a2c02a90b008686c20babaf272e703924db2a3e2a0d4e2a7c81d994cbc68c47458a4a354ecc243af095b390815c7f203348b9749351ae817bd52a522300449 Feb 12 20:25:06.812107 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-amd64.tar.gz" Feb 12 20:25:06.812107 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:25:06.812107 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubeadm: attempt #1 Feb 12 20:25:06.987732 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 20:25:07.922465 ignition[775]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 1c324cd645a7bf93d19d24c87498d9a17878eb1cc927e2680200ffeab2f85051ddec47d85b79b8e774042dc6726299ad3d7caf52c060701f00deba30dc33f660 Feb 12 20:25:07.928411 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 20:25:07.928411 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:25:07.928411 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/amd64/kubelet: attempt #1 Feb 12 20:25:08.042020 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 20:25:11.336805 ignition[775]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 40daf2a9b9e666c14b10e627da931bd79978628b1f23ef6429c1cb4fcba261f86ccff440c0dbb0070ee760fe55772b4fd279c4582dfbb17fa30bc94b7f00126b Feb 12 20:25:11.336805 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 20:25:11.336805 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 12 20:25:11.344158 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 20:25:11.344158 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:25:11.344158 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 20:25:11.344158 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:25:11.344158 ignition[775]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 20:25:11.344158 ignition[775]: INFO : files: op(a): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 20:25:11.344158 ignition[775]: INFO : files: op(a): op(b): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Feb 12 20:25:11.344158 ignition[775]: INFO : files: op(a): op(b): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata-sshkeys@.service.d/20-clct-provider-override.conf" Feb 12 20:25:11.344158 ignition[775]: INFO : files: op(a): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 20:25:11.344158 ignition[775]: INFO : files: op(c): [started] processing unit "coreos-metadata.service" Feb 12 20:25:11.344158 ignition[775]: INFO : files: op(c): op(d): [started] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Feb 12 20:25:11.344158 ignition[775]: INFO : files: op(c): op(d): [finished] writing systemd drop-in "20-clct-provider-override.conf" at "/sysroot/etc/systemd/system/coreos-metadata.service.d/20-clct-provider-override.conf" Feb 12 20:25:11.344158 ignition[775]: INFO : files: op(c): [finished] processing unit "coreos-metadata.service" Feb 12 20:25:11.344158 ignition[775]: INFO : files: op(e): [started] processing unit "prepare-cni-plugins.service" Feb 12 20:25:11.344158 ignition[775]: INFO : files: op(e): op(f): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:25:11.386992 kernel: kauditd_printk_skb: 27 callbacks suppressed Feb 12 20:25:11.387021 kernel: audit: type=1130 audit(1707769511.349:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.387039 kernel: audit: type=1130 audit(1707769511.370:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.387056 kernel: audit: type=1131 audit(1707769511.370:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.387078 kernel: audit: type=1130 audit(1707769511.379:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.349000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.387244 ignition[775]: INFO : files: op(e): op(f): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 20:25:11.387244 ignition[775]: INFO : files: op(e): [finished] processing unit "prepare-cni-plugins.service" Feb 12 20:25:11.387244 ignition[775]: INFO : files: op(10): [started] processing unit "prepare-critools.service" Feb 12 20:25:11.387244 ignition[775]: INFO : files: op(10): op(11): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:25:11.387244 ignition[775]: INFO : files: op(10): op(11): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 20:25:11.387244 ignition[775]: INFO : files: op(10): [finished] processing unit "prepare-critools.service" Feb 12 20:25:11.387244 ignition[775]: INFO : files: op(12): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 20:25:11.387244 ignition[775]: INFO : files: op(12): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 20:25:11.387244 ignition[775]: INFO : files: op(13): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:25:11.387244 ignition[775]: INFO : files: op(13): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 20:25:11.387244 ignition[775]: INFO : files: op(14): [started] setting preset to enabled for "prepare-critools.service" Feb 12 20:25:11.387244 ignition[775]: INFO : files: op(14): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 20:25:11.387244 ignition[775]: INFO : files: createResultFile: createFiles: op(15): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:25:11.387244 ignition[775]: INFO : files: createResultFile: createFiles: op(15): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 20:25:11.387244 ignition[775]: INFO : files: files passed Feb 12 20:25:11.387244 ignition[775]: INFO : Ignition finished successfully Feb 12 20:25:11.347078 systemd[1]: Finished ignition-files.service. Feb 12 20:25:11.350358 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 20:25:11.404475 initrd-setup-root-after-ignition[801]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 20:25:11.361983 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 20:25:11.363666 systemd[1]: Starting ignition-quench.service... Feb 12 20:25:11.368895 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 20:25:11.369061 systemd[1]: Finished ignition-quench.service. Feb 12 20:25:11.372757 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 20:25:11.380341 systemd[1]: Reached target ignition-complete.target. Feb 12 20:25:11.387289 systemd[1]: Starting initrd-parse-etc.service... Feb 12 20:25:11.413584 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 20:25:11.414614 systemd[1]: Finished initrd-parse-etc.service. Feb 12 20:25:11.432080 kernel: audit: type=1130 audit(1707769511.414:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.432125 kernel: audit: type=1131 audit(1707769511.414:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.415539 systemd[1]: Reached target initrd-fs.target. Feb 12 20:25:11.432662 systemd[1]: Reached target initrd.target. Feb 12 20:25:11.434177 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 20:25:11.435047 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 20:25:11.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.454536 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 20:25:11.459046 kernel: audit: type=1130 audit(1707769511.454:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.459228 systemd[1]: Starting initrd-cleanup.service... Feb 12 20:25:11.469663 systemd[1]: Stopped target nss-lookup.target. Feb 12 20:25:11.470694 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 20:25:11.471836 systemd[1]: Stopped target timers.target. Feb 12 20:25:11.472823 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 20:25:11.473468 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 20:25:11.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.474637 systemd[1]: Stopped target initrd.target. Feb 12 20:25:11.478630 kernel: audit: type=1131 audit(1707769511.473:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.478915 systemd[1]: Stopped target basic.target. Feb 12 20:25:11.480004 systemd[1]: Stopped target ignition-complete.target. Feb 12 20:25:11.481067 systemd[1]: Stopped target ignition-diskful.target. Feb 12 20:25:11.482147 systemd[1]: Stopped target initrd-root-device.target. Feb 12 20:25:11.483260 systemd[1]: Stopped target remote-fs.target. Feb 12 20:25:11.484344 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 20:25:11.485394 systemd[1]: Stopped target sysinit.target. Feb 12 20:25:11.486481 systemd[1]: Stopped target local-fs.target. Feb 12 20:25:11.487038 systemd[1]: Stopped target local-fs-pre.target. Feb 12 20:25:11.487960 systemd[1]: Stopped target swap.target. Feb 12 20:25:11.488835 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 20:25:11.497405 kernel: audit: type=1131 audit(1707769511.492:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.488964 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 20:25:11.493356 systemd[1]: Stopped target cryptsetup.target. Feb 12 20:25:11.502555 kernel: audit: type=1131 audit(1707769511.498:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.497854 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 20:25:11.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.497984 systemd[1]: Stopped dracut-initqueue.service. Feb 12 20:25:11.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.498956 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 20:25:11.499062 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 20:25:11.503190 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 20:25:11.503339 systemd[1]: Stopped ignition-files.service. Feb 12 20:25:11.505117 systemd[1]: Stopping ignition-mount.service... Feb 12 20:25:11.510150 systemd[1]: Stopping iscsid.service... Feb 12 20:25:11.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.519534 iscsid[641]: iscsid shutting down. Feb 12 20:25:11.510564 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 20:25:11.519000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.521848 ignition[814]: INFO : Ignition 2.14.0 Feb 12 20:25:11.521848 ignition[814]: INFO : Stage: umount Feb 12 20:25:11.521848 ignition[814]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 20:25:11.521848 ignition[814]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Feb 12 20:25:11.521848 ignition[814]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Feb 12 20:25:11.521848 ignition[814]: INFO : umount: umount passed Feb 12 20:25:11.521848 ignition[814]: INFO : Ignition finished successfully Feb 12 20:25:11.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.510679 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 20:25:11.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.512353 systemd[1]: Stopping sysroot-boot.service... Feb 12 20:25:11.518726 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 20:25:11.518887 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 20:25:11.520189 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 20:25:11.520318 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 20:25:11.524064 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 20:25:11.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.524156 systemd[1]: Stopped iscsid.service. Feb 12 20:25:11.526148 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 20:25:11.526222 systemd[1]: Stopped ignition-mount.service. Feb 12 20:25:11.529115 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 20:25:11.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.529279 systemd[1]: Stopped ignition-disks.service. Feb 12 20:25:11.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.531920 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 20:25:11.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.531979 systemd[1]: Stopped ignition-kargs.service. Feb 12 20:25:11.532436 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 20:25:11.532471 systemd[1]: Stopped ignition-fetch.service. Feb 12 20:25:11.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.532913 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 20:25:11.533001 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 20:25:11.533444 systemd[1]: Stopped target paths.target. Feb 12 20:25:11.561000 audit: BPF prog-id=6 op=UNLOAD Feb 12 20:25:11.533889 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 20:25:11.537541 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 20:25:11.538348 systemd[1]: Stopped target slices.target. Feb 12 20:25:11.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.538792 systemd[1]: Stopped target sockets.target. Feb 12 20:25:11.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.539293 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 20:25:11.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.539330 systemd[1]: Closed iscsid.socket. Feb 12 20:25:11.539798 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 20:25:11.539837 systemd[1]: Stopped ignition-setup.service. Feb 12 20:25:11.541320 systemd[1]: Stopping iscsiuio.service... Feb 12 20:25:11.542882 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 20:25:11.543435 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 20:25:11.543543 systemd[1]: Stopped iscsiuio.service. Feb 12 20:25:11.544128 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 20:25:11.544259 systemd[1]: Finished initrd-cleanup.service. Feb 12 20:25:11.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.545453 systemd[1]: Stopped target network.target. Feb 12 20:25:11.545896 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 20:25:11.545926 systemd[1]: Closed iscsiuio.socket. Feb 12 20:25:11.546415 systemd[1]: Stopping systemd-networkd.service... Feb 12 20:25:11.546931 systemd[1]: Stopping systemd-resolved.service... Feb 12 20:25:11.548901 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 20:25:11.549005 systemd[1]: Stopped sysroot-boot.service. Feb 12 20:25:11.549739 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 20:25:11.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.549798 systemd[1]: Stopped initrd-setup-root.service. Feb 12 20:25:11.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.549832 systemd-networkd[633]: eth0: DHCPv6 lease lost Feb 12 20:25:11.580000 audit: BPF prog-id=9 op=UNLOAD Feb 12 20:25:11.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.552053 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 20:25:11.552189 systemd[1]: Stopped systemd-networkd.service. Feb 12 20:25:11.556157 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 20:25:11.556274 systemd[1]: Stopped systemd-resolved.service. Feb 12 20:25:11.559358 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 20:25:11.559426 systemd[1]: Closed systemd-networkd.socket. Feb 12 20:25:11.561669 systemd[1]: Stopping network-cleanup.service... Feb 12 20:25:11.564107 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 20:25:11.564191 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 20:25:11.565160 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 20:25:11.565216 systemd[1]: Stopped systemd-sysctl.service. Feb 12 20:25:11.566717 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 20:25:11.566784 systemd[1]: Stopped systemd-modules-load.service. Feb 12 20:25:11.567753 systemd[1]: Stopping systemd-udevd.service... Feb 12 20:25:11.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.571127 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 20:25:11.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.571885 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 20:25:11.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:11.572045 systemd[1]: Stopped systemd-udevd.service. Feb 12 20:25:11.575789 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 20:25:11.575842 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 20:25:11.576511 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 20:25:11.576624 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 20:25:11.578891 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 20:25:11.578962 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 20:25:11.579893 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 20:25:11.579935 systemd[1]: Stopped dracut-cmdline.service. Feb 12 20:25:11.580930 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 20:25:11.580970 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 20:25:11.583133 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 20:25:11.591103 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 20:25:11.591188 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 20:25:11.592791 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 20:25:11.592884 systemd[1]: Stopped network-cleanup.service. Feb 12 20:25:11.594150 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 20:25:11.594234 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 20:25:11.595565 systemd[1]: Reached target initrd-switch-root.target. Feb 12 20:25:11.597153 systemd[1]: Starting initrd-switch-root.service... Feb 12 20:25:11.617051 systemd[1]: Switching root. Feb 12 20:25:11.636481 systemd-journald[184]: Journal stopped Feb 12 20:25:16.125336 systemd-journald[184]: Received SIGTERM from PID 1 (n/a). Feb 12 20:25:16.125392 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 20:25:16.125410 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 20:25:16.125428 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 20:25:16.125440 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 20:25:16.125452 kernel: SELinux: policy capability open_perms=1 Feb 12 20:25:16.125463 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 20:25:16.125474 kernel: SELinux: policy capability always_check_network=0 Feb 12 20:25:16.125485 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 20:25:16.125512 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 20:25:16.125523 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 20:25:16.125538 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 20:25:16.125550 systemd[1]: Successfully loaded SELinux policy in 100.926ms. Feb 12 20:25:16.125574 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.553ms. Feb 12 20:25:16.125588 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 20:25:16.125601 systemd[1]: Detected virtualization kvm. Feb 12 20:25:16.125613 systemd[1]: Detected architecture x86-64. Feb 12 20:25:16.125624 systemd[1]: Detected first boot. Feb 12 20:25:16.125636 systemd[1]: Hostname set to . Feb 12 20:25:16.125648 systemd[1]: Initializing machine ID from VM UUID. Feb 12 20:25:16.125662 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 20:25:16.125673 systemd[1]: Populated /etc with preset unit settings. Feb 12 20:25:16.125689 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:25:16.125706 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:25:16.125724 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:25:16.125737 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 20:25:16.125751 systemd[1]: Stopped initrd-switch-root.service. Feb 12 20:25:16.125763 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 20:25:16.125774 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 20:25:16.125786 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 20:25:16.125798 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 20:25:16.125810 systemd[1]: Created slice system-getty.slice. Feb 12 20:25:16.125821 systemd[1]: Created slice system-modprobe.slice. Feb 12 20:25:16.125832 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 20:25:16.125846 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 20:25:16.125858 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 20:25:16.125870 systemd[1]: Created slice user.slice. Feb 12 20:25:16.125881 systemd[1]: Started systemd-ask-password-console.path. Feb 12 20:25:16.125893 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 20:25:16.125905 systemd[1]: Set up automount boot.automount. Feb 12 20:25:16.125917 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 20:25:16.125930 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 20:25:16.125942 systemd[1]: Stopped target initrd-fs.target. Feb 12 20:25:16.125959 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 20:25:16.125970 systemd[1]: Reached target integritysetup.target. Feb 12 20:25:16.125981 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 20:25:16.125993 systemd[1]: Reached target remote-fs.target. Feb 12 20:25:16.126006 systemd[1]: Reached target slices.target. Feb 12 20:25:16.126019 systemd[1]: Reached target swap.target. Feb 12 20:25:16.126030 systemd[1]: Reached target torcx.target. Feb 12 20:25:16.126044 systemd[1]: Reached target veritysetup.target. Feb 12 20:25:16.126055 systemd[1]: Listening on systemd-coredump.socket. Feb 12 20:25:16.126066 systemd[1]: Listening on systemd-initctl.socket. Feb 12 20:25:16.126078 systemd[1]: Listening on systemd-networkd.socket. Feb 12 20:25:16.126090 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 20:25:16.126101 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 20:25:16.126113 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 20:25:16.126124 systemd[1]: Mounting dev-hugepages.mount... Feb 12 20:25:16.126136 systemd[1]: Mounting dev-mqueue.mount... Feb 12 20:25:16.126150 systemd[1]: Mounting media.mount... Feb 12 20:25:16.126162 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:25:16.126173 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 20:25:16.126185 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 20:25:16.126685 systemd[1]: Mounting tmp.mount... Feb 12 20:25:16.126731 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 20:25:16.126746 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 20:25:16.126758 systemd[1]: Starting kmod-static-nodes.service... Feb 12 20:25:16.126769 systemd[1]: Starting modprobe@configfs.service... Feb 12 20:25:16.126786 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 20:25:16.126799 systemd[1]: Starting modprobe@drm.service... Feb 12 20:25:16.126813 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 20:25:16.126826 systemd[1]: Starting modprobe@fuse.service... Feb 12 20:25:16.126838 systemd[1]: Starting modprobe@loop.service... Feb 12 20:25:16.126851 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 20:25:16.126864 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 20:25:16.126877 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 20:25:16.126889 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 20:25:16.126904 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 20:25:16.126917 systemd[1]: Stopped systemd-journald.service. Feb 12 20:25:16.126930 systemd[1]: Starting systemd-journald.service... Feb 12 20:25:16.126943 systemd[1]: Starting systemd-modules-load.service... Feb 12 20:25:16.126955 systemd[1]: Starting systemd-network-generator.service... Feb 12 20:25:16.126967 systemd[1]: Starting systemd-remount-fs.service... Feb 12 20:25:16.126979 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 20:25:16.126992 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 20:25:16.127004 systemd[1]: Stopped verity-setup.service. Feb 12 20:25:16.127018 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 20:25:16.127031 systemd[1]: Mounted dev-hugepages.mount. Feb 12 20:25:16.127043 systemd[1]: Mounted dev-mqueue.mount. Feb 12 20:25:16.127055 systemd[1]: Mounted media.mount. Feb 12 20:25:16.127067 kernel: fuse: init (API version 7.34) Feb 12 20:25:16.127080 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 20:25:16.127092 kernel: loop: module loaded Feb 12 20:25:16.127104 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 20:25:16.127116 systemd[1]: Mounted tmp.mount. Feb 12 20:25:16.127131 systemd[1]: Finished kmod-static-nodes.service. Feb 12 20:25:16.127143 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 20:25:16.127158 systemd-journald[927]: Journal started Feb 12 20:25:16.127214 systemd-journald[927]: Runtime Journal (/run/log/journal/3065d20ac8b248059d6fc3436738145d) is 4.9M, max 39.5M, 34.5M free. Feb 12 20:25:12.036000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 20:25:12.156000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:25:12.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 20:25:12.157000 audit: BPF prog-id=10 op=LOAD Feb 12 20:25:12.157000 audit: BPF prog-id=10 op=UNLOAD Feb 12 20:25:12.157000 audit: BPF prog-id=11 op=LOAD Feb 12 20:25:12.157000 audit: BPF prog-id=11 op=UNLOAD Feb 12 20:25:12.321000 audit[846]: AVC avc: denied { associate } for pid=846 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 20:25:12.321000 audit[846]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058cc a1=c00002ae40 a2=c000029b00 a3=32 items=0 ppid=829 pid=846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:12.321000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:25:12.323000 audit[846]: AVC avc: denied { associate } for pid=846 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 20:25:12.323000 audit[846]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a5 a2=1ed a3=0 items=2 ppid=829 pid=846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:12.323000 audit: CWD cwd="/" Feb 12 20:25:12.323000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:12.323000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:12.323000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 20:25:15.926000 audit: BPF prog-id=12 op=LOAD Feb 12 20:25:15.926000 audit: BPF prog-id=3 op=UNLOAD Feb 12 20:25:15.926000 audit: BPF prog-id=13 op=LOAD Feb 12 20:25:15.926000 audit: BPF prog-id=14 op=LOAD Feb 12 20:25:15.926000 audit: BPF prog-id=4 op=UNLOAD Feb 12 20:25:15.926000 audit: BPF prog-id=5 op=UNLOAD Feb 12 20:25:15.927000 audit: BPF prog-id=15 op=LOAD Feb 12 20:25:15.927000 audit: BPF prog-id=12 op=UNLOAD Feb 12 20:25:15.928000 audit: BPF prog-id=16 op=LOAD Feb 12 20:25:15.928000 audit: BPF prog-id=17 op=LOAD Feb 12 20:25:15.928000 audit: BPF prog-id=13 op=UNLOAD Feb 12 20:25:15.928000 audit: BPF prog-id=14 op=UNLOAD Feb 12 20:25:15.929000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:15.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:15.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:15.937000 audit: BPF prog-id=15 op=UNLOAD Feb 12 20:25:16.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.080000 audit: BPF prog-id=18 op=LOAD Feb 12 20:25:16.130248 systemd[1]: Finished modprobe@configfs.service. Feb 12 20:25:16.080000 audit: BPF prog-id=19 op=LOAD Feb 12 20:25:16.081000 audit: BPF prog-id=20 op=LOAD Feb 12 20:25:16.082000 audit: BPF prog-id=16 op=UNLOAD Feb 12 20:25:16.082000 audit: BPF prog-id=17 op=UNLOAD Feb 12 20:25:16.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.122000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 20:25:16.122000 audit[927]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff63142b20 a2=4000 a3=7fff63142bbc items=0 ppid=1 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:16.122000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 20:25:16.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:12.317763 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:25:15.924900 systemd[1]: Queued start job for default target multi-user.target. Feb 12 20:25:12.318807 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:25:15.924916 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 20:25:12.318840 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:25:15.929397 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 20:25:12.318888 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 20:25:12.318900 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 20:25:12.318933 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 20:25:12.318948 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 20:25:16.135118 systemd[1]: Started systemd-journald.service. Feb 12 20:25:16.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:12.319191 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 20:25:16.134961 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 20:25:12.319232 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 20:25:16.135093 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 20:25:16.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:12.319247 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 20:25:12.320208 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 20:25:12.320250 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 20:25:12.320271 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 20:25:16.135948 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 20:25:12.320288 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 20:25:16.136069 systemd[1]: Finished modprobe@drm.service. Feb 12 20:25:12.320306 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 20:25:12.320321 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 20:25:15.465714 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:15Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:25:15.466291 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:15Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:25:15.466576 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:15Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:25:15.467059 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:15Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 20:25:15.467193 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:15Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 20:25:15.467347 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-02-12T20:25:15Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 20:25:16.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.137542 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 20:25:16.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.137671 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 20:25:16.138377 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 20:25:16.138488 systemd[1]: Finished modprobe@fuse.service. Feb 12 20:25:16.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.143450 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 20:25:16.143596 systemd[1]: Finished modprobe@loop.service. Feb 12 20:25:16.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.144357 systemd[1]: Finished systemd-network-generator.service. Feb 12 20:25:16.145759 systemd[1]: Finished systemd-modules-load.service. Feb 12 20:25:16.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.148818 systemd[1]: Finished systemd-remount-fs.service. Feb 12 20:25:16.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.149713 systemd[1]: Reached target network-pre.target. Feb 12 20:25:16.151588 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 20:25:16.156088 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 20:25:16.159876 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 20:25:16.161994 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 20:25:16.163584 systemd[1]: Starting systemd-journal-flush.service... Feb 12 20:25:16.164102 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 20:25:16.165141 systemd[1]: Starting systemd-random-seed.service... Feb 12 20:25:16.165926 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 20:25:16.167948 systemd[1]: Starting systemd-sysctl.service... Feb 12 20:25:16.169792 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 20:25:16.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.173026 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 20:25:16.173653 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 20:25:16.175308 systemd[1]: Starting systemd-sysusers.service... Feb 12 20:25:16.184032 systemd-journald[927]: Time spent on flushing to /var/log/journal/3065d20ac8b248059d6fc3436738145d is 34.900ms for 1112 entries. Feb 12 20:25:16.184032 systemd-journald[927]: System Journal (/var/log/journal/3065d20ac8b248059d6fc3436738145d) is 8.0M, max 584.8M, 576.8M free. Feb 12 20:25:16.273302 systemd-journald[927]: Received client request to flush runtime journal. Feb 12 20:25:16.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.245000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.206214 systemd[1]: Finished systemd-random-seed.service. Feb 12 20:25:16.273830 udevadm[954]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 20:25:16.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:16.206866 systemd[1]: Reached target first-boot-complete.target. Feb 12 20:25:16.218752 systemd[1]: Finished systemd-sysctl.service. Feb 12 20:25:16.225260 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 20:25:16.226971 systemd[1]: Starting systemd-udev-settle.service... Feb 12 20:25:16.245706 systemd[1]: Finished systemd-sysusers.service. Feb 12 20:25:16.274295 systemd[1]: Finished systemd-journal-flush.service. Feb 12 20:25:17.005253 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 20:25:17.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:17.018488 kernel: kauditd_printk_skb: 100 callbacks suppressed Feb 12 20:25:17.018688 kernel: audit: type=1130 audit(1707769517.005:139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:17.018773 kernel: audit: type=1334 audit(1707769517.008:140): prog-id=21 op=LOAD Feb 12 20:25:17.008000 audit: BPF prog-id=21 op=LOAD Feb 12 20:25:17.021000 audit: BPF prog-id=22 op=LOAD Feb 12 20:25:17.026624 kernel: audit: type=1334 audit(1707769517.021:141): prog-id=22 op=LOAD Feb 12 20:25:17.026735 kernel: audit: type=1334 audit(1707769517.021:142): prog-id=7 op=UNLOAD Feb 12 20:25:17.026790 kernel: audit: type=1334 audit(1707769517.021:143): prog-id=8 op=UNLOAD Feb 12 20:25:17.021000 audit: BPF prog-id=7 op=UNLOAD Feb 12 20:25:17.021000 audit: BPF prog-id=8 op=UNLOAD Feb 12 20:25:17.022953 systemd[1]: Starting systemd-udevd.service... Feb 12 20:25:17.072080 systemd-udevd[956]: Using default interface naming scheme 'v252'. Feb 12 20:25:17.120625 systemd[1]: Started systemd-udevd.service. Feb 12 20:25:17.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:17.130819 kernel: audit: type=1130 audit(1707769517.121:144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:17.133180 systemd[1]: Starting systemd-networkd.service... Feb 12 20:25:17.130000 audit: BPF prog-id=23 op=LOAD Feb 12 20:25:17.134547 kernel: audit: type=1334 audit(1707769517.130:145): prog-id=23 op=LOAD Feb 12 20:25:17.154000 audit: BPF prog-id=24 op=LOAD Feb 12 20:25:17.161244 kernel: audit: type=1334 audit(1707769517.154:146): prog-id=24 op=LOAD Feb 12 20:25:17.161330 kernel: audit: type=1334 audit(1707769517.157:147): prog-id=25 op=LOAD Feb 12 20:25:17.157000 audit: BPF prog-id=25 op=LOAD Feb 12 20:25:17.161000 audit: BPF prog-id=26 op=LOAD Feb 12 20:25:17.165542 kernel: audit: type=1334 audit(1707769517.161:148): prog-id=26 op=LOAD Feb 12 20:25:17.167293 systemd[1]: Starting systemd-userdbd.service... Feb 12 20:25:17.218447 systemd[1]: Started systemd-userdbd.service. Feb 12 20:25:17.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:17.220999 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 20:25:17.303272 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 20:25:17.308530 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Feb 12 20:25:17.313533 kernel: ACPI: button: Power Button [PWRF] Feb 12 20:25:17.334190 systemd-networkd[959]: lo: Link UP Feb 12 20:25:17.334200 systemd-networkd[959]: lo: Gained carrier Feb 12 20:25:17.334646 systemd-networkd[959]: Enumeration completed Feb 12 20:25:17.334744 systemd[1]: Started systemd-networkd.service. Feb 12 20:25:17.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:17.336144 systemd-networkd[959]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 20:25:17.337601 systemd-networkd[959]: eth0: Link UP Feb 12 20:25:17.337611 systemd-networkd[959]: eth0: Gained carrier Feb 12 20:25:17.346657 systemd-networkd[959]: eth0: DHCPv4 address 172.24.4.150/24, gateway 172.24.4.1 acquired from 172.24.4.1 Feb 12 20:25:17.362000 audit[966]: AVC avc: denied { confidentiality } for pid=966 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 20:25:17.362000 audit[966]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c6c9026f20 a1=32194 a2=7fe1c9253bc5 a3=5 items=108 ppid=956 pid=966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:17.362000 audit: CWD cwd="/" Feb 12 20:25:17.362000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=1 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=2 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=3 name=(null) inode=14032 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=4 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=5 name=(null) inode=14033 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=6 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=7 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=8 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=9 name=(null) inode=14035 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=10 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=11 name=(null) inode=14036 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=12 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=13 name=(null) inode=14037 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=14 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=15 name=(null) inode=14038 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=16 name=(null) inode=14034 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=17 name=(null) inode=14039 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=18 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=19 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=20 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=21 name=(null) inode=14041 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=22 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=23 name=(null) inode=14042 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=24 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=25 name=(null) inode=14043 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=26 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=27 name=(null) inode=14044 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=28 name=(null) inode=14040 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=29 name=(null) inode=14045 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=30 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=31 name=(null) inode=14046 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=32 name=(null) inode=14046 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=33 name=(null) inode=14047 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=34 name=(null) inode=14046 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=35 name=(null) inode=14048 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=36 name=(null) inode=14046 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=37 name=(null) inode=14049 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=38 name=(null) inode=14046 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=39 name=(null) inode=14050 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=40 name=(null) inode=14046 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=41 name=(null) inode=14051 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=42 name=(null) inode=14031 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=43 name=(null) inode=14052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=44 name=(null) inode=14052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=45 name=(null) inode=14053 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=46 name=(null) inode=14052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=47 name=(null) inode=14054 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=48 name=(null) inode=14052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=49 name=(null) inode=14055 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=50 name=(null) inode=14052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=51 name=(null) inode=14056 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=52 name=(null) inode=14052 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=53 name=(null) inode=14057 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=55 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=56 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=57 name=(null) inode=14059 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=58 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=59 name=(null) inode=14060 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=60 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=61 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=62 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=63 name=(null) inode=14062 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=64 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=65 name=(null) inode=14063 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=66 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=67 name=(null) inode=14064 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=68 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=69 name=(null) inode=14065 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=70 name=(null) inode=14061 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=71 name=(null) inode=14066 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=72 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=73 name=(null) inode=14067 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=74 name=(null) inode=14067 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=75 name=(null) inode=14068 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=76 name=(null) inode=14067 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=77 name=(null) inode=14069 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=78 name=(null) inode=14067 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=79 name=(null) inode=14070 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=80 name=(null) inode=14067 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=81 name=(null) inode=14071 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=82 name=(null) inode=14067 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=83 name=(null) inode=14072 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=84 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=85 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=86 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=87 name=(null) inode=14074 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=88 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=89 name=(null) inode=14075 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=90 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=91 name=(null) inode=14076 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=92 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=93 name=(null) inode=14077 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=94 name=(null) inode=14073 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=95 name=(null) inode=14078 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=96 name=(null) inode=14058 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=97 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=98 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=99 name=(null) inode=14080 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=100 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=101 name=(null) inode=14081 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=102 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=103 name=(null) inode=14082 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=104 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=105 name=(null) inode=14083 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=106 name=(null) inode=14079 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PATH item=107 name=(null) inode=14084 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:25:17.362000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 20:25:17.434876 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 12 20:25:17.435243 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Feb 12 20:25:17.441535 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 20:25:17.457411 systemd[1]: Finished systemd-udev-settle.service. Feb 12 20:25:17.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:17.461278 systemd[1]: Starting lvm2-activation-early.service... Feb 12 20:25:17.503386 lvm[985]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:25:17.541560 systemd[1]: Finished lvm2-activation-early.service. Feb 12 20:25:17.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:17.542856 systemd[1]: Reached target cryptsetup.target. Feb 12 20:25:17.546026 systemd[1]: Starting lvm2-activation.service... Feb 12 20:25:17.556380 lvm[986]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 20:25:17.606171 systemd[1]: Finished lvm2-activation.service. Feb 12 20:25:17.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:17.607449 systemd[1]: Reached target local-fs-pre.target. Feb 12 20:25:17.608634 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 20:25:17.608692 systemd[1]: Reached target local-fs.target. Feb 12 20:25:17.609680 systemd[1]: Reached target machines.target. Feb 12 20:25:17.613083 systemd[1]: Starting ldconfig.service... Feb 12 20:25:17.641722 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 20:25:17.641837 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:25:17.644341 systemd[1]: Starting systemd-boot-update.service... Feb 12 20:25:17.647891 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 20:25:17.651544 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 20:25:17.652922 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:25:17.653038 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 20:25:17.655280 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 20:25:17.756291 systemd[1]: boot.automount: Got automount request for /boot, triggered by 988 (bootctl) Feb 12 20:25:17.758905 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 20:25:17.777615 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 20:25:17.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:17.952903 systemd-tmpfiles[991]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 20:25:18.085438 systemd-tmpfiles[991]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 20:25:18.132408 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 20:25:18.133925 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 20:25:18.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:18.141595 systemd-tmpfiles[991]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 20:25:18.237016 systemd-fsck[998]: fsck.fat 4.2 (2021-01-31) Feb 12 20:25:18.237016 systemd-fsck[998]: /dev/vda1: 789 files, 115339/258078 clusters Feb 12 20:25:18.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:18.246034 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 20:25:18.251325 systemd[1]: Mounting boot.mount... Feb 12 20:25:18.280355 systemd[1]: Mounted boot.mount. Feb 12 20:25:18.339885 systemd[1]: Finished systemd-boot-update.service. Feb 12 20:25:18.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:18.454652 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 20:25:18.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:18.458610 systemd[1]: Starting audit-rules.service... Feb 12 20:25:18.462194 systemd[1]: Starting clean-ca-certificates.service... Feb 12 20:25:18.467380 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 20:25:18.472000 audit: BPF prog-id=27 op=LOAD Feb 12 20:25:18.475768 systemd[1]: Starting systemd-resolved.service... Feb 12 20:25:18.478000 audit: BPF prog-id=28 op=LOAD Feb 12 20:25:18.481750 systemd[1]: Starting systemd-timesyncd.service... Feb 12 20:25:18.485511 systemd[1]: Starting systemd-update-utmp.service... Feb 12 20:25:18.504000 audit[1007]: SYSTEM_BOOT pid=1007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 20:25:18.507343 systemd[1]: Finished clean-ca-certificates.service. Feb 12 20:25:18.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:18.508564 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 20:25:18.512638 systemd[1]: Finished systemd-update-utmp.service. Feb 12 20:25:18.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:18.546533 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 20:25:18.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:18.581000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 20:25:18.581000 audit[1021]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd009a42e0 a2=420 a3=0 items=0 ppid=1001 pid=1021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:18.581000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 20:25:18.582136 augenrules[1021]: No rules Feb 12 20:25:18.583255 systemd[1]: Finished audit-rules.service. Feb 12 20:25:18.596403 systemd-resolved[1005]: Positive Trust Anchors: Feb 12 20:25:18.596766 systemd-resolved[1005]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 20:25:18.596874 systemd-resolved[1005]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 20:25:18.603280 systemd[1]: Started systemd-timesyncd.service. Feb 12 20:25:18.603945 systemd[1]: Reached target time-set.target. Feb 12 20:25:18.618409 systemd-resolved[1005]: Using system hostname 'ci-3510-3-2-1-baeec26020.novalocal'. Feb 12 20:25:18.620781 systemd[1]: Started systemd-resolved.service. Feb 12 20:25:18.621362 systemd[1]: Reached target network.target. Feb 12 20:25:18.621858 systemd[1]: Reached target nss-lookup.target. Feb 12 20:25:19.087801 systemd-resolved[1005]: Clock change detected. Flushing caches. Feb 12 20:25:19.088029 systemd-timesyncd[1006]: Contacted time server 5.196.8.113:123 (0.flatcar.pool.ntp.org). Feb 12 20:25:19.088165 systemd-timesyncd[1006]: Initial clock synchronization to Mon 2024-02-12 20:25:19.087741 UTC. Feb 12 20:25:19.282376 systemd-networkd[959]: eth0: Gained IPv6LL Feb 12 20:25:19.740433 ldconfig[987]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 20:25:19.751981 systemd[1]: Finished ldconfig.service. Feb 12 20:25:19.756773 systemd[1]: Starting systemd-update-done.service... Feb 12 20:25:19.771548 systemd[1]: Finished systemd-update-done.service. Feb 12 20:25:19.773125 systemd[1]: Reached target sysinit.target. Feb 12 20:25:19.774644 systemd[1]: Started motdgen.path. Feb 12 20:25:19.775772 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 20:25:19.777589 systemd[1]: Started logrotate.timer. Feb 12 20:25:19.778876 systemd[1]: Started mdadm.timer. Feb 12 20:25:19.780000 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 20:25:19.781198 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 20:25:19.781277 systemd[1]: Reached target paths.target. Feb 12 20:25:19.782319 systemd[1]: Reached target timers.target. Feb 12 20:25:19.788177 systemd[1]: Listening on dbus.socket. Feb 12 20:25:19.791564 systemd[1]: Starting docker.socket... Feb 12 20:25:19.799294 systemd[1]: Listening on sshd.socket. Feb 12 20:25:19.800618 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:25:19.801608 systemd[1]: Listening on docker.socket. Feb 12 20:25:19.802819 systemd[1]: Reached target sockets.target. Feb 12 20:25:19.803909 systemd[1]: Reached target basic.target. Feb 12 20:25:19.805141 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:25:19.805210 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 20:25:19.807495 systemd[1]: Starting containerd.service... Feb 12 20:25:19.811168 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 20:25:19.814827 systemd[1]: Starting dbus.service... Feb 12 20:25:19.819987 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 20:25:19.829170 systemd[1]: Starting extend-filesystems.service... Feb 12 20:25:19.830487 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 20:25:19.833864 systemd[1]: Starting motdgen.service... Feb 12 20:25:19.838754 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 20:25:19.843040 systemd[1]: Starting prepare-critools.service... Feb 12 20:25:19.849478 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 20:25:19.854203 systemd[1]: Starting sshd-keygen.service... Feb 12 20:25:19.865479 systemd[1]: Starting systemd-logind.service... Feb 12 20:25:19.866024 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 20:25:19.866093 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 20:25:19.869162 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 20:25:19.870368 systemd[1]: Starting update-engine.service... Feb 12 20:25:19.874039 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 20:25:19.895729 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 20:25:19.895916 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 20:25:19.925967 jq[1035]: false Feb 12 20:25:19.927135 jq[1049]: true Feb 12 20:25:19.927280 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 20:25:19.927446 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 20:25:19.971002 jq[1056]: true Feb 12 20:25:20.010888 extend-filesystems[1036]: Found vda Feb 12 20:25:20.014188 extend-filesystems[1036]: Found vda1 Feb 12 20:25:20.014188 extend-filesystems[1036]: Found vda2 Feb 12 20:25:20.014188 extend-filesystems[1036]: Found vda3 Feb 12 20:25:20.014188 extend-filesystems[1036]: Found usr Feb 12 20:25:20.014188 extend-filesystems[1036]: Found vda4 Feb 12 20:25:20.014188 extend-filesystems[1036]: Found vda6 Feb 12 20:25:20.014188 extend-filesystems[1036]: Found vda7 Feb 12 20:25:20.014188 extend-filesystems[1036]: Found vda9 Feb 12 20:25:20.024762 coreos-metadata[1031]: Feb 12 20:25:20.012 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Feb 12 20:25:20.015877 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 20:25:20.025468 extend-filesystems[1036]: Checking size of /dev/vda9 Feb 12 20:25:20.016103 systemd[1]: Finished motdgen.service. Feb 12 20:25:20.057988 systemd-logind[1042]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 20:25:20.058025 systemd-logind[1042]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 20:25:20.058281 systemd-logind[1042]: New seat seat0. Feb 12 20:25:20.080791 tar[1052]: ./ Feb 12 20:25:20.080791 tar[1052]: ./macvlan Feb 12 20:25:20.082912 tar[1053]: crictl Feb 12 20:25:20.108069 extend-filesystems[1036]: Resized partition /dev/vda9 Feb 12 20:25:20.116608 extend-filesystems[1089]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 20:25:20.125660 env[1058]: time="2024-02-12T20:25:20.125595783Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 20:25:20.160805 tar[1052]: ./static Feb 12 20:25:20.201066 tar[1052]: ./vlan Feb 12 20:25:20.204255 env[1058]: time="2024-02-12T20:25:20.203013901Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 20:25:20.204255 env[1058]: time="2024-02-12T20:25:20.203185864Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:25:20.643111 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Feb 12 20:25:20.643262 env[1058]: time="2024-02-12T20:25:20.205918929Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:25:20.643262 env[1058]: time="2024-02-12T20:25:20.205978561Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:25:20.643262 env[1058]: time="2024-02-12T20:25:20.631569798Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:25:20.643262 env[1058]: time="2024-02-12T20:25:20.631644538Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 20:25:20.643262 env[1058]: time="2024-02-12T20:25:20.631704811Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 20:25:20.643262 env[1058]: time="2024-02-12T20:25:20.631735358Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 20:25:20.643262 env[1058]: time="2024-02-12T20:25:20.632012177Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:25:20.643262 env[1058]: time="2024-02-12T20:25:20.634821316Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 20:25:20.643262 env[1058]: time="2024-02-12T20:25:20.635222588Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 20:25:20.643262 env[1058]: time="2024-02-12T20:25:20.635271741Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 20:25:20.409054 systemd[1]: Started dbus.service. Feb 12 20:25:20.408749 dbus-daemon[1032]: [system] SELinux support is enabled Feb 12 20:25:20.644543 coreos-metadata[1031]: Feb 12 20:25:20.309 INFO Fetch successful Feb 12 20:25:20.644543 coreos-metadata[1031]: Feb 12 20:25:20.309 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 12 20:25:20.644543 coreos-metadata[1031]: Feb 12 20:25:20.325 INFO Fetch successful Feb 12 20:25:20.414601 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 20:25:20.426669 dbus-daemon[1032]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 20:25:20.414651 systemd[1]: Reached target system-config.target. Feb 12 20:25:20.416569 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 20:25:20.416610 systemd[1]: Reached target user-config.target. Feb 12 20:25:20.424435 systemd[1]: Started systemd-logind.service. Feb 12 20:25:20.658808 coreos-metadata[1031]: Error: failed to run Feb 12 20:25:20.658808 coreos-metadata[1031]: Caused by: Feb 12 20:25:20.658808 coreos-metadata[1031]: 0: writing ssh keys Feb 12 20:25:20.658808 coreos-metadata[1031]: 1: failed to persist file "/home/core/.ssh/authorized_keys.d/afterburn" Feb 12 20:25:20.658808 coreos-metadata[1031]: 2: No such file or directory (os error 2) Feb 12 20:25:20.710944 env[1058]: time="2024-02-12T20:25:20.645446173Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 20:25:20.710944 env[1058]: time="2024-02-12T20:25:20.645491067Z" level=info msg="metadata content store policy set" policy=shared Feb 12 20:25:20.516021 systemd[1]: Created slice system-sshd.slice. Feb 12 20:25:20.651161 systemd[1]: coreos-metadata-sshkeys@core.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:25:20.651466 systemd[1]: coreos-metadata-sshkeys@core.service: Failed with result 'exit-code'. Feb 12 20:25:20.652540 systemd[1]: Failed to start coreos-metadata-sshkeys@core.service. Feb 12 20:25:20.655341 systemd[1]: Dependency failed for multi-user.target. Feb 12 20:25:20.656486 systemd[1]: multi-user.target: Job multi-user.target/start failed with result 'dependency'. Feb 12 20:25:20.669274 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 20:25:20.687513 systemd-update-utmp[1093]: Failed to get new runlevel, utmp update skipped. Feb 12 20:25:20.690075 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 20:25:20.691542 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 20:25:20.732799 tar[1052]: ./portmap Feb 12 20:25:20.769090 tar[1052]: ./host-local Feb 12 20:25:20.800311 tar[1052]: ./vrf Feb 12 20:25:20.871477 update_engine[1047]: I0212 20:25:20.859723 1047 main.cc:92] Flatcar Update Engine starting Feb 12 20:25:20.904188 systemd[1]: Started update-engine.service. Feb 12 20:25:21.112231 update_engine[1047]: I0212 20:25:20.913901 1047 update_check_scheduler.cc:74] Next update check in 2m57s Feb 12 20:25:20.914863 systemd[1]: Started locksmithd.service. Feb 12 20:25:21.124262 bash[1076]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:25:21.123249 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 20:25:21.134591 tar[1052]: ./bridge Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.136003433Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.136054018Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.136076510Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.136151470Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.136730196Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.136757797Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.136775451Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.136799225Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.136821647Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.136841444Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.136859248Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.136876290Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.137045247Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 20:25:21.137400 env[1058]: time="2024-02-12T20:25:21.137151145Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 20:25:21.138060 env[1058]: time="2024-02-12T20:25:21.137589337Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 20:25:21.138060 env[1058]: time="2024-02-12T20:25:21.137659348Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 20:25:21.138060 env[1058]: time="2024-02-12T20:25:21.137677723Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 20:25:21.138060 env[1058]: time="2024-02-12T20:25:21.137738447Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 20:25:21.138060 env[1058]: time="2024-02-12T20:25:21.137756961Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 20:25:21.138060 env[1058]: time="2024-02-12T20:25:21.137774454Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 20:25:21.138060 env[1058]: time="2024-02-12T20:25:21.137790444Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 20:25:21.138060 env[1058]: time="2024-02-12T20:25:21.137805793Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 20:25:21.138060 env[1058]: time="2024-02-12T20:25:21.137820110Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 20:25:21.138060 env[1058]: time="2024-02-12T20:25:21.137832924Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 20:25:21.138060 env[1058]: time="2024-02-12T20:25:21.137846820Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 20:25:21.138060 env[1058]: time="2024-02-12T20:25:21.137863311Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 20:25:21.138370 env[1058]: time="2024-02-12T20:25:21.138103441Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 20:25:21.138370 env[1058]: time="2024-02-12T20:25:21.138123419Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 20:25:21.138370 env[1058]: time="2024-02-12T20:25:21.138138908Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 20:25:21.138370 env[1058]: time="2024-02-12T20:25:21.138154427Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 20:25:21.138370 env[1058]: time="2024-02-12T20:25:21.138180736Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 20:25:21.138370 env[1058]: time="2024-02-12T20:25:21.138202126Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 20:25:21.138370 env[1058]: time="2024-02-12T20:25:21.138229087Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 20:25:21.138370 env[1058]: time="2024-02-12T20:25:21.138273039Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 20:25:21.141721 env[1058]: time="2024-02-12T20:25:21.140918210Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 20:25:21.141721 env[1058]: time="2024-02-12T20:25:21.141039638Z" level=info msg="Connect containerd service" Feb 12 20:25:21.141721 env[1058]: time="2024-02-12T20:25:21.141084101Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 20:25:21.240816 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Feb 12 20:25:21.245718 env[1058]: time="2024-02-12T20:25:21.240903473Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:25:21.245718 env[1058]: time="2024-02-12T20:25:21.241490213Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 20:25:21.245718 env[1058]: time="2024-02-12T20:25:21.241544956Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 20:25:21.245718 env[1058]: time="2024-02-12T20:25:21.241611010Z" level=info msg="containerd successfully booted in 1.119340s" Feb 12 20:25:21.245718 env[1058]: time="2024-02-12T20:25:21.242508653Z" level=info msg="Start subscribing containerd event" Feb 12 20:25:21.245718 env[1058]: time="2024-02-12T20:25:21.245504953Z" level=info msg="Start recovering state" Feb 12 20:25:21.241775 systemd[1]: Started containerd.service. Feb 12 20:25:21.254300 env[1058]: time="2024-02-12T20:25:21.246381066Z" level=info msg="Start event monitor" Feb 12 20:25:21.254300 env[1058]: time="2024-02-12T20:25:21.246430759Z" level=info msg="Start snapshots syncer" Feb 12 20:25:21.254300 env[1058]: time="2024-02-12T20:25:21.246446328Z" level=info msg="Start cni network conf syncer for default" Feb 12 20:25:21.254300 env[1058]: time="2024-02-12T20:25:21.246462789Z" level=info msg="Start streaming server" Feb 12 20:25:21.250612 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 20:25:21.254718 extend-filesystems[1089]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 20:25:21.254718 extend-filesystems[1089]: old_desc_blocks = 1, new_desc_blocks = 3 Feb 12 20:25:21.254718 extend-filesystems[1089]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Feb 12 20:25:21.250971 systemd[1]: Finished extend-filesystems.service. Feb 12 20:25:21.271621 extend-filesystems[1036]: Resized filesystem in /dev/vda9 Feb 12 20:25:21.336788 tar[1052]: ./tuning Feb 12 20:25:21.378447 tar[1052]: ./firewall Feb 12 20:25:21.456844 tar[1052]: ./host-device Feb 12 20:25:21.522641 tar[1052]: ./sbr Feb 12 20:25:21.556520 tar[1052]: ./loopback Feb 12 20:25:21.615022 tar[1052]: ./dhcp Feb 12 20:25:21.656112 locksmithd[1094]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 20:25:21.722212 tar[1052]: ./ptp Feb 12 20:25:21.761912 tar[1052]: ./ipvlan Feb 12 20:25:21.769146 systemd[1]: Finished prepare-critools.service. Feb 12 20:25:21.805573 tar[1052]: ./bandwidth Feb 12 20:25:21.890460 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 20:25:22.316299 sshd_keygen[1051]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 20:25:22.353368 systemd[1]: Finished sshd-keygen.service. Feb 12 20:25:22.357438 systemd[1]: Starting issuegen.service... Feb 12 20:25:22.360861 systemd[1]: Started sshd@0-172.24.4.150:22-172.24.4.1:58368.service. Feb 12 20:25:22.366466 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 20:25:22.366783 systemd[1]: Finished issuegen.service. Feb 12 20:25:22.371543 systemd[1]: Starting systemd-user-sessions.service... Feb 12 20:25:22.383336 systemd[1]: Finished systemd-user-sessions.service. Feb 12 20:25:22.385601 systemd[1]: Started getty@tty1.service. Feb 12 20:25:22.387333 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 20:25:22.388245 systemd[1]: Reached target getty.target. Feb 12 20:25:22.388759 systemd[1]: Startup finished in 988ms (kernel) + 11.074s (initrd) + 10.058s (userspace) = 22.121s. Feb 12 20:25:23.341617 sshd[1114]: Accepted publickey for core from 172.24.4.1 port 58368 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:25:23.358539 sshd[1114]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:23.448681 systemd[1]: Created slice user-500.slice. Feb 12 20:25:23.451598 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 20:25:23.456769 systemd-logind[1042]: New session 1 of user core. Feb 12 20:25:23.484492 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 20:25:23.490595 systemd[1]: Starting user@500.service... Feb 12 20:25:23.516885 (systemd)[1122]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:23.961472 systemd[1122]: Queued start job for default target default.target. Feb 12 20:25:23.962792 systemd[1122]: Reached target paths.target. Feb 12 20:25:23.962852 systemd[1122]: Reached target sockets.target. Feb 12 20:25:23.962888 systemd[1122]: Reached target timers.target. Feb 12 20:25:23.962921 systemd[1122]: Reached target basic.target. Feb 12 20:25:23.963266 systemd[1]: Started user@500.service. Feb 12 20:25:23.965341 systemd[1122]: Reached target default.target. Feb 12 20:25:23.965456 systemd[1122]: Startup finished in 435ms. Feb 12 20:25:23.966426 systemd[1]: Started session-1.scope. Feb 12 20:25:24.471563 systemd[1]: Started sshd@1-172.24.4.150:22-172.24.4.1:58382.service. Feb 12 20:25:26.194777 sshd[1131]: Accepted publickey for core from 172.24.4.1 port 58382 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:25:26.197802 sshd[1131]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:26.209058 systemd-logind[1042]: New session 2 of user core. Feb 12 20:25:26.211756 systemd[1]: Started session-2.scope. Feb 12 20:25:26.808610 sshd[1131]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:26.813692 systemd[1]: Started sshd@2-172.24.4.150:22-172.24.4.1:36352.service. Feb 12 20:25:26.817505 systemd[1]: sshd@1-172.24.4.150:22-172.24.4.1:58382.service: Deactivated successfully. Feb 12 20:25:26.818907 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 20:25:26.821708 systemd-logind[1042]: Session 2 logged out. Waiting for processes to exit. Feb 12 20:25:26.824564 systemd-logind[1042]: Removed session 2. Feb 12 20:25:28.256098 sshd[1136]: Accepted publickey for core from 172.24.4.1 port 36352 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:25:28.259600 sshd[1136]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:28.270364 systemd-logind[1042]: New session 3 of user core. Feb 12 20:25:28.271241 systemd[1]: Started session-3.scope. Feb 12 20:25:28.908686 sshd[1136]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:28.914496 systemd[1]: Started sshd@3-172.24.4.150:22-172.24.4.1:36356.service. Feb 12 20:25:28.922381 systemd[1]: sshd@2-172.24.4.150:22-172.24.4.1:36352.service: Deactivated successfully. Feb 12 20:25:28.924512 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 20:25:28.927803 systemd-logind[1042]: Session 3 logged out. Waiting for processes to exit. Feb 12 20:25:28.930811 systemd-logind[1042]: Removed session 3. Feb 12 20:25:30.134625 sshd[1142]: Accepted publickey for core from 172.24.4.1 port 36356 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:25:30.138152 sshd[1142]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:30.148634 systemd[1]: Started session-4.scope. Feb 12 20:25:30.150494 systemd-logind[1042]: New session 4 of user core. Feb 12 20:25:30.768709 sshd[1142]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:30.772679 systemd[1]: coreos-metadata-sshkeys@core.service: Scheduled restart job, restart counter is at 1. Feb 12 20:25:30.773093 systemd[1]: Stopped coreos-metadata-sshkeys@core.service. Feb 12 20:25:30.776083 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 20:25:30.779023 systemd[1]: Started sshd@4-172.24.4.150:22-172.24.4.1:36370.service. Feb 12 20:25:30.780693 systemd[1]: sshd@3-172.24.4.150:22-172.24.4.1:36356.service: Deactivated successfully. Feb 12 20:25:30.786477 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 20:25:30.789453 systemd-logind[1042]: Session 4 logged out. Waiting for processes to exit. Feb 12 20:25:30.791558 systemd-logind[1042]: Removed session 4. Feb 12 20:25:30.866271 coreos-metadata[1148]: Feb 12 20:25:30.866 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Feb 12 20:25:30.888813 coreos-metadata[1148]: Feb 12 20:25:30.888 INFO Fetch successful Feb 12 20:25:30.889022 coreos-metadata[1148]: Feb 12 20:25:30.888 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Feb 12 20:25:30.902671 coreos-metadata[1148]: Feb 12 20:25:30.902 INFO Fetch successful Feb 12 20:25:31.091769 unknown[1148]: wrote ssh authorized keys file for user: core Feb 12 20:25:31.145147 update-ssh-keys[1154]: Updated "/home/core/.ssh/authorized_keys" Feb 12 20:25:31.146921 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 20:25:32.199701 sshd[1149]: Accepted publickey for core from 172.24.4.1 port 36370 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:25:32.202552 sshd[1149]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:32.212752 systemd-logind[1042]: New session 5 of user core. Feb 12 20:25:32.213817 systemd[1]: Started session-5.scope. Feb 12 20:25:32.671112 sudo[1156]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 20:25:32.671612 sudo[1156]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:25:32.683218 dbus-daemon[1032]: \xd0\u000dA\xdf\xedU: received setenforce notice (enforcing=-798677824) Feb 12 20:25:32.688123 sudo[1156]: pam_unix(sudo:session): session closed for user root Feb 12 20:25:32.928635 sshd[1149]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:32.948117 systemd[1]: Started sshd@5-172.24.4.150:22-172.24.4.1:36382.service. Feb 12 20:25:32.950076 systemd[1]: sshd@4-172.24.4.150:22-172.24.4.1:36370.service: Deactivated successfully. Feb 12 20:25:32.952448 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 20:25:32.958526 systemd-logind[1042]: Session 5 logged out. Waiting for processes to exit. Feb 12 20:25:32.962669 systemd-logind[1042]: Removed session 5. Feb 12 20:25:34.386136 sshd[1159]: Accepted publickey for core from 172.24.4.1 port 36382 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:25:34.388840 sshd[1159]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:34.399343 systemd-logind[1042]: New session 6 of user core. Feb 12 20:25:34.400036 systemd[1]: Started session-6.scope. Feb 12 20:25:34.831041 sudo[1165]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 20:25:34.831465 sudo[1165]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:25:34.837868 sudo[1165]: pam_unix(sudo:session): session closed for user root Feb 12 20:25:34.848452 sudo[1164]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 20:25:34.849646 sudo[1164]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:25:34.872095 systemd[1]: Stopping audit-rules.service... Feb 12 20:25:34.872000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:25:34.875841 kernel: kauditd_printk_skb: 131 callbacks suppressed Feb 12 20:25:34.876040 kernel: audit: type=1305 audit(1707769534.872:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 20:25:34.872000 audit[1168]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc95177690 a2=420 a3=0 items=0 ppid=1 pid=1168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:34.882038 auditctl[1168]: No rules Feb 12 20:25:34.883173 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 20:25:34.883593 systemd[1]: Stopped audit-rules.service. Feb 12 20:25:34.891220 kernel: audit: type=1300 audit(1707769534.872:167): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc95177690 a2=420 a3=0 items=0 ppid=1 pid=1168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:34.892969 systemd[1]: Starting audit-rules.service... Feb 12 20:25:34.872000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:25:34.906433 kernel: audit: type=1327 audit(1707769534.872:167): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 20:25:34.906557 kernel: audit: type=1131 audit(1707769534.880:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:34.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:34.935840 augenrules[1185]: No rules Feb 12 20:25:34.937865 systemd[1]: Finished audit-rules.service. Feb 12 20:25:34.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:34.949649 kernel: audit: type=1130 audit(1707769534.937:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:34.949836 kernel: audit: type=1106 audit(1707769534.947:170): pid=1164 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:34.947000 audit[1164]: USER_END pid=1164 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:34.948028 sudo[1164]: pam_unix(sudo:session): session closed for user root Feb 12 20:25:34.947000 audit[1164]: CRED_DISP pid=1164 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:34.963721 kernel: audit: type=1104 audit(1707769534.947:171): pid=1164 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:35.126254 sshd[1159]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:35.133127 systemd[1]: sshd@5-172.24.4.150:22-172.24.4.1:36382.service: Deactivated successfully. Feb 12 20:25:35.134545 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 20:25:35.127000 audit[1159]: USER_END pid=1159 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:25:35.147044 kernel: audit: type=1106 audit(1707769535.127:172): pid=1159 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:25:35.127000 audit[1159]: CRED_DISP pid=1159 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:25:35.158075 kernel: audit: type=1104 audit(1707769535.127:173): pid=1159 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:25:35.149785 systemd-logind[1042]: Session 6 logged out. Waiting for processes to exit. Feb 12 20:25:35.151649 systemd[1]: Started sshd@6-172.24.4.150:22-172.24.4.1:38758.service. Feb 12 20:25:35.168957 kernel: audit: type=1131 audit(1707769535.132:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.150:22-172.24.4.1:36382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:35.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.150:22-172.24.4.1:36382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:35.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.150:22-172.24.4.1:38758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:35.170842 systemd-logind[1042]: Removed session 6. Feb 12 20:25:36.367000 audit[1191]: USER_ACCT pid=1191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:25:36.368987 sshd[1191]: Accepted publickey for core from 172.24.4.1 port 38758 ssh2: RSA SHA256:ssFkN0BQQLPS6axJWzE8mlMTpPrpsisU+V19L5AVtX4 Feb 12 20:25:36.369000 audit[1191]: CRED_ACQ pid=1191 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:25:36.370000 audit[1191]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffea402590 a2=3 a3=0 items=0 ppid=1 pid=1191 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:36.370000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 20:25:36.371586 sshd[1191]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 20:25:36.383417 systemd-logind[1042]: New session 7 of user core. Feb 12 20:25:36.384049 systemd[1]: Started session-7.scope. Feb 12 20:25:36.396000 audit[1191]: USER_START pid=1191 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:25:36.399000 audit[1193]: CRED_ACQ pid=1193 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:25:36.740000 audit[1194]: USER_ACCT pid=1194 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:36.742524 sudo[1194]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 20:25:36.743121 sudo[1194]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 20:25:36.741000 audit[1194]: CRED_REFR pid=1194 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:36.746000 audit[1194]: USER_START pid=1194 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:37.444399 systemd[1]: Reloading. Feb 12 20:25:37.561361 /usr/lib/systemd/system-generators/torcx-generator[1224]: time="2024-02-12T20:25:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:25:37.561395 /usr/lib/systemd/system-generators/torcx-generator[1224]: time="2024-02-12T20:25:37Z" level=info msg="torcx already run" Feb 12 20:25:37.652649 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:25:37.652672 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:25:37.686425 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:25:37.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.775000 audit: BPF prog-id=34 op=LOAD Feb 12 20:25:37.775000 audit: BPF prog-id=32 op=UNLOAD Feb 12 20:25:37.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.777000 audit: BPF prog-id=35 op=LOAD Feb 12 20:25:37.777000 audit: BPF prog-id=28 op=UNLOAD Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit: BPF prog-id=36 op=LOAD Feb 12 20:25:37.779000 audit: BPF prog-id=18 op=UNLOAD Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit: BPF prog-id=37 op=LOAD Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit: BPF prog-id=38 op=LOAD Feb 12 20:25:37.780000 audit: BPF prog-id=19 op=UNLOAD Feb 12 20:25:37.780000 audit: BPF prog-id=20 op=UNLOAD Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit: BPF prog-id=39 op=LOAD Feb 12 20:25:37.781000 audit: BPF prog-id=27 op=UNLOAD Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit: BPF prog-id=40 op=LOAD Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.781000 audit: BPF prog-id=41 op=LOAD Feb 12 20:25:37.781000 audit: BPF prog-id=21 op=UNLOAD Feb 12 20:25:37.781000 audit: BPF prog-id=22 op=UNLOAD Feb 12 20:25:37.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.784000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.784000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.785000 audit: BPF prog-id=42 op=LOAD Feb 12 20:25:37.785000 audit: BPF prog-id=23 op=UNLOAD Feb 12 20:25:37.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.785000 audit: BPF prog-id=43 op=LOAD Feb 12 20:25:37.786000 audit: BPF prog-id=24 op=UNLOAD Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit: BPF prog-id=44 op=LOAD Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.786000 audit: BPF prog-id=45 op=LOAD Feb 12 20:25:37.786000 audit: BPF prog-id=25 op=UNLOAD Feb 12 20:25:37.786000 audit: BPF prog-id=26 op=UNLOAD Feb 12 20:25:37.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.792000 audit: BPF prog-id=46 op=LOAD Feb 12 20:25:37.793000 audit: BPF prog-id=29 op=UNLOAD Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit: BPF prog-id=47 op=LOAD Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:37.793000 audit: BPF prog-id=48 op=LOAD Feb 12 20:25:37.793000 audit: BPF prog-id=30 op=UNLOAD Feb 12 20:25:37.793000 audit: BPF prog-id=31 op=UNLOAD Feb 12 20:25:37.803327 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 20:25:37.814188 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 20:25:37.814778 systemd[1]: Reached target network-online.target. Feb 12 20:25:37.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:37.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:37.816363 systemd[1]: Started kubelet.service. Feb 12 20:25:37.836720 systemd[1]: Starting coreos-metadata.service... Feb 12 20:25:37.900637 coreos-metadata[1278]: Feb 12 20:25:37.900 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Feb 12 20:25:37.901002 kubelet[1270]: E0212 20:25:37.900821 1270 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 20:25:37.903006 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 20:25:37.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 20:25:37.903161 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 20:25:38.113265 coreos-metadata[1278]: Feb 12 20:25:38.111 INFO Fetch successful Feb 12 20:25:38.114555 coreos-metadata[1278]: Feb 12 20:25:38.113 INFO Fetching http://169.254.169.254/latest/meta-data/instance-id: Attempt #1 Feb 12 20:25:38.130168 coreos-metadata[1278]: Feb 12 20:25:38.130 INFO Fetch successful Feb 12 20:25:38.131281 coreos-metadata[1278]: Feb 12 20:25:38.131 INFO Fetching http://169.254.169.254/latest/meta-data/instance-type: Attempt #1 Feb 12 20:25:38.150785 coreos-metadata[1278]: Feb 12 20:25:38.150 INFO Fetch successful Feb 12 20:25:38.150785 coreos-metadata[1278]: Feb 12 20:25:38.150 INFO Fetching http://169.254.169.254/latest/meta-data/local-ipv4: Attempt #1 Feb 12 20:25:38.166402 coreos-metadata[1278]: Feb 12 20:25:38.166 INFO Fetch successful Feb 12 20:25:38.166402 coreos-metadata[1278]: Feb 12 20:25:38.166 INFO Fetching http://169.254.169.254/latest/meta-data/public-ipv4: Attempt #1 Feb 12 20:25:38.183813 coreos-metadata[1278]: Feb 12 20:25:38.183 INFO Fetch successful Feb 12 20:25:38.202413 systemd[1]: Finished coreos-metadata.service. Feb 12 20:25:38.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:39.026645 systemd[1]: Stopped kubelet.service. Feb 12 20:25:39.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:39.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:39.066280 systemd[1]: Reloading. Feb 12 20:25:39.215782 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-12T20:25:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 20:25:39.216222 /usr/lib/systemd/system-generators/torcx-generator[1333]: time="2024-02-12T20:25:39Z" level=info msg="torcx already run" Feb 12 20:25:39.315282 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 20:25:39.315308 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 20:25:39.341702 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 20:25:39.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.428000 audit: BPF prog-id=49 op=LOAD Feb 12 20:25:39.428000 audit: BPF prog-id=34 op=UNLOAD Feb 12 20:25:39.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.429000 audit: BPF prog-id=50 op=LOAD Feb 12 20:25:39.429000 audit: BPF prog-id=35 op=UNLOAD Feb 12 20:25:39.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.430000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit: BPF prog-id=51 op=LOAD Feb 12 20:25:39.431000 audit: BPF prog-id=36 op=UNLOAD Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit: BPF prog-id=52 op=LOAD Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.431000 audit: BPF prog-id=53 op=LOAD Feb 12 20:25:39.431000 audit: BPF prog-id=37 op=UNLOAD Feb 12 20:25:39.431000 audit: BPF prog-id=38 op=UNLOAD Feb 12 20:25:39.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.432000 audit: BPF prog-id=54 op=LOAD Feb 12 20:25:39.432000 audit: BPF prog-id=39 op=UNLOAD Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit: BPF prog-id=55 op=LOAD Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.433000 audit: BPF prog-id=56 op=LOAD Feb 12 20:25:39.433000 audit: BPF prog-id=40 op=UNLOAD Feb 12 20:25:39.433000 audit: BPF prog-id=41 op=UNLOAD Feb 12 20:25:39.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.436000 audit: BPF prog-id=57 op=LOAD Feb 12 20:25:39.436000 audit: BPF prog-id=42 op=UNLOAD Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit: BPF prog-id=58 op=LOAD Feb 12 20:25:39.437000 audit: BPF prog-id=43 op=UNLOAD Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit: BPF prog-id=59 op=LOAD Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.437000 audit: BPF prog-id=60 op=LOAD Feb 12 20:25:39.438000 audit: BPF prog-id=44 op=UNLOAD Feb 12 20:25:39.438000 audit: BPF prog-id=45 op=UNLOAD Feb 12 20:25:39.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit: BPF prog-id=61 op=LOAD Feb 12 20:25:39.441000 audit: BPF prog-id=46 op=UNLOAD Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit: BPF prog-id=62 op=LOAD Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:39.441000 audit: BPF prog-id=63 op=LOAD Feb 12 20:25:39.441000 audit: BPF prog-id=47 op=UNLOAD Feb 12 20:25:39.441000 audit: BPF prog-id=48 op=UNLOAD Feb 12 20:25:39.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:39.473588 systemd[1]: Started kubelet.service. Feb 12 20:25:39.561985 kubelet[1380]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:25:39.561985 kubelet[1380]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:25:39.563521 kubelet[1380]: I0212 20:25:39.561990 1380 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 20:25:39.563521 kubelet[1380]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 20:25:39.563521 kubelet[1380]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 20:25:40.646479 kubelet[1380]: I0212 20:25:40.646398 1380 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 20:25:40.649060 kubelet[1380]: I0212 20:25:40.648024 1380 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 20:25:40.649060 kubelet[1380]: I0212 20:25:40.648430 1380 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 20:25:40.651226 kubelet[1380]: I0212 20:25:40.651183 1380 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 20:25:40.660687 kubelet[1380]: I0212 20:25:40.660636 1380 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 20:25:40.661538 kubelet[1380]: I0212 20:25:40.661506 1380 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 20:25:40.661838 kubelet[1380]: I0212 20:25:40.661809 1380 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 20:25:40.662217 kubelet[1380]: I0212 20:25:40.662187 1380 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 20:25:40.662385 kubelet[1380]: I0212 20:25:40.662363 1380 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 20:25:40.662744 kubelet[1380]: I0212 20:25:40.662715 1380 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:25:40.669150 kubelet[1380]: I0212 20:25:40.669081 1380 kubelet.go:398] "Attempting to sync node with API server" Feb 12 20:25:40.669150 kubelet[1380]: I0212 20:25:40.669115 1380 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 20:25:40.669150 kubelet[1380]: I0212 20:25:40.669141 1380 kubelet.go:297] "Adding apiserver pod source" Feb 12 20:25:40.669150 kubelet[1380]: I0212 20:25:40.669157 1380 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 20:25:40.670682 kubelet[1380]: E0212 20:25:40.670582 1380 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:40.670682 kubelet[1380]: E0212 20:25:40.670644 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:40.672821 kubelet[1380]: I0212 20:25:40.672783 1380 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 20:25:40.673269 kubelet[1380]: W0212 20:25:40.673228 1380 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 20:25:40.673822 kubelet[1380]: I0212 20:25:40.673784 1380 server.go:1186] "Started kubelet" Feb 12 20:25:40.680000 audit[1380]: AVC avc: denied { mac_admin } for pid=1380 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:40.682750 kubelet[1380]: I0212 20:25:40.681261 1380 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 20:25:40.682750 kubelet[1380]: I0212 20:25:40.681349 1380 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 20:25:40.682750 kubelet[1380]: I0212 20:25:40.681443 1380 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 20:25:40.684069 kernel: kauditd_printk_skb: 362 callbacks suppressed Feb 12 20:25:40.684171 kernel: audit: type=1400 audit(1707769540.680:535): avc: denied { mac_admin } for pid=1380 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:40.697538 kernel: audit: type=1401 audit(1707769540.680:535): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:25:40.680000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:25:40.697822 kubelet[1380]: I0212 20:25:40.694848 1380 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 20:25:40.697822 kubelet[1380]: I0212 20:25:40.695257 1380 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 20:25:40.698397 kubelet[1380]: I0212 20:25:40.698273 1380 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 20:25:40.698622 kubelet[1380]: E0212 20:25:40.698586 1380 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 20:25:40.698799 kubelet[1380]: E0212 20:25:40.698775 1380 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 20:25:40.699224 kubelet[1380]: I0212 20:25:40.699190 1380 server.go:451] "Adding debug handlers to kubelet server" Feb 12 20:25:40.680000 audit[1380]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bfcd80 a1=c000b131b8 a2=c000bfcd50 a3=25 items=0 ppid=1 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.713913 kubelet[1380]: W0212 20:25:40.706424 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:40.713913 kubelet[1380]: E0212 20:25:40.706460 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:40.713913 kubelet[1380]: W0212 20:25:40.709674 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.24.4.150" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:40.713913 kubelet[1380]: E0212 20:25:40.709705 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.150" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:40.713913 kubelet[1380]: W0212 20:25:40.709744 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:40.713913 kubelet[1380]: E0212 20:25:40.709756 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:40.714422 kernel: audit: type=1300 audit(1707769540.680:535): arch=c000003e syscall=188 success=no exit=-22 a0=c000bfcd80 a1=c000b131b8 a2=c000bfcd50 a3=25 items=0 ppid=1 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.680000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:25:40.724816 kubelet[1380]: E0212 20:25:40.719369 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b337595e175a2c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 673755692, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 673755692, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:40.724816 kubelet[1380]: E0212 20:25:40.719699 1380 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "172.24.4.150" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 20:25:40.725124 kernel: audit: type=1327 audit(1707769540.680:535): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:25:40.680000 audit[1380]: AVC avc: denied { mac_admin } for pid=1380 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:40.727641 kubelet[1380]: E0212 20:25:40.726819 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b337595f949dd0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 698742224, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 698742224, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:40.730969 kernel: audit: type=1400 audit(1707769540.680:536): avc: denied { mac_admin } for pid=1380 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:40.680000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:25:40.680000 audit[1380]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bce760 a1=c000b131d0 a2=c000bfce10 a3=25 items=0 ppid=1 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.739194 kernel: audit: type=1401 audit(1707769540.680:536): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:25:40.739303 kernel: audit: type=1300 audit(1707769540.680:536): arch=c000003e syscall=188 success=no exit=-22 a0=c000bce760 a1=c000b131d0 a2=c000bfce10 a3=25 items=0 ppid=1 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.739769 kubelet[1380]: E0212 20:25:40.739676 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab3b4d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.150 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733778765, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733778765, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:40.740836 kubelet[1380]: I0212 20:25:40.740808 1380 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 20:25:40.740836 kubelet[1380]: I0212 20:25:40.740829 1380 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 20:25:40.740943 kubelet[1380]: I0212 20:25:40.740855 1380 state_mem.go:36] "Initialized new in-memory state store" Feb 12 20:25:40.680000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:25:40.741331 kubelet[1380]: E0212 20:25:40.741180 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab50a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.150 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733784226, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733784226, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:40.746965 kernel: audit: type=1327 audit(1707769540.680:536): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:25:40.752306 kubelet[1380]: E0212 20:25:40.746911 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab5be7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.150 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733787111, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733787111, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:40.757315 kubelet[1380]: I0212 20:25:40.757171 1380 policy_none.go:49] "None policy: Start" Feb 12 20:25:40.763255 kubelet[1380]: I0212 20:25:40.763236 1380 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 20:25:40.763486 kubelet[1380]: I0212 20:25:40.763477 1380 state_mem.go:35] "Initializing new in-memory state store" Feb 12 20:25:40.773893 systemd[1]: Created slice kubepods.slice. Feb 12 20:25:40.778000 audit[1395]: NETFILTER_CFG table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.779821 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 20:25:40.778000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffcf0ac130 a2=0 a3=7fffcf0ac11c items=0 ppid=1380 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.785721 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 20:25:40.787329 kernel: audit: type=1325 audit(1707769540.778:537): table=mangle:2 family=2 entries=2 op=nft_register_chain pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.787417 kernel: audit: type=1300 audit(1707769540.778:537): arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffcf0ac130 a2=0 a3=7fffcf0ac11c items=0 ppid=1380 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.778000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:25:40.789000 audit[1398]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.789000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff882b3900 a2=0 a3=7fff882b38ec items=0 ppid=1380 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:25:40.793884 kubelet[1380]: I0212 20:25:40.793840 1380 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 20:25:40.792000 audit[1380]: AVC avc: denied { mac_admin } for pid=1380 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:25:40.792000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 20:25:40.792000 audit[1380]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fa6de0 a1=c000f99ad0 a2=c000fa6db0 a3=25 items=0 ppid=1 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.792000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 20:25:40.795351 kubelet[1380]: I0212 20:25:40.794302 1380 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 20:25:40.795351 kubelet[1380]: I0212 20:25:40.794561 1380 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 20:25:40.797110 kubelet[1380]: E0212 20:25:40.796612 1380 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.150\" not found" Feb 12 20:25:40.797846 kubelet[1380]: E0212 20:25:40.797747 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b33759655adea6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 795621030, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 795621030, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:40.798011 kubelet[1380]: I0212 20:25:40.797958 1380 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.150" Feb 12 20:25:40.800834 kubelet[1380]: E0212 20:25:40.800800 1380 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.150" Feb 12 20:25:40.800910 kubelet[1380]: E0212 20:25:40.800725 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab3b4d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.150 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733778765, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 797902249, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab3b4d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:40.802028 kubelet[1380]: E0212 20:25:40.801965 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab50a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.150 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733784226, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 797907148, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab50a2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:40.803229 kubelet[1380]: E0212 20:25:40.803122 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab5be7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.150 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733787111, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 797910374, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab5be7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:40.796000 audit[1400]: NETFILTER_CFG table=filter:4 family=2 entries=2 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.796000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd6385d680 a2=0 a3=7ffd6385d66c items=0 ppid=1380 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:25:40.815000 audit[1405]: NETFILTER_CFG table=filter:5 family=2 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.815000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdc5990ee0 a2=0 a3=7ffdc5990ecc items=0 ppid=1380 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.815000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 20:25:40.870000 audit[1410]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.870000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffca15d2510 a2=0 a3=7ffca15d24fc items=0 ppid=1380 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.870000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 20:25:40.872000 audit[1411]: NETFILTER_CFG table=nat:7 family=2 entries=2 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.872000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd716c0800 a2=0 a3=7ffd716c07ec items=0 ppid=1380 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 20:25:40.881000 audit[1414]: NETFILTER_CFG table=nat:8 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.881000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffd5805310 a2=0 a3=7fffd58052fc items=0 ppid=1380 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 20:25:40.890000 audit[1417]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.890000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7fff39e57310 a2=0 a3=7fff39e572fc items=0 ppid=1380 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 20:25:40.892000 audit[1418]: NETFILTER_CFG table=nat:10 family=2 entries=1 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.892000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff8fd85610 a2=0 a3=7fff8fd855fc items=0 ppid=1380 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 20:25:40.894000 audit[1419]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.894000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd763c3b80 a2=0 a3=7ffd763c3b6c items=0 ppid=1380 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:25:40.899000 audit[1421]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.899000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffda1ae3de0 a2=0 a3=7ffda1ae3dcc items=0 ppid=1380 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 20:25:40.921947 kubelet[1380]: E0212 20:25:40.921879 1380 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "172.24.4.150" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 20:25:40.906000 audit[1423]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.906000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffef7735430 a2=0 a3=7ffef773541c items=0 ppid=1380 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:25:40.936000 audit[1426]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.936000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7ffe3ddcbbf0 a2=0 a3=7ffe3ddcbbdc items=0 ppid=1380 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.936000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 20:25:40.939000 audit[1428]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.939000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffddfe91530 a2=0 a3=7ffddfe9151c items=0 ppid=1380 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.939000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 20:25:40.949000 audit[1431]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.949000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=540 a0=3 a1=7fff313cd510 a2=0 a3=7fff313cd4fc items=0 ppid=1380 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.949000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 20:25:40.950840 kubelet[1380]: I0212 20:25:40.950800 1380 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 20:25:40.950000 audit[1432]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.950000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8a167e10 a2=0 a3=7ffd8a167dfc items=0 ppid=1380 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:25:40.952000 audit[1434]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.952000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2c14dc80 a2=0 a3=7fff2c14dc6c items=0 ppid=1380 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:25:40.952000 audit[1433]: NETFILTER_CFG table=mangle:19 family=10 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.952000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc1f810810 a2=0 a3=7ffc1f8107fc items=0 ppid=1380 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 20:25:40.953000 audit[1435]: NETFILTER_CFG table=nat:20 family=10 entries=2 op=nft_register_chain pid=1435 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.953000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe7ab71d30 a2=0 a3=7ffe7ab71d1c items=0 ppid=1380 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.953000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 20:25:40.955000 audit[1436]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:25:40.955000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd74280120 a2=0 a3=7ffd7428010c items=0 ppid=1380 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:25:40.956000 audit[1438]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.956000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffe68d2e7e0 a2=0 a3=7ffe68d2e7cc items=0 ppid=1380 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 20:25:40.958000 audit[1439]: NETFILTER_CFG table=filter:23 family=10 entries=2 op=nft_register_chain pid=1439 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.958000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7ffdae81ea00 a2=0 a3=7ffdae81e9ec items=0 ppid=1380 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.958000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 20:25:40.960000 audit[1441]: NETFILTER_CFG table=filter:24 family=10 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.960000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=664 a0=3 a1=7ffca9584ad0 a2=0 a3=7ffca9584abc items=0 ppid=1380 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.960000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 20:25:40.962000 audit[1442]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_chain pid=1442 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.962000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd19371890 a2=0 a3=7ffd1937187c items=0 ppid=1380 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.962000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 20:25:40.963000 audit[1443]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_chain pid=1443 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.963000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc70295a60 a2=0 a3=7ffc70295a4c items=0 ppid=1380 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.963000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 20:25:40.965000 audit[1445]: NETFILTER_CFG table=nat:27 family=10 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.965000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff94c1b990 a2=0 a3=7fff94c1b97c items=0 ppid=1380 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.965000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 20:25:40.967000 audit[1447]: NETFILTER_CFG table=nat:28 family=10 entries=2 op=nft_register_chain pid=1447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.967000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd0fa794f0 a2=0 a3=7ffd0fa794dc items=0 ppid=1380 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 20:25:40.972000 audit[1449]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.972000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=364 a0=3 a1=7fff85c90720 a2=0 a3=7fff85c9070c items=0 ppid=1380 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.972000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 20:25:40.976000 audit[1451]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.976000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=220 a0=3 a1=7ffc71f94360 a2=0 a3=7ffc71f9434c items=0 ppid=1380 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 20:25:40.980000 audit[1453]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.980000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=556 a0=3 a1=7ffd3f78ced0 a2=0 a3=7ffd3f78cebc items=0 ppid=1380 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 20:25:40.982143 kubelet[1380]: I0212 20:25:40.982114 1380 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 20:25:40.982213 kubelet[1380]: I0212 20:25:40.982165 1380 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 20:25:40.982213 kubelet[1380]: I0212 20:25:40.982201 1380 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 20:25:40.982276 kubelet[1380]: E0212 20:25:40.982267 1380 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 20:25:40.982000 audit[1454]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1454 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.982000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0a312bb0 a2=0 a3=7ffe0a312b9c items=0 ppid=1380 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.982000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 20:25:40.985395 kubelet[1380]: W0212 20:25:40.985361 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:40.985490 kubelet[1380]: E0212 20:25:40.985399 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:40.984000 audit[1455]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_chain pid=1455 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.984000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1f26e750 a2=0 a3=7ffe1f26e73c items=0 ppid=1380 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 20:25:40.986000 audit[1456]: NETFILTER_CFG table=filter:34 family=10 entries=1 op=nft_register_chain pid=1456 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:25:40.986000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda4dfdbc0 a2=0 a3=7ffda4dfdbac items=0 ppid=1380 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:25:40.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 20:25:41.001854 kubelet[1380]: I0212 20:25:41.001824 1380 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.150" Feb 12 20:25:41.004318 kubelet[1380]: E0212 20:25:41.004205 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab3b4d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.150 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733778765, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 41, 1755946, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab3b4d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:41.004618 kubelet[1380]: E0212 20:25:41.004598 1380 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.150" Feb 12 20:25:41.005501 kubelet[1380]: E0212 20:25:41.005420 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab50a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.150 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733784226, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 41, 1762499, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab50a2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:41.080772 kubelet[1380]: E0212 20:25:41.080617 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab5be7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.150 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733787111, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 41, 1765404, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab5be7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:41.324319 kubelet[1380]: E0212 20:25:41.324263 1380 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "172.24.4.150" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 20:25:41.406649 kubelet[1380]: I0212 20:25:41.406567 1380 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.150" Feb 12 20:25:41.408668 kubelet[1380]: E0212 20:25:41.408612 1380 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.150" Feb 12 20:25:41.408996 kubelet[1380]: E0212 20:25:41.408617 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab3b4d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.150 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733778765, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 41, 406474827, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab3b4d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:41.481418 kubelet[1380]: E0212 20:25:41.481267 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab50a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.150 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733784226, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 41, 406484635, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab50a2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:41.577964 kubelet[1380]: W0212 20:25:41.577741 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.24.4.150" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:41.578361 kubelet[1380]: E0212 20:25:41.578334 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.150" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:41.671600 kubelet[1380]: E0212 20:25:41.671532 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:41.682202 kubelet[1380]: E0212 20:25:41.681985 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab5be7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.150 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733787111, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 41, 406490085, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab5be7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:41.737663 kubelet[1380]: W0212 20:25:41.737588 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:41.737663 kubelet[1380]: E0212 20:25:41.737651 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:41.906813 kubelet[1380]: W0212 20:25:41.906598 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:41.906813 kubelet[1380]: E0212 20:25:41.906671 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:42.126327 kubelet[1380]: E0212 20:25:42.126243 1380 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "172.24.4.150" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 20:25:42.211063 kubelet[1380]: I0212 20:25:42.210900 1380 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.150" Feb 12 20:25:42.212752 kubelet[1380]: E0212 20:25:42.212714 1380 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.150" Feb 12 20:25:42.213270 kubelet[1380]: E0212 20:25:42.213146 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab3b4d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.150 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733778765, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 42, 210810147, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab3b4d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:42.214634 kubelet[1380]: E0212 20:25:42.214535 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab50a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.150 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733784226, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 42, 210842919, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab50a2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:42.282241 kubelet[1380]: E0212 20:25:42.282060 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab5be7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.150 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733787111, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 42, 210849110, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab5be7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:42.298046 kubelet[1380]: W0212 20:25:42.298004 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:42.298285 kubelet[1380]: E0212 20:25:42.298263 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:42.672493 kubelet[1380]: E0212 20:25:42.672402 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:43.223417 kubelet[1380]: W0212 20:25:43.223313 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.24.4.150" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:43.223417 kubelet[1380]: E0212 20:25:43.223360 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.150" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:43.578479 kubelet[1380]: W0212 20:25:43.578427 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:43.578833 kubelet[1380]: E0212 20:25:43.578810 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:43.673575 kubelet[1380]: E0212 20:25:43.673484 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:43.728689 kubelet[1380]: E0212 20:25:43.728618 1380 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "172.24.4.150" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 20:25:43.814871 kubelet[1380]: I0212 20:25:43.814790 1380 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.150" Feb 12 20:25:43.819168 kubelet[1380]: E0212 20:25:43.819112 1380 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.150" Feb 12 20:25:43.819654 kubelet[1380]: E0212 20:25:43.819459 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab3b4d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.150 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733778765, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 43, 814716924, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab3b4d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:43.822005 kubelet[1380]: E0212 20:25:43.821837 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab50a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.150 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733784226, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 43, 814726873, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab50a2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:43.824639 kubelet[1380]: E0212 20:25:43.824486 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab5be7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.150 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733787111, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 43, 814733265, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab5be7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:44.670692 kubelet[1380]: W0212 20:25:44.670644 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:44.671064 kubelet[1380]: E0212 20:25:44.671038 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:44.673801 kubelet[1380]: E0212 20:25:44.673742 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:44.917033 kubelet[1380]: W0212 20:25:44.916986 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:44.917374 kubelet[1380]: E0212 20:25:44.917350 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 20:25:45.674505 kubelet[1380]: E0212 20:25:45.674423 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:46.674882 kubelet[1380]: E0212 20:25:46.674796 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:46.930811 kubelet[1380]: E0212 20:25:46.930597 1380 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "172.24.4.150" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 20:25:47.021743 kubelet[1380]: I0212 20:25:47.021694 1380 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.150" Feb 12 20:25:47.023986 kubelet[1380]: E0212 20:25:47.023870 1380 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="172.24.4.150" Feb 12 20:25:47.024539 kubelet[1380]: E0212 20:25:47.024403 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab3b4d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 172.24.4.150 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733778765, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 47, 21030494, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab3b4d" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:47.031606 kubelet[1380]: E0212 20:25:47.031398 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab50a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 172.24.4.150 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733784226, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 47, 21629909, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab50a2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:47.034182 kubelet[1380]: E0212 20:25:47.034048 1380 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150.17b3375961ab5be7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"172.24.4.150", UID:"172.24.4.150", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 172.24.4.150 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"172.24.4.150"}, FirstTimestamp:time.Date(2024, time.February, 12, 20, 25, 40, 733787111, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 20, 25, 47, 21637232, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "172.24.4.150.17b3375961ab5be7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 20:25:47.675393 kubelet[1380]: E0212 20:25:47.675318 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:48.217400 kubelet[1380]: W0212 20:25:48.217253 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "172.24.4.150" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:48.217400 kubelet[1380]: E0212 20:25:48.217327 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "172.24.4.150" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 20:25:48.675851 kubelet[1380]: E0212 20:25:48.675683 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:48.725308 kubelet[1380]: W0212 20:25:48.725217 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:48.725308 kubelet[1380]: E0212 20:25:48.725290 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 20:25:49.665211 kubelet[1380]: W0212 20:25:49.665059 1380 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:49.665211 kubelet[1380]: E0212 20:25:49.665198 1380 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 20:25:49.676304 kubelet[1380]: E0212 20:25:49.676231 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:50.650724 kubelet[1380]: I0212 20:25:50.650660 1380 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 20:25:50.676984 kubelet[1380]: E0212 20:25:50.676872 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:50.797720 kubelet[1380]: E0212 20:25:50.797082 1380 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"172.24.4.150\" not found" Feb 12 20:25:51.095586 kubelet[1380]: E0212 20:25:51.095539 1380 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.24.4.150" not found Feb 12 20:25:51.678280 kubelet[1380]: E0212 20:25:51.678183 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:52.272856 kubelet[1380]: E0212 20:25:52.272803 1380 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "172.24.4.150" not found Feb 12 20:25:52.679433 kubelet[1380]: E0212 20:25:52.678970 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:53.342977 kubelet[1380]: E0212 20:25:53.342852 1380 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"172.24.4.150\" not found" node="172.24.4.150" Feb 12 20:25:53.426406 kubelet[1380]: I0212 20:25:53.426359 1380 kubelet_node_status.go:70] "Attempting to register node" node="172.24.4.150" Feb 12 20:25:53.679502 kubelet[1380]: I0212 20:25:53.678509 1380 kubelet_node_status.go:73] "Successfully registered node" node="172.24.4.150" Feb 12 20:25:53.681312 kubelet[1380]: E0212 20:25:53.679298 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:53.701569 kubelet[1380]: E0212 20:25:53.701511 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:53.802252 kubelet[1380]: E0212 20:25:53.802191 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:53.903680 kubelet[1380]: E0212 20:25:53.903610 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:54.004504 kubelet[1380]: E0212 20:25:54.004352 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:54.008593 sudo[1194]: pam_unix(sudo:session): session closed for user root Feb 12 20:25:54.007000 audit[1194]: USER_END pid=1194 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:54.011991 kernel: kauditd_printk_skb: 101 callbacks suppressed Feb 12 20:25:54.012115 kernel: audit: type=1106 audit(1707769554.007:571): pid=1194 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:54.008000 audit[1194]: CRED_DISP pid=1194 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:54.032026 kernel: audit: type=1104 audit(1707769554.008:572): pid=1194 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 20:25:54.105778 kubelet[1380]: E0212 20:25:54.105697 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:54.200685 sshd[1191]: pam_unix(sshd:session): session closed for user core Feb 12 20:25:54.203000 audit[1191]: USER_END pid=1191 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:25:54.207818 systemd[1]: sshd@6-172.24.4.150:22-172.24.4.1:38758.service: Deactivated successfully. Feb 12 20:25:54.209815 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 20:25:54.212235 kubelet[1380]: E0212 20:25:54.212178 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:54.220980 kernel: audit: type=1106 audit(1707769554.203:573): pid=1191 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:25:54.203000 audit[1191]: CRED_DISP pid=1191 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:25:54.222230 systemd-logind[1042]: Session 7 logged out. Waiting for processes to exit. Feb 12 20:25:54.235102 kernel: audit: type=1104 audit(1707769554.203:574): pid=1191 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Feb 12 20:25:54.235866 kernel: audit: type=1131 audit(1707769554.204:575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.150:22-172.24.4.1:38758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:54.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.150:22-172.24.4.1:38758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 20:25:54.247506 systemd-logind[1042]: Removed session 7. Feb 12 20:25:54.313039 kubelet[1380]: E0212 20:25:54.312949 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:54.414113 kubelet[1380]: E0212 20:25:54.414068 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:54.515276 kubelet[1380]: E0212 20:25:54.515178 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:54.616048 kubelet[1380]: E0212 20:25:54.615696 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:54.681873 kubelet[1380]: E0212 20:25:54.681771 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:54.717080 kubelet[1380]: E0212 20:25:54.717023 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:54.817974 kubelet[1380]: E0212 20:25:54.817864 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:54.919170 kubelet[1380]: E0212 20:25:54.918971 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:55.020567 kubelet[1380]: E0212 20:25:55.020466 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:55.121461 kubelet[1380]: E0212 20:25:55.121390 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:55.222154 kubelet[1380]: E0212 20:25:55.221991 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:55.323471 kubelet[1380]: E0212 20:25:55.323341 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:55.424641 kubelet[1380]: E0212 20:25:55.424529 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:55.525579 kubelet[1380]: E0212 20:25:55.525490 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:55.626664 kubelet[1380]: E0212 20:25:55.626524 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:55.682965 kubelet[1380]: E0212 20:25:55.682823 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:55.727718 kubelet[1380]: E0212 20:25:55.727650 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:55.828510 kubelet[1380]: E0212 20:25:55.828256 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:55.929224 kubelet[1380]: E0212 20:25:55.929124 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:56.029389 kubelet[1380]: E0212 20:25:56.029291 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:56.130137 kubelet[1380]: E0212 20:25:56.129847 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:56.231047 kubelet[1380]: E0212 20:25:56.230883 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:56.331872 kubelet[1380]: E0212 20:25:56.331712 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:56.432891 kubelet[1380]: E0212 20:25:56.432608 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:56.533623 kubelet[1380]: E0212 20:25:56.533466 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:56.634363 kubelet[1380]: E0212 20:25:56.634206 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:56.684268 kubelet[1380]: E0212 20:25:56.683880 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:56.734911 kubelet[1380]: E0212 20:25:56.734784 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:56.835807 kubelet[1380]: E0212 20:25:56.835696 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:56.937545 kubelet[1380]: E0212 20:25:56.936792 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:57.038511 kubelet[1380]: E0212 20:25:57.038462 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:57.139687 kubelet[1380]: E0212 20:25:57.139588 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:57.241179 kubelet[1380]: E0212 20:25:57.240394 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:57.341522 kubelet[1380]: E0212 20:25:57.341410 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:57.442699 kubelet[1380]: E0212 20:25:57.442555 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:57.543736 kubelet[1380]: E0212 20:25:57.543615 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:57.643997 kubelet[1380]: E0212 20:25:57.643821 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:57.685075 kubelet[1380]: E0212 20:25:57.685011 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:57.744857 kubelet[1380]: E0212 20:25:57.744787 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:57.846037 kubelet[1380]: E0212 20:25:57.845225 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:57.946357 kubelet[1380]: E0212 20:25:57.946244 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:58.047221 kubelet[1380]: E0212 20:25:58.047153 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:58.149461 kubelet[1380]: E0212 20:25:58.148244 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:58.248868 kubelet[1380]: E0212 20:25:58.248755 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:58.349612 kubelet[1380]: E0212 20:25:58.349467 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:58.451551 kubelet[1380]: E0212 20:25:58.450753 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:58.551250 kubelet[1380]: E0212 20:25:58.551173 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:58.652386 kubelet[1380]: E0212 20:25:58.652318 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:58.685976 kubelet[1380]: E0212 20:25:58.685873 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:58.754070 kubelet[1380]: E0212 20:25:58.753195 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:58.853851 kubelet[1380]: E0212 20:25:58.853773 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:58.954758 kubelet[1380]: E0212 20:25:58.954679 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:59.055177 kubelet[1380]: E0212 20:25:59.055134 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:59.155611 kubelet[1380]: E0212 20:25:59.155536 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:59.257214 kubelet[1380]: E0212 20:25:59.257145 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:59.358375 kubelet[1380]: E0212 20:25:59.358164 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:59.459259 kubelet[1380]: E0212 20:25:59.459187 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:59.560343 kubelet[1380]: E0212 20:25:59.560272 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:59.661556 kubelet[1380]: E0212 20:25:59.661348 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:59.686802 kubelet[1380]: E0212 20:25:59.686745 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:25:59.762108 kubelet[1380]: E0212 20:25:59.762040 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:59.863362 kubelet[1380]: E0212 20:25:59.863301 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:25:59.964281 kubelet[1380]: E0212 20:25:59.964089 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:26:00.065530 kubelet[1380]: E0212 20:26:00.065478 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:26:00.166147 kubelet[1380]: E0212 20:26:00.166024 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:26:00.267483 kubelet[1380]: E0212 20:26:00.267167 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:26:00.368229 kubelet[1380]: E0212 20:26:00.368042 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:26:00.469127 kubelet[1380]: E0212 20:26:00.469036 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:26:00.570274 kubelet[1380]: E0212 20:26:00.570207 1380 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"172.24.4.150\" not found" Feb 12 20:26:00.669915 kubelet[1380]: E0212 20:26:00.669849 1380 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:00.672188 kubelet[1380]: I0212 20:26:00.672141 1380 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 20:26:00.673279 env[1058]: time="2024-02-12T20:26:00.672996902Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 20:26:00.674425 kubelet[1380]: I0212 20:26:00.674313 1380 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 20:26:00.683010 kubelet[1380]: I0212 20:26:00.682968 1380 apiserver.go:52] "Watching apiserver" Feb 12 20:26:00.688503 kubelet[1380]: E0212 20:26:00.688469 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:00.691233 kubelet[1380]: I0212 20:26:00.691173 1380 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:26:00.691375 kubelet[1380]: I0212 20:26:00.691352 1380 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:26:00.691468 kubelet[1380]: I0212 20:26:00.691446 1380 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:26:00.692664 kubelet[1380]: E0212 20:26:00.692515 1380 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vdblc" podUID=3156e51a-eccc-4b8f-ab23-6038b0834945 Feb 12 20:26:00.697813 kubelet[1380]: I0212 20:26:00.697774 1380 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 20:26:00.706455 systemd[1]: Created slice kubepods-besteffort-pod0baa8fe2_baf1_4d56_8c09_a4e808db6c89.slice. Feb 12 20:26:00.728508 kubelet[1380]: I0212 20:26:00.728434 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ec48b579-b3a5-4593-862c-94ca1efac590-tigera-ca-bundle\") pod \"calico-node-t24g8\" (UID: \"ec48b579-b3a5-4593-862c-94ca1efac590\") " pod="calico-system/calico-node-t24g8" Feb 12 20:26:00.728726 kubelet[1380]: I0212 20:26:00.728587 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ec48b579-b3a5-4593-862c-94ca1efac590-cni-bin-dir\") pod \"calico-node-t24g8\" (UID: \"ec48b579-b3a5-4593-862c-94ca1efac590\") " pod="calico-system/calico-node-t24g8" Feb 12 20:26:00.728726 kubelet[1380]: I0212 20:26:00.728667 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ec48b579-b3a5-4593-862c-94ca1efac590-cni-net-dir\") pod \"calico-node-t24g8\" (UID: \"ec48b579-b3a5-4593-862c-94ca1efac590\") " pod="calico-system/calico-node-t24g8" Feb 12 20:26:00.728882 kubelet[1380]: I0212 20:26:00.728740 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ec48b579-b3a5-4593-862c-94ca1efac590-cni-log-dir\") pod \"calico-node-t24g8\" (UID: \"ec48b579-b3a5-4593-862c-94ca1efac590\") " pod="calico-system/calico-node-t24g8" Feb 12 20:26:00.728882 kubelet[1380]: I0212 20:26:00.728812 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/3156e51a-eccc-4b8f-ab23-6038b0834945-socket-dir\") pod \"csi-node-driver-vdblc\" (UID: \"3156e51a-eccc-4b8f-ab23-6038b0834945\") " pod="calico-system/csi-node-driver-vdblc" Feb 12 20:26:00.728882 kubelet[1380]: I0212 20:26:00.728876 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/3156e51a-eccc-4b8f-ab23-6038b0834945-registration-dir\") pod \"csi-node-driver-vdblc\" (UID: \"3156e51a-eccc-4b8f-ab23-6038b0834945\") " pod="calico-system/csi-node-driver-vdblc" Feb 12 20:26:00.729154 kubelet[1380]: I0212 20:26:00.729006 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ec48b579-b3a5-4593-862c-94ca1efac590-xtables-lock\") pod \"calico-node-t24g8\" (UID: \"ec48b579-b3a5-4593-862c-94ca1efac590\") " pod="calico-system/calico-node-t24g8" Feb 12 20:26:00.729154 kubelet[1380]: I0212 20:26:00.729087 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ec48b579-b3a5-4593-862c-94ca1efac590-policysync\") pod \"calico-node-t24g8\" (UID: \"ec48b579-b3a5-4593-862c-94ca1efac590\") " pod="calico-system/calico-node-t24g8" Feb 12 20:26:00.729296 kubelet[1380]: I0212 20:26:00.729163 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2ddth\" (UniqueName: \"kubernetes.io/projected/ec48b579-b3a5-4593-862c-94ca1efac590-kube-api-access-2ddth\") pod \"calico-node-t24g8\" (UID: \"ec48b579-b3a5-4593-862c-94ca1efac590\") " pod="calico-system/calico-node-t24g8" Feb 12 20:26:00.729296 kubelet[1380]: I0212 20:26:00.729228 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/3156e51a-eccc-4b8f-ab23-6038b0834945-varrun\") pod \"csi-node-driver-vdblc\" (UID: \"3156e51a-eccc-4b8f-ab23-6038b0834945\") " pod="calico-system/csi-node-driver-vdblc" Feb 12 20:26:00.729296 kubelet[1380]: I0212 20:26:00.729291 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0baa8fe2-baf1-4d56-8c09-a4e808db6c89-xtables-lock\") pod \"kube-proxy-wtfk4\" (UID: \"0baa8fe2-baf1-4d56-8c09-a4e808db6c89\") " pod="kube-system/kube-proxy-wtfk4" Feb 12 20:26:00.729544 kubelet[1380]: I0212 20:26:00.729355 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0baa8fe2-baf1-4d56-8c09-a4e808db6c89-lib-modules\") pod \"kube-proxy-wtfk4\" (UID: \"0baa8fe2-baf1-4d56-8c09-a4e808db6c89\") " pod="kube-system/kube-proxy-wtfk4" Feb 12 20:26:00.729544 kubelet[1380]: I0212 20:26:00.729420 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ec48b579-b3a5-4593-862c-94ca1efac590-node-certs\") pod \"calico-node-t24g8\" (UID: \"ec48b579-b3a5-4593-862c-94ca1efac590\") " pod="calico-system/calico-node-t24g8" Feb 12 20:26:00.729544 kubelet[1380]: I0212 20:26:00.729480 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ec48b579-b3a5-4593-862c-94ca1efac590-var-run-calico\") pod \"calico-node-t24g8\" (UID: \"ec48b579-b3a5-4593-862c-94ca1efac590\") " pod="calico-system/calico-node-t24g8" Feb 12 20:26:00.729743 kubelet[1380]: I0212 20:26:00.729560 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ec48b579-b3a5-4593-862c-94ca1efac590-var-lib-calico\") pod \"calico-node-t24g8\" (UID: \"ec48b579-b3a5-4593-862c-94ca1efac590\") " pod="calico-system/calico-node-t24g8" Feb 12 20:26:00.729743 kubelet[1380]: I0212 20:26:00.729637 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0baa8fe2-baf1-4d56-8c09-a4e808db6c89-kube-proxy\") pod \"kube-proxy-wtfk4\" (UID: \"0baa8fe2-baf1-4d56-8c09-a4e808db6c89\") " pod="kube-system/kube-proxy-wtfk4" Feb 12 20:26:00.729881 kubelet[1380]: I0212 20:26:00.729747 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ec48b579-b3a5-4593-862c-94ca1efac590-lib-modules\") pod \"calico-node-t24g8\" (UID: \"ec48b579-b3a5-4593-862c-94ca1efac590\") " pod="calico-system/calico-node-t24g8" Feb 12 20:26:00.729881 kubelet[1380]: I0212 20:26:00.729825 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ec48b579-b3a5-4593-862c-94ca1efac590-flexvol-driver-host\") pod \"calico-node-t24g8\" (UID: \"ec48b579-b3a5-4593-862c-94ca1efac590\") " pod="calico-system/calico-node-t24g8" Feb 12 20:26:00.730069 kubelet[1380]: I0212 20:26:00.729887 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/3156e51a-eccc-4b8f-ab23-6038b0834945-kubelet-dir\") pod \"csi-node-driver-vdblc\" (UID: \"3156e51a-eccc-4b8f-ab23-6038b0834945\") " pod="calico-system/csi-node-driver-vdblc" Feb 12 20:26:00.730150 kubelet[1380]: I0212 20:26:00.730079 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tlzlf\" (UniqueName: \"kubernetes.io/projected/3156e51a-eccc-4b8f-ab23-6038b0834945-kube-api-access-tlzlf\") pod \"csi-node-driver-vdblc\" (UID: \"3156e51a-eccc-4b8f-ab23-6038b0834945\") " pod="calico-system/csi-node-driver-vdblc" Feb 12 20:26:00.730225 kubelet[1380]: I0212 20:26:00.730157 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lwqs7\" (UniqueName: \"kubernetes.io/projected/0baa8fe2-baf1-4d56-8c09-a4e808db6c89-kube-api-access-lwqs7\") pod \"kube-proxy-wtfk4\" (UID: \"0baa8fe2-baf1-4d56-8c09-a4e808db6c89\") " pod="kube-system/kube-proxy-wtfk4" Feb 12 20:26:00.730225 kubelet[1380]: I0212 20:26:00.730184 1380 reconciler.go:41] "Reconciler: start to sync state" Feb 12 20:26:00.737560 systemd[1]: Created slice kubepods-besteffort-podec48b579_b3a5_4593_862c_94ca1efac590.slice. Feb 12 20:26:00.840517 kubelet[1380]: E0212 20:26:00.837767 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:00.840517 kubelet[1380]: W0212 20:26:00.837819 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:00.840517 kubelet[1380]: E0212 20:26:00.837877 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:00.841005 kubelet[1380]: E0212 20:26:00.840384 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:00.841005 kubelet[1380]: W0212 20:26:00.840792 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:00.841005 kubelet[1380]: E0212 20:26:00.840845 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:00.841302 kubelet[1380]: E0212 20:26:00.841256 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:00.841302 kubelet[1380]: W0212 20:26:00.841294 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:00.841469 kubelet[1380]: E0212 20:26:00.841324 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:00.841800 kubelet[1380]: E0212 20:26:00.841700 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:00.851276 kubelet[1380]: W0212 20:26:00.841735 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:00.851276 kubelet[1380]: E0212 20:26:00.850360 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:00.851276 kubelet[1380]: E0212 20:26:00.851084 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:00.851276 kubelet[1380]: W0212 20:26:00.851107 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:00.851276 kubelet[1380]: E0212 20:26:00.851136 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:00.933450 kubelet[1380]: E0212 20:26:00.933405 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:00.933765 kubelet[1380]: W0212 20:26:00.933736 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:00.933999 kubelet[1380]: E0212 20:26:00.933908 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:00.934665 kubelet[1380]: E0212 20:26:00.934637 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:00.934838 kubelet[1380]: W0212 20:26:00.934812 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:00.935049 kubelet[1380]: E0212 20:26:00.935025 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:00.935646 kubelet[1380]: E0212 20:26:00.935618 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:00.935820 kubelet[1380]: W0212 20:26:00.935793 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:00.936053 kubelet[1380]: E0212 20:26:00.936029 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.037124 kubelet[1380]: E0212 20:26:01.037068 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.037124 kubelet[1380]: W0212 20:26:01.037106 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.037472 kubelet[1380]: E0212 20:26:01.037149 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.037557 kubelet[1380]: E0212 20:26:01.037510 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.037557 kubelet[1380]: W0212 20:26:01.037531 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.037557 kubelet[1380]: E0212 20:26:01.037559 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.037922 kubelet[1380]: E0212 20:26:01.037884 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.037922 kubelet[1380]: W0212 20:26:01.037914 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.038127 kubelet[1380]: E0212 20:26:01.037983 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.066631 kubelet[1380]: E0212 20:26:01.066595 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.066898 kubelet[1380]: W0212 20:26:01.066869 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.067130 kubelet[1380]: E0212 20:26:01.067106 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.139045 kubelet[1380]: E0212 20:26:01.138812 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.139323 kubelet[1380]: W0212 20:26:01.139290 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.139492 kubelet[1380]: E0212 20:26:01.139469 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.142064 kubelet[1380]: E0212 20:26:01.141757 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.143303 kubelet[1380]: W0212 20:26:01.143263 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.143776 kubelet[1380]: E0212 20:26:01.143533 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.246534 kubelet[1380]: E0212 20:26:01.246472 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.246534 kubelet[1380]: W0212 20:26:01.246523 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.246534 kubelet[1380]: E0212 20:26:01.246569 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.247279 kubelet[1380]: E0212 20:26:01.247238 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.247279 kubelet[1380]: W0212 20:26:01.247276 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.247476 kubelet[1380]: E0212 20:26:01.247308 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.277829 kubelet[1380]: E0212 20:26:01.277788 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.278197 kubelet[1380]: W0212 20:26:01.278163 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.278466 kubelet[1380]: E0212 20:26:01.278411 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.330190 env[1058]: time="2024-02-12T20:26:01.329494779Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wtfk4,Uid:0baa8fe2-baf1-4d56-8c09-a4e808db6c89,Namespace:kube-system,Attempt:0,}" Feb 12 20:26:01.346243 env[1058]: time="2024-02-12T20:26:01.346173632Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-t24g8,Uid:ec48b579-b3a5-4593-862c-94ca1efac590,Namespace:calico-system,Attempt:0,}" Feb 12 20:26:01.349291 kubelet[1380]: E0212 20:26:01.349208 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.349291 kubelet[1380]: W0212 20:26:01.349291 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.349640 kubelet[1380]: E0212 20:26:01.349379 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.450848 kubelet[1380]: E0212 20:26:01.450575 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.450848 kubelet[1380]: W0212 20:26:01.450622 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.450848 kubelet[1380]: E0212 20:26:01.450666 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.552310 kubelet[1380]: E0212 20:26:01.552198 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.552310 kubelet[1380]: W0212 20:26:01.552284 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.552669 kubelet[1380]: E0212 20:26:01.552365 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.653908 kubelet[1380]: E0212 20:26:01.653848 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.653908 kubelet[1380]: W0212 20:26:01.653889 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.654292 kubelet[1380]: E0212 20:26:01.654008 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.667568 kubelet[1380]: E0212 20:26:01.667520 1380 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 20:26:01.667860 kubelet[1380]: W0212 20:26:01.667828 1380 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 20:26:01.668213 kubelet[1380]: E0212 20:26:01.668183 1380 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 20:26:01.689592 kubelet[1380]: E0212 20:26:01.689515 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:01.983118 kubelet[1380]: E0212 20:26:01.983024 1380 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vdblc" podUID=3156e51a-eccc-4b8f-ab23-6038b0834945 Feb 12 20:26:02.591447 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2042756444.mount: Deactivated successfully. Feb 12 20:26:02.606677 env[1058]: time="2024-02-12T20:26:02.606591057Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:02.614109 env[1058]: time="2024-02-12T20:26:02.613971112Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:02.617421 env[1058]: time="2024-02-12T20:26:02.617316940Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:02.620541 env[1058]: time="2024-02-12T20:26:02.620477982Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:02.628919 env[1058]: time="2024-02-12T20:26:02.628862980Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:02.638694 env[1058]: time="2024-02-12T20:26:02.638638523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:02.647018 env[1058]: time="2024-02-12T20:26:02.646911231Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:02.649118 env[1058]: time="2024-02-12T20:26:02.649057782Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:02.691018 kubelet[1380]: E0212 20:26:02.690951 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:02.702186 env[1058]: time="2024-02-12T20:26:02.701990945Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:26:02.702712 env[1058]: time="2024-02-12T20:26:02.702128433Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:26:02.702993 env[1058]: time="2024-02-12T20:26:02.702872858Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:26:02.703171 env[1058]: time="2024-02-12T20:26:02.703092600Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:26:02.703290 env[1058]: time="2024-02-12T20:26:02.703178120Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:26:02.703290 env[1058]: time="2024-02-12T20:26:02.703211863Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:26:02.703444 env[1058]: time="2024-02-12T20:26:02.703369899Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/50eb446621697e22e3420fd71336a926b62eea9450985a7f9adc24306bda6680 pid=1500 runtime=io.containerd.runc.v2 Feb 12 20:26:02.704635 env[1058]: time="2024-02-12T20:26:02.704300853Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/34fc618724bd80d4f3e754fc5193a80e3f88a591becae58435810cfb1e379b27 pid=1498 runtime=io.containerd.runc.v2 Feb 12 20:26:02.742609 systemd[1]: Started cri-containerd-34fc618724bd80d4f3e754fc5193a80e3f88a591becae58435810cfb1e379b27.scope. Feb 12 20:26:02.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764648 kernel: audit: type=1400 audit(1707769562.754:576): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764790 kernel: audit: type=1400 audit(1707769562.754:577): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.773293 kernel: audit: type=1400 audit(1707769562.754:578): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.773369 kernel: audit: type=1400 audit(1707769562.754:579): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.773398 kernel: audit: type=1400 audit(1707769562.754:580): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.781602 kernel: audit: type=1400 audit(1707769562.754:581): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.785444 kernel: audit: type=1400 audit(1707769562.754:582): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.789170 kernel: audit: type=1400 audit(1707769562.754:583): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.793045 kernel: audit: type=1400 audit(1707769562.754:584): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.793312 kernel: audit: type=1400 audit(1707769562.755:585): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.799089 systemd[1]: Started cri-containerd-50eb446621697e22e3420fd71336a926b62eea9450985a7f9adc24306bda6680.scope. Feb 12 20:26:02.755000 audit: BPF prog-id=64 op=LOAD Feb 12 20:26:02.764000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764000 audit[1520]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1498 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:02.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334666336313837323462643830643466336537353466633531393361 Feb 12 20:26:02.764000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764000 audit[1520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1498 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:02.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334666336313837323462643830643466336537353466633531393361 Feb 12 20:26:02.764000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.764000 audit: BPF prog-id=65 op=LOAD Feb 12 20:26:02.764000 audit[1520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00020ff80 items=0 ppid=1498 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:02.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334666336313837323462643830643466336537353466633531393361 Feb 12 20:26:02.776000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.776000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.776000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.776000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.776000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.776000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.776000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.776000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.776000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.776000 audit: BPF prog-id=66 op=LOAD Feb 12 20:26:02.776000 audit[1520]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00020ffc8 items=0 ppid=1498 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:02.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334666336313837323462643830643466336537353466633531393361 Feb 12 20:26:02.784000 audit: BPF prog-id=66 op=UNLOAD Feb 12 20:26:02.784000 audit: BPF prog-id=65 op=UNLOAD Feb 12 20:26:02.784000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.784000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.784000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.784000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.784000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.784000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.784000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.784000 audit[1520]: AVC avc: denied { perfmon } for pid=1520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.784000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.784000 audit[1520]: AVC avc: denied { bpf } for pid=1520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.784000 audit: BPF prog-id=67 op=LOAD Feb 12 20:26:02.784000 audit[1520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00026e3d8 items=0 ppid=1498 pid=1520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:02.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334666336313837323462643830643466336537353466633531393361 Feb 12 20:26:02.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.815000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.815000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.816000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.816000 audit: BPF prog-id=68 op=LOAD Feb 12 20:26:02.819232 env[1058]: time="2024-02-12T20:26:02.817846526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-t24g8,Uid:ec48b579-b3a5-4593-862c-94ca1efac590,Namespace:calico-system,Attempt:0,} returns sandbox id \"34fc618724bd80d4f3e754fc5193a80e3f88a591becae58435810cfb1e379b27\"" Feb 12 20:26:02.819000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.819000 audit[1521]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1500 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:02.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530656234343636323136393765323265333432306664373133333661 Feb 12 20:26:02.819000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.819000 audit[1521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1500 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:02.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530656234343636323136393765323265333432306664373133333661 Feb 12 20:26:02.820985 env[1058]: time="2024-02-12T20:26:02.820875210Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 20:26:02.820000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.820000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.820000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.820000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.820000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.820000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.820000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.820000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.820000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.820000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.820000 audit: BPF prog-id=69 op=LOAD Feb 12 20:26:02.820000 audit[1521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000215c00 items=0 ppid=1500 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:02.820000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530656234343636323136393765323265333432306664373133333661 Feb 12 20:26:02.822000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.822000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.822000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.822000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.822000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.822000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.822000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.822000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.822000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.822000 audit: BPF prog-id=70 op=LOAD Feb 12 20:26:02.822000 audit[1521]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000215c48 items=0 ppid=1500 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:02.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530656234343636323136393765323265333432306664373133333661 Feb 12 20:26:02.823000 audit: BPF prog-id=70 op=UNLOAD Feb 12 20:26:02.823000 audit: BPF prog-id=69 op=UNLOAD Feb 12 20:26:02.823000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.823000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.823000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.823000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.823000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.823000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.823000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.823000 audit[1521]: AVC avc: denied { perfmon } for pid=1521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.823000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.823000 audit[1521]: AVC avc: denied { bpf } for pid=1521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:02.823000 audit: BPF prog-id=71 op=LOAD Feb 12 20:26:02.823000 audit[1521]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002a4058 items=0 ppid=1500 pid=1521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:02.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530656234343636323136393765323265333432306664373133333661 Feb 12 20:26:02.841631 env[1058]: time="2024-02-12T20:26:02.841582723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-wtfk4,Uid:0baa8fe2-baf1-4d56-8c09-a4e808db6c89,Namespace:kube-system,Attempt:0,} returns sandbox id \"50eb446621697e22e3420fd71336a926b62eea9450985a7f9adc24306bda6680\"" Feb 12 20:26:03.691326 kubelet[1380]: E0212 20:26:03.691151 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:03.983337 kubelet[1380]: E0212 20:26:03.983087 1380 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vdblc" podUID=3156e51a-eccc-4b8f-ab23-6038b0834945 Feb 12 20:26:04.549096 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount361545489.mount: Deactivated successfully. Feb 12 20:26:04.692252 kubelet[1380]: E0212 20:26:04.692164 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:05.693245 kubelet[1380]: E0212 20:26:05.693060 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:05.984018 kubelet[1380]: E0212 20:26:05.983645 1380 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vdblc" podUID=3156e51a-eccc-4b8f-ab23-6038b0834945 Feb 12 20:26:06.263048 env[1058]: time="2024-02-12T20:26:06.262834566Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:06.266903 env[1058]: time="2024-02-12T20:26:06.266861783Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:06.270167 update_engine[1047]: I0212 20:26:06.270089 1047 update_attempter.cc:509] Updating boot flags... Feb 12 20:26:06.274336 env[1058]: time="2024-02-12T20:26:06.273842894Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:06.282595 env[1058]: time="2024-02-12T20:26:06.282522970Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:06.283632 env[1058]: time="2024-02-12T20:26:06.283564672Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 20:26:06.291531 env[1058]: time="2024-02-12T20:26:06.291466459Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 20:26:06.298392 env[1058]: time="2024-02-12T20:26:06.298349877Z" level=info msg="CreateContainer within sandbox \"34fc618724bd80d4f3e754fc5193a80e3f88a591becae58435810cfb1e379b27\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 20:26:06.316761 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1368482722.mount: Deactivated successfully. Feb 12 20:26:06.334684 env[1058]: time="2024-02-12T20:26:06.334596218Z" level=info msg="CreateContainer within sandbox \"34fc618724bd80d4f3e754fc5193a80e3f88a591becae58435810cfb1e379b27\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6d145d4debb7750e922116bfb20d876cf9a5efbb27793425caa85b602ee397af\"" Feb 12 20:26:06.341555 env[1058]: time="2024-02-12T20:26:06.341470399Z" level=info msg="StartContainer for \"6d145d4debb7750e922116bfb20d876cf9a5efbb27793425caa85b602ee397af\"" Feb 12 20:26:06.409680 systemd[1]: Started cri-containerd-6d145d4debb7750e922116bfb20d876cf9a5efbb27793425caa85b602ee397af.scope. Feb 12 20:26:06.413191 systemd[1]: run-containerd-runc-k8s.io-6d145d4debb7750e922116bfb20d876cf9a5efbb27793425caa85b602ee397af-runc.zoOMvM.mount: Deactivated successfully. Feb 12 20:26:06.435000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.435000 audit[1584]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdc984b80a8 items=0 ppid=1498 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:06.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313435643464656262373735306539323231313662666232306438 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit: BPF prog-id=72 op=LOAD Feb 12 20:26:06.436000 audit[1584]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f9048 items=0 ppid=1498 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:06.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313435643464656262373735306539323231313662666232306438 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit: BPF prog-id=73 op=LOAD Feb 12 20:26:06.436000 audit[1584]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f9098 items=0 ppid=1498 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:06.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313435643464656262373735306539323231313662666232306438 Feb 12 20:26:06.436000 audit: BPF prog-id=73 op=UNLOAD Feb 12 20:26:06.436000 audit: BPF prog-id=72 op=UNLOAD Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { perfmon } for pid=1584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit[1584]: AVC avc: denied { bpf } for pid=1584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:06.436000 audit: BPF prog-id=74 op=LOAD Feb 12 20:26:06.436000 audit[1584]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f9128 items=0 ppid=1498 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:06.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313435643464656262373735306539323231313662666232306438 Feb 12 20:26:06.517251 systemd[1]: cri-containerd-6d145d4debb7750e922116bfb20d876cf9a5efbb27793425caa85b602ee397af.scope: Deactivated successfully. Feb 12 20:26:06.523000 audit: BPF prog-id=74 op=UNLOAD Feb 12 20:26:06.572357 env[1058]: time="2024-02-12T20:26:06.572284582Z" level=info msg="StartContainer for \"6d145d4debb7750e922116bfb20d876cf9a5efbb27793425caa85b602ee397af\" returns successfully" Feb 12 20:26:06.694095 kubelet[1380]: E0212 20:26:06.693995 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:06.946338 env[1058]: time="2024-02-12T20:26:06.946214511Z" level=info msg="shim disconnected" id=6d145d4debb7750e922116bfb20d876cf9a5efbb27793425caa85b602ee397af Feb 12 20:26:06.946338 env[1058]: time="2024-02-12T20:26:06.946317344Z" level=warning msg="cleaning up after shim disconnected" id=6d145d4debb7750e922116bfb20d876cf9a5efbb27793425caa85b602ee397af namespace=k8s.io Feb 12 20:26:06.946338 env[1058]: time="2024-02-12T20:26:06.946342612Z" level=info msg="cleaning up dead shim" Feb 12 20:26:06.968171 env[1058]: time="2024-02-12T20:26:06.968072510Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:26:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1622 runtime=io.containerd.runc.v2\n" Feb 12 20:26:07.315525 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6d145d4debb7750e922116bfb20d876cf9a5efbb27793425caa85b602ee397af-rootfs.mount: Deactivated successfully. Feb 12 20:26:07.694270 kubelet[1380]: E0212 20:26:07.694125 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:07.983538 kubelet[1380]: E0212 20:26:07.983390 1380 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vdblc" podUID=3156e51a-eccc-4b8f-ab23-6038b0834945 Feb 12 20:26:08.558174 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount553104299.mount: Deactivated successfully. Feb 12 20:26:08.694556 kubelet[1380]: E0212 20:26:08.694504 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:09.329284 env[1058]: time="2024-02-12T20:26:09.329230243Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:09.332704 env[1058]: time="2024-02-12T20:26:09.332676512Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:09.335384 env[1058]: time="2024-02-12T20:26:09.335363037Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:09.337764 env[1058]: time="2024-02-12T20:26:09.337743008Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:09.338427 env[1058]: time="2024-02-12T20:26:09.338403756Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:5a7325fa2b6e8d712e4a770abb4a5a5852e87b6de8df34552d67853e9bfb9f9f\"" Feb 12 20:26:09.341047 env[1058]: time="2024-02-12T20:26:09.341026832Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 20:26:09.342129 env[1058]: time="2024-02-12T20:26:09.342104482Z" level=info msg="CreateContainer within sandbox \"50eb446621697e22e3420fd71336a926b62eea9450985a7f9adc24306bda6680\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 20:26:09.361362 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3370735723.mount: Deactivated successfully. Feb 12 20:26:09.369037 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3412860072.mount: Deactivated successfully. Feb 12 20:26:09.405433 env[1058]: time="2024-02-12T20:26:09.405338901Z" level=info msg="CreateContainer within sandbox \"50eb446621697e22e3420fd71336a926b62eea9450985a7f9adc24306bda6680\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3328cb54b60369fdc05c0a35df7dad75dc557f5ca27c34c4983bdebfc6ba64be\"" Feb 12 20:26:09.406008 env[1058]: time="2024-02-12T20:26:09.405978431Z" level=info msg="StartContainer for \"3328cb54b60369fdc05c0a35df7dad75dc557f5ca27c34c4983bdebfc6ba64be\"" Feb 12 20:26:09.436431 systemd[1]: Started cri-containerd-3328cb54b60369fdc05c0a35df7dad75dc557f5ca27c34c4983bdebfc6ba64be.scope. Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.462102 kernel: kauditd_printk_skb: 148 callbacks suppressed Feb 12 20:26:09.462209 kernel: audit: type=1400 audit(1707769569.459:619): avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdb0401f4d8 items=0 ppid=1500 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.471770 kernel: audit: type=1300 audit(1707769569.459:619): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fdb0401f4d8 items=0 ppid=1500 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333323863623534623630333639666463303563306133356466376461 Feb 12 20:26:09.478142 kernel: audit: type=1327 audit(1707769569.459:619): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333323863623534623630333639666463303563306133356466376461 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.488826 kernel: audit: type=1400 audit(1707769569.459:620): avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.489028 kernel: audit: type=1400 audit(1707769569.459:620): avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.497504 kernel: audit: type=1400 audit(1707769569.459:620): avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.497571 kernel: audit: type=1400 audit(1707769569.459:620): avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.509997 kernel: audit: type=1400 audit(1707769569.459:620): avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.510087 kernel: audit: type=1400 audit(1707769569.459:620): avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.514398 kernel: audit: type=1400 audit(1707769569.459:620): avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit: BPF prog-id=75 op=LOAD Feb 12 20:26:09.459000 audit[1648]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000235ba8 items=0 ppid=1500 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333323863623534623630333639666463303563306133356466376461 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit: BPF prog-id=76 op=LOAD Feb 12 20:26:09.459000 audit[1648]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000235bf8 items=0 ppid=1500 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333323863623534623630333639666463303563306133356466376461 Feb 12 20:26:09.459000 audit: BPF prog-id=76 op=UNLOAD Feb 12 20:26:09.459000 audit: BPF prog-id=75 op=UNLOAD Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { perfmon } for pid=1648 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit[1648]: AVC avc: denied { bpf } for pid=1648 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:09.459000 audit: BPF prog-id=77 op=LOAD Feb 12 20:26:09.459000 audit[1648]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000235c88 items=0 ppid=1500 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333323863623534623630333639666463303563306133356466376461 Feb 12 20:26:09.517380 env[1058]: time="2024-02-12T20:26:09.515299474Z" level=info msg="StartContainer for \"3328cb54b60369fdc05c0a35df7dad75dc557f5ca27c34c4983bdebfc6ba64be\" returns successfully" Feb 12 20:26:09.598000 audit[1696]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.598000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcdf1b6ee0 a2=0 a3=7ffcdf1b6ecc items=0 ppid=1658 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:26:09.601000 audit[1697]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.601000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff98f4d540 a2=0 a3=7fff98f4d52c items=0 ppid=1658 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.601000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 20:26:09.603000 audit[1698]: NETFILTER_CFG table=nat:37 family=10 entries=1 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.603000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc98c67bb0 a2=0 a3=7ffc98c67b9c items=0 ppid=1658 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:26:09.604000 audit[1699]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=1699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.604000 audit[1699]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0327e510 a2=0 a3=7ffe0327e4fc items=0 ppid=1658 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 20:26:09.605000 audit[1700]: NETFILTER_CFG table=filter:39 family=10 entries=1 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.605000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd91041980 a2=0 a3=7ffd9104196c items=0 ppid=1658 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.605000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:26:09.611000 audit[1701]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.611000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd6b32cf30 a2=0 a3=7ffd6b32cf1c items=0 ppid=1658 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.611000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 20:26:09.695460 kubelet[1380]: E0212 20:26:09.695372 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:09.711000 audit[1702]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=1702 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.711000 audit[1702]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff67a5a0a0 a2=0 a3=7fff67a5a08c items=0 ppid=1658 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.711000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:26:09.718000 audit[1704]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_rule pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.718000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc8f1fb6f0 a2=0 a3=7ffc8f1fb6dc items=0 ppid=1658 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.718000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 20:26:09.727000 audit[1707]: NETFILTER_CFG table=filter:43 family=2 entries=2 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.727000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe09b7ef90 a2=0 a3=7ffe09b7ef7c items=0 ppid=1658 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.727000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 20:26:09.730000 audit[1708]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.730000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc42ab6660 a2=0 a3=7ffc42ab664c items=0 ppid=1658 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:26:09.736000 audit[1710]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.736000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe072d160 a2=0 a3=7fffe072d14c items=0 ppid=1658 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.736000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:26:09.740000 audit[1711]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.740000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe7b0b1580 a2=0 a3=7ffe7b0b156c items=0 ppid=1658 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.740000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:26:09.747000 audit[1713]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_rule pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.747000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd02206ed0 a2=0 a3=7ffd02206ebc items=0 ppid=1658 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.747000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:26:09.755000 audit[1716]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.755000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff87e4e2b0 a2=0 a3=7fff87e4e29c items=0 ppid=1658 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.755000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 20:26:09.758000 audit[1717]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.758000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8575a520 a2=0 a3=7ffe8575a50c items=0 ppid=1658 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:26:09.765000 audit[1719]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.765000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd06cc5320 a2=0 a3=7ffd06cc530c items=0 ppid=1658 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:26:09.769000 audit[1720]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.769000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe3ee5ad0 a2=0 a3=7fffe3ee5abc items=0 ppid=1658 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.769000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:26:09.777000 audit[1722]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.777000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec63719c0 a2=0 a3=7ffec63719ac items=0 ppid=1658 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.777000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:26:09.784000 audit[1725]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.784000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc1e46ceb0 a2=0 a3=7ffc1e46ce9c items=0 ppid=1658 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.784000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:26:09.788000 audit[1728]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.788000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffda0c71c20 a2=0 a3=7ffda0c71c0c items=0 ppid=1658 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.788000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:26:09.789000 audit[1729]: NETFILTER_CFG table=nat:55 family=2 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.789000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff2cac7a00 a2=0 a3=7fff2cac79ec items=0 ppid=1658 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:26:09.794000 audit[1731]: NETFILTER_CFG table=nat:56 family=2 entries=2 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.794000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffd8ac02e30 a2=0 a3=7ffd8ac02e1c items=0 ppid=1658 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:26:09.797000 audit[1734]: NETFILTER_CFG table=nat:57 family=2 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 20:26:09.797000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd3e386770 a2=0 a3=7ffd3e38675c items=0 ppid=1658 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:26:09.818000 audit[1738]: NETFILTER_CFG table=filter:58 family=2 entries=4 op=nft_register_rule pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:09.818000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=2620 a0=3 a1=7ffe67efa6f0 a2=0 a3=7ffe67efa6dc items=0 ppid=1658 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:09.846000 audit[1738]: NETFILTER_CFG table=nat:59 family=2 entries=57 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:09.846000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=24988 a0=3 a1=7ffe67efa6f0 a2=0 a3=7ffe67efa6dc items=0 ppid=1658 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:09.884000 audit[1746]: NETFILTER_CFG table=filter:60 family=10 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.884000 audit[1746]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffe9a19ab0 a2=0 a3=7fffe9a19a9c items=0 ppid=1658 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 20:26:09.894000 audit[1748]: NETFILTER_CFG table=filter:61 family=10 entries=2 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.894000 audit[1748]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc90e52390 a2=0 a3=7ffc90e5237c items=0 ppid=1658 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.894000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 20:26:09.900000 audit[1751]: NETFILTER_CFG table=filter:62 family=10 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.900000 audit[1751]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe07aeb5b0 a2=0 a3=7ffe07aeb59c items=0 ppid=1658 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.900000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 20:26:09.902000 audit[1752]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=1752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.902000 audit[1752]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc708c1f20 a2=0 a3=7ffc708c1f0c items=0 ppid=1658 pid=1752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.902000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 20:26:09.905000 audit[1754]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=1754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.905000 audit[1754]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe6295df60 a2=0 a3=7ffe6295df4c items=0 ppid=1658 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.905000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 20:26:09.906000 audit[1755]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=1755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.906000 audit[1755]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1f758f60 a2=0 a3=7fff1f758f4c items=0 ppid=1658 pid=1755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.906000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 20:26:09.909000 audit[1757]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.909000 audit[1757]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd07c26260 a2=0 a3=7ffd07c2624c items=0 ppid=1658 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.909000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 20:26:09.913000 audit[1760]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=1760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.913000 audit[1760]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc06889fe0 a2=0 a3=7ffc06889fcc items=0 ppid=1658 pid=1760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.913000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 20:26:09.915000 audit[1761]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=1761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.915000 audit[1761]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd99e10160 a2=0 a3=7ffd99e1014c items=0 ppid=1658 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.915000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 20:26:09.918000 audit[1763]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=1763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.918000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff46172410 a2=0 a3=7fff461723fc items=0 ppid=1658 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.918000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 20:26:09.919000 audit[1764]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=1764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.919000 audit[1764]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc5599750 a2=0 a3=7ffcc559973c items=0 ppid=1658 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.919000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 20:26:09.923000 audit[1766]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=1766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.923000 audit[1766]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb8c75f70 a2=0 a3=7ffcb8c75f5c items=0 ppid=1658 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.923000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 20:26:09.929000 audit[1769]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=1769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.929000 audit[1769]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffae65e3c0 a2=0 a3=7fffae65e3ac items=0 ppid=1658 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 20:26:09.933000 audit[1772]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.933000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffc6f83950 a2=0 a3=7fffc6f8393c items=0 ppid=1658 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.933000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 20:26:09.935000 audit[1773]: NETFILTER_CFG table=nat:74 family=10 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.935000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc6ba51ea0 a2=0 a3=7ffc6ba51e8c items=0 ppid=1658 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.935000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 20:26:09.938000 audit[1775]: NETFILTER_CFG table=nat:75 family=10 entries=2 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.938000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdbb473090 a2=0 a3=7ffdbb47307c items=0 ppid=1658 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:26:09.941000 audit[1778]: NETFILTER_CFG table=nat:76 family=10 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 20:26:09.941000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff7567feb0 a2=0 a3=7fff7567fe9c items=0 ppid=1658 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.941000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 20:26:09.948000 audit[1782]: NETFILTER_CFG table=filter:77 family=10 entries=3 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:26:09.948000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7fff311e50e0 a2=0 a3=7fff311e50cc items=0 ppid=1658 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.948000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:09.948000 audit[1782]: NETFILTER_CFG table=nat:78 family=10 entries=10 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 20:26:09.948000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7fff311e50e0 a2=0 a3=7fff311e50cc items=0 ppid=1658 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:09.948000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:09.983544 kubelet[1380]: E0212 20:26:09.983212 1380 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vdblc" podUID=3156e51a-eccc-4b8f-ab23-6038b0834945 Feb 12 20:26:10.697223 kubelet[1380]: E0212 20:26:10.697166 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:10.974210 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount445302962.mount: Deactivated successfully. Feb 12 20:26:11.698961 kubelet[1380]: E0212 20:26:11.698838 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:11.983784 kubelet[1380]: E0212 20:26:11.983536 1380 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vdblc" podUID=3156e51a-eccc-4b8f-ab23-6038b0834945 Feb 12 20:26:12.699776 kubelet[1380]: E0212 20:26:12.699681 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:13.701154 kubelet[1380]: E0212 20:26:13.701092 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:13.983163 kubelet[1380]: E0212 20:26:13.982615 1380 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vdblc" podUID=3156e51a-eccc-4b8f-ab23-6038b0834945 Feb 12 20:26:14.702069 kubelet[1380]: E0212 20:26:14.702023 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:15.703459 kubelet[1380]: E0212 20:26:15.702887 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:15.984606 kubelet[1380]: E0212 20:26:15.983829 1380 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vdblc" podUID=3156e51a-eccc-4b8f-ab23-6038b0834945 Feb 12 20:26:16.703509 kubelet[1380]: E0212 20:26:16.703467 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:17.159196 env[1058]: time="2024-02-12T20:26:17.159141611Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:17.162497 env[1058]: time="2024-02-12T20:26:17.162472515Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:17.167066 env[1058]: time="2024-02-12T20:26:17.167041772Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:17.172381 env[1058]: time="2024-02-12T20:26:17.172321339Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:17.177489 env[1058]: time="2024-02-12T20:26:17.175553278Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 20:26:17.180557 env[1058]: time="2024-02-12T20:26:17.180523666Z" level=info msg="CreateContainer within sandbox \"34fc618724bd80d4f3e754fc5193a80e3f88a591becae58435810cfb1e379b27\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 20:26:17.197083 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4280654433.mount: Deactivated successfully. Feb 12 20:26:17.206683 env[1058]: time="2024-02-12T20:26:17.206607535Z" level=info msg="CreateContainer within sandbox \"34fc618724bd80d4f3e754fc5193a80e3f88a591becae58435810cfb1e379b27\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9d546877c20ebfa631eaad5bdeae98c396fb6abd30deefdad373b3cdf9d577c4\"" Feb 12 20:26:17.207412 env[1058]: time="2024-02-12T20:26:17.207363362Z" level=info msg="StartContainer for \"9d546877c20ebfa631eaad5bdeae98c396fb6abd30deefdad373b3cdf9d577c4\"" Feb 12 20:26:17.273450 systemd[1]: Started cri-containerd-9d546877c20ebfa631eaad5bdeae98c396fb6abd30deefdad373b3cdf9d577c4.scope. Feb 12 20:26:17.305866 kernel: kauditd_printk_skb: 165 callbacks suppressed Feb 12 20:26:17.306077 kernel: audit: type=1400 audit(1707769577.293:669): avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.306120 kernel: audit: type=1300 audit(1707769577.293:669): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7feaac55a178 items=0 ppid=1498 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:17.293000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.293000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7feaac55a178 items=0 ppid=1498 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:17.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353436383737633230656266613633316561616435626465616539 Feb 12 20:26:17.311971 kernel: audit: type=1327 audit(1707769577.293:669): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353436383737633230656266613633316561616435626465616539 Feb 12 20:26:17.293000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.319012 kernel: audit: type=1400 audit(1707769577.293:670): avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.293000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.293000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.330648 kernel: audit: type=1400 audit(1707769577.293:670): avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.330759 kernel: audit: type=1400 audit(1707769577.293:670): avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.293000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.293000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.344078 kernel: audit: type=1400 audit(1707769577.293:670): avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.344193 kernel: audit: type=1400 audit(1707769577.293:670): avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.293000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.347852 kernel: audit: type=1400 audit(1707769577.293:670): avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.293000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.351958 kernel: audit: type=1400 audit(1707769577.293:670): avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.293000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.293000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.293000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.293000 audit: BPF prog-id=78 op=LOAD Feb 12 20:26:17.293000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003a4158 items=0 ppid=1498 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:17.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353436383737633230656266613633316561616435626465616539 Feb 12 20:26:17.295000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.295000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.295000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.295000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.295000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.295000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.295000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.295000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.295000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.295000 audit: BPF prog-id=79 op=LOAD Feb 12 20:26:17.295000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003a41a8 items=0 ppid=1498 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:17.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353436383737633230656266613633316561616435626465616539 Feb 12 20:26:17.304000 audit: BPF prog-id=79 op=UNLOAD Feb 12 20:26:17.304000 audit: BPF prog-id=78 op=UNLOAD Feb 12 20:26:17.304000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.304000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.304000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.304000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.304000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.304000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.304000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.304000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.304000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.304000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:17.304000 audit: BPF prog-id=80 op=LOAD Feb 12 20:26:17.304000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003a4238 items=0 ppid=1498 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:17.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964353436383737633230656266613633316561616435626465616539 Feb 12 20:26:17.353302 env[1058]: time="2024-02-12T20:26:17.352355297Z" level=info msg="StartContainer for \"9d546877c20ebfa631eaad5bdeae98c396fb6abd30deefdad373b3cdf9d577c4\" returns successfully" Feb 12 20:26:17.704170 kubelet[1380]: E0212 20:26:17.704053 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:17.983123 kubelet[1380]: E0212 20:26:17.982904 1380 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vdblc" podUID=3156e51a-eccc-4b8f-ab23-6038b0834945 Feb 12 20:26:18.141171 kubelet[1380]: I0212 20:26:18.141126 1380 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-wtfk4" podStartSLOduration=-9.223372011713709e+09 pod.CreationTimestamp="2024-02-12 20:25:53 +0000 UTC" firstStartedPulling="2024-02-12 20:26:02.842988828 +0000 UTC m=+23.359688375" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:26:10.125856677 +0000 UTC m=+30.642556264" watchObservedRunningTime="2024-02-12 20:26:18.141066442 +0000 UTC m=+38.657766019" Feb 12 20:26:18.597684 env[1058]: time="2024-02-12T20:26:18.597547516Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 20:26:18.604493 systemd[1]: cri-containerd-9d546877c20ebfa631eaad5bdeae98c396fb6abd30deefdad373b3cdf9d577c4.scope: Deactivated successfully. Feb 12 20:26:18.608000 audit: BPF prog-id=80 op=UNLOAD Feb 12 20:26:18.649498 kubelet[1380]: I0212 20:26:18.649356 1380 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 20:26:18.669801 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9d546877c20ebfa631eaad5bdeae98c396fb6abd30deefdad373b3cdf9d577c4-rootfs.mount: Deactivated successfully. Feb 12 20:26:18.705256 kubelet[1380]: E0212 20:26:18.705162 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:19.209716 env[1058]: time="2024-02-12T20:26:19.209580530Z" level=info msg="shim disconnected" id=9d546877c20ebfa631eaad5bdeae98c396fb6abd30deefdad373b3cdf9d577c4 Feb 12 20:26:19.210120 env[1058]: time="2024-02-12T20:26:19.210073904Z" level=warning msg="cleaning up after shim disconnected" id=9d546877c20ebfa631eaad5bdeae98c396fb6abd30deefdad373b3cdf9d577c4 namespace=k8s.io Feb 12 20:26:19.210282 env[1058]: time="2024-02-12T20:26:19.210247009Z" level=info msg="cleaning up dead shim" Feb 12 20:26:19.228999 env[1058]: time="2024-02-12T20:26:19.228894689Z" level=warning msg="cleanup warnings time=\"2024-02-12T20:26:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=1837 runtime=io.containerd.runc.v2\n" Feb 12 20:26:19.705643 kubelet[1380]: E0212 20:26:19.705576 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:19.997466 systemd[1]: Created slice kubepods-besteffort-pod3156e51a_eccc_4b8f_ab23_6038b0834945.slice. Feb 12 20:26:20.004163 env[1058]: time="2024-02-12T20:26:20.004069948Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vdblc,Uid:3156e51a-eccc-4b8f-ab23-6038b0834945,Namespace:calico-system,Attempt:0,}" Feb 12 20:26:20.131683 env[1058]: time="2024-02-12T20:26:20.131617128Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 20:26:20.149859 env[1058]: time="2024-02-12T20:26:20.149734265Z" level=error msg="Failed to destroy network for sandbox \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:26:20.151738 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59-shm.mount: Deactivated successfully. Feb 12 20:26:20.154765 env[1058]: time="2024-02-12T20:26:20.154309813Z" level=error msg="encountered an error cleaning up failed sandbox \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:26:20.154765 env[1058]: time="2024-02-12T20:26:20.154419730Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vdblc,Uid:3156e51a-eccc-4b8f-ab23-6038b0834945,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:26:20.155114 kubelet[1380]: E0212 20:26:20.154678 1380 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:26:20.155114 kubelet[1380]: E0212 20:26:20.154762 1380 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vdblc" Feb 12 20:26:20.155114 kubelet[1380]: E0212 20:26:20.154804 1380 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vdblc" Feb 12 20:26:20.155393 kubelet[1380]: E0212 20:26:20.154881 1380 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-vdblc_calico-system(3156e51a-eccc-4b8f-ab23-6038b0834945)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-vdblc_calico-system(3156e51a-eccc-4b8f-ab23-6038b0834945)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vdblc" podUID=3156e51a-eccc-4b8f-ab23-6038b0834945 Feb 12 20:26:20.670136 kubelet[1380]: E0212 20:26:20.670010 1380 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:20.707191 kubelet[1380]: E0212 20:26:20.707139 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:21.134451 kubelet[1380]: I0212 20:26:21.134384 1380 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:21.135818 env[1058]: time="2024-02-12T20:26:21.135756637Z" level=info msg="StopPodSandbox for \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\"" Feb 12 20:26:21.193805 env[1058]: time="2024-02-12T20:26:21.193657144Z" level=error msg="StopPodSandbox for \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\" failed" error="failed to destroy network for sandbox \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:26:21.194403 kubelet[1380]: E0212 20:26:21.194341 1380 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:21.194554 kubelet[1380]: E0212 20:26:21.194536 1380 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59} Feb 12 20:26:21.194745 kubelet[1380]: E0212 20:26:21.194710 1380 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3156e51a-eccc-4b8f-ab23-6038b0834945\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 20:26:21.194922 kubelet[1380]: E0212 20:26:21.194840 1380 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3156e51a-eccc-4b8f-ab23-6038b0834945\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vdblc" podUID=3156e51a-eccc-4b8f-ab23-6038b0834945 Feb 12 20:26:21.707779 kubelet[1380]: E0212 20:26:21.707611 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:22.630000 audit[1924]: NETFILTER_CFG table=filter:79 family=2 entries=7 op=nft_register_rule pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:22.632660 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 20:26:22.633211 kernel: audit: type=1325 audit(1707769582.630:676): table=filter:79 family=2 entries=7 op=nft_register_rule pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:22.630000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe1b1f0fd0 a2=0 a3=7ffe1b1f0fbc items=0 ppid=1658 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:22.640794 kernel: audit: type=1300 audit(1707769582.630:676): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffe1b1f0fd0 a2=0 a3=7ffe1b1f0fbc items=0 ppid=1658 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:22.630000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:22.631000 audit[1924]: NETFILTER_CFG table=nat:80 family=2 entries=85 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:22.652503 kernel: audit: type=1327 audit(1707769582.630:676): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:22.652613 kernel: audit: type=1325 audit(1707769582.631:677): table=nat:80 family=2 entries=85 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:22.631000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7ffe1b1f0fd0 a2=0 a3=7ffe1b1f0fbc items=0 ppid=1658 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:22.631000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:22.667211 kernel: audit: type=1300 audit(1707769582.631:677): arch=c000003e syscall=46 success=yes exit=28484 a0=3 a1=7ffe1b1f0fd0 a2=0 a3=7ffe1b1f0fbc items=0 ppid=1658 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:22.667317 kernel: audit: type=1327 audit(1707769582.631:677): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:22.681000 audit[1950]: NETFILTER_CFG table=filter:81 family=2 entries=6 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:22.681000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd62a47fd0 a2=0 a3=7ffd62a47fbc items=0 ppid=1658 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:22.691367 kernel: audit: type=1325 audit(1707769582.681:678): table=filter:81 family=2 entries=6 op=nft_register_rule pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:22.691438 kernel: audit: type=1300 audit(1707769582.681:678): arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd62a47fd0 a2=0 a3=7ffd62a47fbc items=0 ppid=1658 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:22.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:22.699767 kernel: audit: type=1327 audit(1707769582.681:678): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:22.699832 kernel: audit: type=1325 audit(1707769582.681:679): table=nat:82 family=2 entries=92 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:22.681000 audit[1950]: NETFILTER_CFG table=nat:82 family=2 entries=92 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:22.681000 audit[1950]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffd62a47fd0 a2=0 a3=7ffd62a47fbc items=0 ppid=1658 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:22.681000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:22.708183 kubelet[1380]: E0212 20:26:22.708066 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:23.709442 kubelet[1380]: E0212 20:26:23.709303 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:24.710384 kubelet[1380]: E0212 20:26:24.710278 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:25.711575 kubelet[1380]: E0212 20:26:25.711333 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:26.712382 kubelet[1380]: E0212 20:26:26.712268 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:27.712726 kubelet[1380]: E0212 20:26:27.712664 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:28.713423 kubelet[1380]: E0212 20:26:28.713373 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:29.565181 kubelet[1380]: I0212 20:26:29.565104 1380 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:26:29.583770 systemd[1]: Created slice kubepods-besteffort-podd7cbb1d3_f6e3_4630_974b_70bf568b0e35.slice. Feb 12 20:26:29.661285 kubelet[1380]: I0212 20:26:29.661210 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9fh5f\" (UniqueName: \"kubernetes.io/projected/d7cbb1d3-f6e3-4630-974b-70bf568b0e35-kube-api-access-9fh5f\") pod \"nginx-deployment-8ffc5cf85-7pq25\" (UID: \"d7cbb1d3-f6e3-4630-974b-70bf568b0e35\") " pod="default/nginx-deployment-8ffc5cf85-7pq25" Feb 12 20:26:29.714556 kubelet[1380]: E0212 20:26:29.714480 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:29.891391 env[1058]: time="2024-02-12T20:26:29.890825078Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-7pq25,Uid:d7cbb1d3-f6e3-4630-974b-70bf568b0e35,Namespace:default,Attempt:0,}" Feb 12 20:26:29.943880 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2221174734.mount: Deactivated successfully. Feb 12 20:26:30.213866 env[1058]: time="2024-02-12T20:26:30.213613753Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:30.222336 env[1058]: time="2024-02-12T20:26:30.222254045Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:30.224760 env[1058]: time="2024-02-12T20:26:30.224709970Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:30.228360 env[1058]: time="2024-02-12T20:26:30.228304360Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:30.229369 env[1058]: time="2024-02-12T20:26:30.229313622Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 20:26:30.255486 env[1058]: time="2024-02-12T20:26:30.255407472Z" level=info msg="CreateContainer within sandbox \"34fc618724bd80d4f3e754fc5193a80e3f88a591becae58435810cfb1e379b27\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 20:26:30.290216 env[1058]: time="2024-02-12T20:26:30.290164116Z" level=info msg="CreateContainer within sandbox \"34fc618724bd80d4f3e754fc5193a80e3f88a591becae58435810cfb1e379b27\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f514fad9d1aa78e50c4b0490944dbe5cd0aca9e715cd44de158f0b6edbcb2774\"" Feb 12 20:26:30.291134 env[1058]: time="2024-02-12T20:26:30.291111623Z" level=info msg="StartContainer for \"f514fad9d1aa78e50c4b0490944dbe5cd0aca9e715cd44de158f0b6edbcb2774\"" Feb 12 20:26:30.313745 systemd[1]: Started cri-containerd-f514fad9d1aa78e50c4b0490944dbe5cd0aca9e715cd44de158f0b6edbcb2774.scope. Feb 12 20:26:30.341902 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 20:26:30.342079 kernel: audit: type=1400 audit(1707769590.336:680): avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.336000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.336000 audit[1994]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa032c51738 items=0 ppid=1498 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:30.348972 kernel: audit: type=1300 audit(1707769590.336:680): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fa032c51738 items=0 ppid=1498 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:30.349229 env[1058]: time="2024-02-12T20:26:30.349148691Z" level=error msg="Failed to destroy network for sandbox \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:26:30.349790 env[1058]: time="2024-02-12T20:26:30.349751872Z" level=error msg="encountered an error cleaning up failed sandbox \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:26:30.349960 env[1058]: time="2024-02-12T20:26:30.349900601Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-7pq25,Uid:d7cbb1d3-f6e3-4630-974b-70bf568b0e35,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:26:30.350388 kubelet[1380]: E0212 20:26:30.350336 1380 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 20:26:30.350473 kubelet[1380]: E0212 20:26:30.350441 1380 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-7pq25" Feb 12 20:26:30.350473 kubelet[1380]: E0212 20:26:30.350473 1380 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-7pq25" Feb 12 20:26:30.350557 kubelet[1380]: E0212 20:26:30.350534 1380 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-7pq25_default(d7cbb1d3-f6e3-4630-974b-70bf568b0e35)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-7pq25_default(d7cbb1d3-f6e3-4630-974b-70bf568b0e35)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-7pq25" podUID=d7cbb1d3-f6e3-4630-974b-70bf568b0e35 Feb 12 20:26:30.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313466616439643161613738653530633462303439303934346462 Feb 12 20:26:30.357007 kernel: audit: type=1327 audit(1707769590.336:680): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313466616439643161613738653530633462303439303934346462 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.364153 kernel: audit: type=1400 audit(1707769590.341:681): avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.364205 kernel: audit: type=1400 audit(1707769590.341:681): avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.367621 kernel: audit: type=1400 audit(1707769590.341:681): avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.371957 kernel: audit: type=1400 audit(1707769590.341:681): avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.381080 kernel: audit: type=1400 audit(1707769590.341:681): avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.381128 kernel: audit: type=1400 audit(1707769590.341:681): avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.384790 kernel: audit: type=1400 audit(1707769590.341:681): avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit: BPF prog-id=81 op=LOAD Feb 12 20:26:30.341000 audit[1994]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002b9bd8 items=0 ppid=1498 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:30.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313466616439643161613738653530633462303439303934346462 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.341000 audit: BPF prog-id=82 op=LOAD Feb 12 20:26:30.341000 audit[1994]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002b9c28 items=0 ppid=1498 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:30.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313466616439643161613738653530633462303439303934346462 Feb 12 20:26:30.349000 audit: BPF prog-id=82 op=UNLOAD Feb 12 20:26:30.349000 audit: BPF prog-id=81 op=UNLOAD Feb 12 20:26:30.349000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.349000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.349000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.349000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.349000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.349000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.349000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.349000 audit[1994]: AVC avc: denied { perfmon } for pid=1994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.349000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.349000 audit[1994]: AVC avc: denied { bpf } for pid=1994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:30.349000 audit: BPF prog-id=83 op=LOAD Feb 12 20:26:30.349000 audit[1994]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000388698 items=0 ppid=1498 pid=1994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:30.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313466616439643161613738653530633462303439303934346462 Feb 12 20:26:30.386613 env[1058]: time="2024-02-12T20:26:30.386553811Z" level=info msg="StartContainer for \"f514fad9d1aa78e50c4b0490944dbe5cd0aca9e715cd44de158f0b6edbcb2774\" returns successfully" Feb 12 20:26:30.489341 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 20:26:30.490259 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 20:26:30.715071 kubelet[1380]: E0212 20:26:30.714975 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:30.817094 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d-shm.mount: Deactivated successfully. Feb 12 20:26:31.183591 kubelet[1380]: I0212 20:26:31.183540 1380 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Feb 12 20:26:31.185246 env[1058]: time="2024-02-12T20:26:31.185161745Z" level=info msg="StopPodSandbox for \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\"" Feb 12 20:26:31.225000 kubelet[1380]: I0212 20:26:31.221638 1380 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-t24g8" podStartSLOduration=-9.223371998633226e+09 pod.CreationTimestamp="2024-02-12 20:25:53 +0000 UTC" firstStartedPulling="2024-02-12 20:26:02.819968241 +0000 UTC m=+23.336667778" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:26:31.221104673 +0000 UTC m=+51.737804331" watchObservedRunningTime="2024-02-12 20:26:31.221549758 +0000 UTC m=+51.738249345" Feb 12 20:26:31.226416 systemd[1]: run-containerd-runc-k8s.io-f514fad9d1aa78e50c4b0490944dbe5cd0aca9e715cd44de158f0b6edbcb2774-runc.DbKyt0.mount: Deactivated successfully. Feb 12 20:26:31.480578 env[1058]: 2024-02-12 20:26:31.392 [INFO][2081] k8s.go 578: Cleaning up netns ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Feb 12 20:26:31.480578 env[1058]: 2024-02-12 20:26:31.393 [INFO][2081] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" iface="eth0" netns="/var/run/netns/cni-e22cd371-d296-9145-18c5-d038d41c918c" Feb 12 20:26:31.480578 env[1058]: 2024-02-12 20:26:31.397 [INFO][2081] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" iface="eth0" netns="/var/run/netns/cni-e22cd371-d296-9145-18c5-d038d41c918c" Feb 12 20:26:31.480578 env[1058]: 2024-02-12 20:26:31.400 [INFO][2081] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" iface="eth0" netns="/var/run/netns/cni-e22cd371-d296-9145-18c5-d038d41c918c" Feb 12 20:26:31.480578 env[1058]: 2024-02-12 20:26:31.400 [INFO][2081] k8s.go 585: Releasing IP address(es) ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Feb 12 20:26:31.480578 env[1058]: 2024-02-12 20:26:31.401 [INFO][2081] utils.go 188: Calico CNI releasing IP address ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Feb 12 20:26:31.480578 env[1058]: 2024-02-12 20:26:31.451 [INFO][2099] ipam_plugin.go 415: Releasing address using handleID ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" HandleID="k8s-pod-network.784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Workload="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:31.480578 env[1058]: 2024-02-12 20:26:31.451 [INFO][2099] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:31.480578 env[1058]: 2024-02-12 20:26:31.451 [INFO][2099] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:31.480578 env[1058]: 2024-02-12 20:26:31.467 [WARNING][2099] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" HandleID="k8s-pod-network.784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Workload="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:31.480578 env[1058]: 2024-02-12 20:26:31.467 [INFO][2099] ipam_plugin.go 443: Releasing address using workloadID ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" HandleID="k8s-pod-network.784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Workload="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:31.480578 env[1058]: 2024-02-12 20:26:31.475 [INFO][2099] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:31.480578 env[1058]: 2024-02-12 20:26:31.477 [INFO][2081] k8s.go 591: Teardown processing complete. ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Feb 12 20:26:31.486270 systemd[1]: run-netns-cni\x2de22cd371\x2dd296\x2d9145\x2d18c5\x2dd038d41c918c.mount: Deactivated successfully. Feb 12 20:26:31.487760 env[1058]: time="2024-02-12T20:26:31.487638781Z" level=info msg="TearDown network for sandbox \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\" successfully" Feb 12 20:26:31.488152 env[1058]: time="2024-02-12T20:26:31.487758907Z" level=info msg="StopPodSandbox for \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\" returns successfully" Feb 12 20:26:31.489508 env[1058]: time="2024-02-12T20:26:31.489423828Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-7pq25,Uid:d7cbb1d3-f6e3-4630-974b-70bf568b0e35,Namespace:default,Attempt:1,}" Feb 12 20:26:31.716000 kubelet[1380]: E0212 20:26:31.715897 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:31.773188 kernel: Initializing XFRM netlink socket Feb 12 20:26:31.794133 systemd-networkd[959]: calia360425f500: Link UP Feb 12 20:26:31.797642 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:26:31.797996 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia360425f500: link becomes ready Feb 12 20:26:31.799026 systemd-networkd[959]: calia360425f500: Gained carrier Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.581 [INFO][2105] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.612 [INFO][2105] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0 nginx-deployment-8ffc5cf85- default d7cbb1d3-f6e3-4630-974b-70bf568b0e35 1167 0 2024-02-12 20:26:29 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.150 nginx-deployment-8ffc5cf85-7pq25 eth0 default [] [] [kns.default ksa.default.default] calia360425f500 [] []}} ContainerID="50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" Namespace="default" Pod="nginx-deployment-8ffc5cf85-7pq25" WorkloadEndpoint="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-" Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.613 [INFO][2105] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" Namespace="default" Pod="nginx-deployment-8ffc5cf85-7pq25" WorkloadEndpoint="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.670 [INFO][2116] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" HandleID="k8s-pod-network.50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" Workload="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.696 [INFO][2116] ipam_plugin.go 268: Auto assigning IP ContainerID="50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" HandleID="k8s-pod-network.50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" Workload="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000529ee0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.150", "pod":"nginx-deployment-8ffc5cf85-7pq25", "timestamp":"2024-02-12 20:26:31.670232406 +0000 UTC"}, Hostname:"172.24.4.150", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.696 [INFO][2116] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.696 [INFO][2116] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.696 [INFO][2116] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.150' Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.703 [INFO][2116] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" host="172.24.4.150" Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.711 [INFO][2116] ipam.go 372: Looking up existing affinities for host host="172.24.4.150" Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.721 [INFO][2116] ipam.go 489: Trying affinity for 192.168.126.64/26 host="172.24.4.150" Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.724 [INFO][2116] ipam.go 155: Attempting to load block cidr=192.168.126.64/26 host="172.24.4.150" Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.728 [INFO][2116] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.64/26 host="172.24.4.150" Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.728 [INFO][2116] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.64/26 handle="k8s-pod-network.50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" host="172.24.4.150" Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.732 [INFO][2116] ipam.go 1682: Creating new handle: k8s-pod-network.50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0 Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.739 [INFO][2116] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.64/26 handle="k8s-pod-network.50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" host="172.24.4.150" Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.749 [INFO][2116] ipam.go 1216: Successfully claimed IPs: [192.168.126.65/26] block=192.168.126.64/26 handle="k8s-pod-network.50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" host="172.24.4.150" Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.749 [INFO][2116] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.65/26] handle="k8s-pod-network.50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" host="172.24.4.150" Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.749 [INFO][2116] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:31.820863 env[1058]: 2024-02-12 20:26:31.749 [INFO][2116] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.65/26] IPv6=[] ContainerID="50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" HandleID="k8s-pod-network.50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" Workload="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:31.822567 env[1058]: 2024-02-12 20:26:31.754 [INFO][2105] k8s.go 385: Populated endpoint ContainerID="50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" Namespace="default" Pod="nginx-deployment-8ffc5cf85-7pq25" WorkloadEndpoint="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d7cbb1d3-f6e3-4630-974b-70bf568b0e35", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 26, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.150", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-7pq25", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia360425f500", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:31.822567 env[1058]: 2024-02-12 20:26:31.755 [INFO][2105] k8s.go 386: Calico CNI using IPs: [192.168.126.65/32] ContainerID="50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" Namespace="default" Pod="nginx-deployment-8ffc5cf85-7pq25" WorkloadEndpoint="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:31.822567 env[1058]: 2024-02-12 20:26:31.755 [INFO][2105] dataplane_linux.go 68: Setting the host side veth name to calia360425f500 ContainerID="50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" Namespace="default" Pod="nginx-deployment-8ffc5cf85-7pq25" WorkloadEndpoint="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:31.822567 env[1058]: 2024-02-12 20:26:31.800 [INFO][2105] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" Namespace="default" Pod="nginx-deployment-8ffc5cf85-7pq25" WorkloadEndpoint="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:31.822567 env[1058]: 2024-02-12 20:26:31.801 [INFO][2105] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" Namespace="default" Pod="nginx-deployment-8ffc5cf85-7pq25" WorkloadEndpoint="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d7cbb1d3-f6e3-4630-974b-70bf568b0e35", ResourceVersion:"1167", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 26, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.150", ContainerID:"50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0", Pod:"nginx-deployment-8ffc5cf85-7pq25", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia360425f500", MAC:"a6:b3:ea:0e:70:1b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:31.822567 env[1058]: 2024-02-12 20:26:31.817 [INFO][2105] k8s.go 491: Wrote updated endpoint to datastore ContainerID="50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0" Namespace="default" Pod="nginx-deployment-8ffc5cf85-7pq25" WorkloadEndpoint="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:31.852042 env[1058]: time="2024-02-12T20:26:31.851892840Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:26:31.852197 env[1058]: time="2024-02-12T20:26:31.852108665Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:26:31.852233 env[1058]: time="2024-02-12T20:26:31.852186471Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:26:31.852560 env[1058]: time="2024-02-12T20:26:31.852484189Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0 pid=2140 runtime=io.containerd.runc.v2 Feb 12 20:26:31.876866 systemd[1]: Started cri-containerd-50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0.scope. Feb 12 20:26:31.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.896000 audit: BPF prog-id=84 op=LOAD Feb 12 20:26:31.898000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.898000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2140 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:31.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530636666636636623731393534313164656533663138316430353633 Feb 12 20:26:31.898000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.898000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2140 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:31.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530636666636636623731393534313164656533663138316430353633 Feb 12 20:26:31.898000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.898000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.898000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.898000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.898000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.898000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.898000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.898000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.898000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.898000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.898000 audit: BPF prog-id=85 op=LOAD Feb 12 20:26:31.898000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000298e00 items=0 ppid=2140 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:31.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530636666636636623731393534313164656533663138316430353633 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit: BPF prog-id=86 op=LOAD Feb 12 20:26:31.899000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000298e48 items=0 ppid=2140 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:31.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530636666636636623731393534313164656533663138316430353633 Feb 12 20:26:31.899000 audit: BPF prog-id=86 op=UNLOAD Feb 12 20:26:31.899000 audit: BPF prog-id=85 op=UNLOAD Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:31.899000 audit: BPF prog-id=87 op=LOAD Feb 12 20:26:31.899000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000299258 items=0 ppid=2140 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:31.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530636666636636623731393534313164656533663138316430353633 Feb 12 20:26:31.951349 env[1058]: time="2024-02-12T20:26:31.951276231Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-7pq25,Uid:d7cbb1d3-f6e3-4630-974b-70bf568b0e35,Namespace:default,Attempt:1,} returns sandbox id \"50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0\"" Feb 12 20:26:31.953543 env[1058]: time="2024-02-12T20:26:31.953499140Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 20:26:32.007000 audit[2233]: AVC avc: denied { write } for pid=2233 comm="tee" name="fd" dev="proc" ino=20110 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:26:32.007000 audit[2233]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8f525973 a2=241 a3=1b6 items=1 ppid=2206 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.007000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 20:26:32.007000 audit: PATH item=0 name="/dev/fd/63" inode=20107 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.007000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:26:32.045000 audit[2241]: AVC avc: denied { write } for pid=2241 comm="tee" name="fd" dev="proc" ino=18885 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:26:32.045000 audit[2241]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe4252973 a2=241 a3=1b6 items=1 ppid=2208 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.045000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 20:26:32.045000 audit: PATH item=0 name="/dev/fd/63" inode=18872 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.045000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:26:32.066000 audit[2249]: AVC avc: denied { write } for pid=2249 comm="tee" name="fd" dev="proc" ino=20128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:26:32.066000 audit[2249]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd76451964 a2=241 a3=1b6 items=1 ppid=2205 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.066000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 20:26:32.066000 audit: PATH item=0 name="/dev/fd/63" inode=18880 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.066000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:26:32.070000 audit[2247]: AVC avc: denied { write } for pid=2247 comm="tee" name="fd" dev="proc" ino=18899 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:26:32.070000 audit[2247]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda734e963 a2=241 a3=1b6 items=1 ppid=2211 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.070000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 20:26:32.070000 audit: PATH item=0 name="/dev/fd/63" inode=18877 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.070000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:26:32.076000 audit[2273]: AVC avc: denied { write } for pid=2273 comm="tee" name="fd" dev="proc" ino=18906 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:26:32.076000 audit[2273]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff18869975 a2=241 a3=1b6 items=1 ppid=2219 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.076000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 20:26:32.076000 audit: PATH item=0 name="/dev/fd/63" inode=18893 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.076000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:26:32.080000 audit[2261]: AVC avc: denied { write } for pid=2261 comm="tee" name="fd" dev="proc" ino=20132 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:26:32.080000 audit[2261]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3a7ac974 a2=241 a3=1b6 items=1 ppid=2226 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.080000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 20:26:32.080000 audit: PATH item=0 name="/dev/fd/63" inode=18889 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.080000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:26:32.086000 audit[2264]: AVC avc: denied { write } for pid=2264 comm="tee" name="fd" dev="proc" ino=18916 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 20:26:32.086000 audit[2264]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcfb0a8973 a2=241 a3=1b6 items=1 ppid=2213 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.086000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 20:26:32.086000 audit: PATH item=0 name="/dev/fd/63" inode=18890 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:26:32.086000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 20:26:32.486000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.486000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.486000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.486000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.486000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.486000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.486000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.486000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.486000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.486000 audit: BPF prog-id=88 op=LOAD Feb 12 20:26:32.486000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc35e1710 a2=70 a3=7fbf0591e000 items=0 ppid=2214 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.486000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:26:32.488000 audit: BPF prog-id=88 op=UNLOAD Feb 12 20:26:32.488000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.488000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.488000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.488000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.488000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.488000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.488000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.488000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.488000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.488000 audit: BPF prog-id=89 op=LOAD Feb 12 20:26:32.488000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc35e1710 a2=70 a3=6e items=0 ppid=2214 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.488000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:26:32.489000 audit: BPF prog-id=89 op=UNLOAD Feb 12 20:26:32.489000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.489000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcc35e16c0 a2=70 a3=470860 items=0 ppid=2214 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.489000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:26:32.489000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.489000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.489000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.489000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.489000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.489000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.489000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.489000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.489000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.489000 audit: BPF prog-id=90 op=LOAD Feb 12 20:26:32.489000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcc35e16a0 a2=70 a3=7ffcc35e1710 items=0 ppid=2214 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.489000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:26:32.491000 audit: BPF prog-id=90 op=UNLOAD Feb 12 20:26:32.491000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.491000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc35e1780 a2=70 a3=0 items=0 ppid=2214 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.491000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:26:32.491000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.491000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc35e1770 a2=70 a3=0 items=0 ppid=2214 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.491000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:26:32.491000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.491000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffcc35e17b0 a2=70 a3=fe00 items=0 ppid=2214 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.491000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:26:32.492000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.492000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.492000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.492000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.492000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.492000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.492000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.492000 audit[2363]: AVC avc: denied { perfmon } for pid=2363 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.492000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.492000 audit[2363]: AVC avc: denied { bpf } for pid=2363 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.492000 audit: BPF prog-id=91 op=LOAD Feb 12 20:26:32.492000 audit[2363]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcc35e16d0 a2=70 a3=ffffffff items=0 ppid=2214 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.492000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 20:26:32.497000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.497000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffe54cbc70 a2=70 a3=ffff items=0 ppid=2214 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.497000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:26:32.497000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:32.497000 audit[2367]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffe54cbb40 a2=70 a3=3 items=0 ppid=2214 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.497000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 20:26:32.501000 audit: BPF prog-id=91 op=UNLOAD Feb 12 20:26:32.501000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=32 a0=3 a1=7fffae616110 a2=0 a3=0 items=0 ppid=2214 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip" exe="/usr/sbin/ip" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.501000 audit: PROCTITLE proctitle=6970006C696E6B0064656C0063616C69636F5F746D705F41 Feb 12 20:26:32.576000 audit[2389]: NETFILTER_CFG table=raw:83 family=2 entries=19 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:26:32.576000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffefeb521f0 a2=0 a3=7ffefeb521dc items=0 ppid=2214 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.576000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:26:32.589000 audit[2390]: NETFILTER_CFG table=mangle:84 family=2 entries=19 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:26:32.589000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffef39eb220 a2=0 a3=7ffef39eb20c items=0 ppid=2214 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.589000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:26:32.596000 audit[2393]: NETFILTER_CFG table=nat:85 family=2 entries=16 op=nft_register_chain pid=2393 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:26:32.596000 audit[2393]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffc5e2d2d30 a2=0 a3=7ffc5e2d2d1c items=0 ppid=2214 pid=2393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.596000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:26:32.598000 audit[2392]: NETFILTER_CFG table=filter:86 family=2 entries=71 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:26:32.598000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=36604 a0=3 a1=7ffc02b2c980 a2=0 a3=0 items=0 ppid=2214 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:32.598000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:26:32.717026 kubelet[1380]: E0212 20:26:32.716893 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:32.811020 systemd[1]: run-containerd-runc-k8s.io-f514fad9d1aa78e50c4b0490944dbe5cd0aca9e715cd44de158f0b6edbcb2774-runc.hPsJv4.mount: Deactivated successfully. Feb 12 20:26:32.817355 systemd-networkd[959]: calia360425f500: Gained IPv6LL Feb 12 20:26:33.411844 systemd-networkd[959]: vxlan.calico: Link UP Feb 12 20:26:33.411855 systemd-networkd[959]: vxlan.calico: Gained carrier Feb 12 20:26:33.717724 kubelet[1380]: E0212 20:26:33.717609 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:33.984266 env[1058]: time="2024-02-12T20:26:33.984104233Z" level=info msg="StopPodSandbox for \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\"" Feb 12 20:26:34.223956 env[1058]: 2024-02-12 20:26:34.155 [INFO][2424] k8s.go 578: Cleaning up netns ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:34.223956 env[1058]: 2024-02-12 20:26:34.155 [INFO][2424] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" iface="eth0" netns="/var/run/netns/cni-3b457d6b-d758-d0f7-1fdb-6bd9cb7fb51a" Feb 12 20:26:34.223956 env[1058]: 2024-02-12 20:26:34.155 [INFO][2424] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" iface="eth0" netns="/var/run/netns/cni-3b457d6b-d758-d0f7-1fdb-6bd9cb7fb51a" Feb 12 20:26:34.223956 env[1058]: 2024-02-12 20:26:34.155 [INFO][2424] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" iface="eth0" netns="/var/run/netns/cni-3b457d6b-d758-d0f7-1fdb-6bd9cb7fb51a" Feb 12 20:26:34.223956 env[1058]: 2024-02-12 20:26:34.155 [INFO][2424] k8s.go 585: Releasing IP address(es) ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:34.223956 env[1058]: 2024-02-12 20:26:34.155 [INFO][2424] utils.go 188: Calico CNI releasing IP address ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:34.223956 env[1058]: 2024-02-12 20:26:34.189 [INFO][2431] ipam_plugin.go 415: Releasing address using handleID ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" HandleID="k8s-pod-network.a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Workload="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:34.223956 env[1058]: 2024-02-12 20:26:34.190 [INFO][2431] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:34.223956 env[1058]: 2024-02-12 20:26:34.190 [INFO][2431] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:34.223956 env[1058]: 2024-02-12 20:26:34.214 [WARNING][2431] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" HandleID="k8s-pod-network.a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Workload="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:34.223956 env[1058]: 2024-02-12 20:26:34.214 [INFO][2431] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" HandleID="k8s-pod-network.a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Workload="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:34.223956 env[1058]: 2024-02-12 20:26:34.217 [INFO][2431] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:34.223956 env[1058]: 2024-02-12 20:26:34.218 [INFO][2424] k8s.go 591: Teardown processing complete. ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:34.227717 systemd[1]: run-netns-cni\x2d3b457d6b\x2dd758\x2dd0f7\x2d1fdb\x2d6bd9cb7fb51a.mount: Deactivated successfully. Feb 12 20:26:34.229110 env[1058]: time="2024-02-12T20:26:34.229071793Z" level=info msg="TearDown network for sandbox \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\" successfully" Feb 12 20:26:34.229211 env[1058]: time="2024-02-12T20:26:34.229191026Z" level=info msg="StopPodSandbox for \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\" returns successfully" Feb 12 20:26:34.244309 env[1058]: time="2024-02-12T20:26:34.244195573Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vdblc,Uid:3156e51a-eccc-4b8f-ab23-6038b0834945,Namespace:calico-system,Attempt:1,}" Feb 12 20:26:34.717956 kubelet[1380]: E0212 20:26:34.717725 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:34.872352 systemd-networkd[959]: vxlan.calico: Gained IPv6LL Feb 12 20:26:34.886264 systemd-networkd[959]: calid644a849803: Link UP Feb 12 20:26:34.890288 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:26:34.890508 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid644a849803: link becomes ready Feb 12 20:26:34.888835 systemd-networkd[959]: calid644a849803: Gained carrier Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.341 [INFO][2437] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.150-k8s-csi--node--driver--vdblc-eth0 csi-node-driver- calico-system 3156e51a-eccc-4b8f-ab23-6038b0834945 1182 0 2024-02-12 20:25:53 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.150 csi-node-driver-vdblc eth0 default [] [] [kns.calico-system ksa.calico-system.default] calid644a849803 [] []}} ContainerID="001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" Namespace="calico-system" Pod="csi-node-driver-vdblc" WorkloadEndpoint="172.24.4.150-k8s-csi--node--driver--vdblc-" Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.341 [INFO][2437] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" Namespace="calico-system" Pod="csi-node-driver-vdblc" WorkloadEndpoint="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.483 [INFO][2450] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" HandleID="k8s-pod-network.001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" Workload="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.519 [INFO][2450] ipam_plugin.go 268: Auto assigning IP ContainerID="001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" HandleID="k8s-pod-network.001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" Workload="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002a0bc0), Attrs:map[string]string{"namespace":"calico-system", "node":"172.24.4.150", "pod":"csi-node-driver-vdblc", "timestamp":"2024-02-12 20:26:34.483633164 +0000 UTC"}, Hostname:"172.24.4.150", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.519 [INFO][2450] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.520 [INFO][2450] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.520 [INFO][2450] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.150' Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.680 [INFO][2450] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" host="172.24.4.150" Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.785 [INFO][2450] ipam.go 372: Looking up existing affinities for host host="172.24.4.150" Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.804 [INFO][2450] ipam.go 489: Trying affinity for 192.168.126.64/26 host="172.24.4.150" Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.810 [INFO][2450] ipam.go 155: Attempting to load block cidr=192.168.126.64/26 host="172.24.4.150" Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.816 [INFO][2450] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.64/26 host="172.24.4.150" Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.816 [INFO][2450] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.64/26 handle="k8s-pod-network.001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" host="172.24.4.150" Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.820 [INFO][2450] ipam.go 1682: Creating new handle: k8s-pod-network.001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.844 [INFO][2450] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.64/26 handle="k8s-pod-network.001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" host="172.24.4.150" Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.857 [INFO][2450] ipam.go 1216: Successfully claimed IPs: [192.168.126.66/26] block=192.168.126.64/26 handle="k8s-pod-network.001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" host="172.24.4.150" Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.857 [INFO][2450] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.66/26] handle="k8s-pod-network.001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" host="172.24.4.150" Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.858 [INFO][2450] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:34.922593 env[1058]: 2024-02-12 20:26:34.859 [INFO][2450] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.66/26] IPv6=[] ContainerID="001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" HandleID="k8s-pod-network.001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" Workload="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:34.923302 env[1058]: 2024-02-12 20:26:34.862 [INFO][2437] k8s.go 385: Populated endpoint ContainerID="001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" Namespace="calico-system" Pod="csi-node-driver-vdblc" WorkloadEndpoint="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150-k8s-csi--node--driver--vdblc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3156e51a-eccc-4b8f-ab23-6038b0834945", ResourceVersion:"1182", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.150", ContainerID:"", Pod:"csi-node-driver-vdblc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid644a849803", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:34.923302 env[1058]: 2024-02-12 20:26:34.862 [INFO][2437] k8s.go 386: Calico CNI using IPs: [192.168.126.66/32] ContainerID="001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" Namespace="calico-system" Pod="csi-node-driver-vdblc" WorkloadEndpoint="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:34.923302 env[1058]: 2024-02-12 20:26:34.863 [INFO][2437] dataplane_linux.go 68: Setting the host side veth name to calid644a849803 ContainerID="001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" Namespace="calico-system" Pod="csi-node-driver-vdblc" WorkloadEndpoint="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:34.923302 env[1058]: 2024-02-12 20:26:34.892 [INFO][2437] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" Namespace="calico-system" Pod="csi-node-driver-vdblc" WorkloadEndpoint="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:34.923302 env[1058]: 2024-02-12 20:26:34.893 [INFO][2437] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" Namespace="calico-system" Pod="csi-node-driver-vdblc" WorkloadEndpoint="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150-k8s-csi--node--driver--vdblc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3156e51a-eccc-4b8f-ab23-6038b0834945", ResourceVersion:"1182", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.150", ContainerID:"001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c", Pod:"csi-node-driver-vdblc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid644a849803", MAC:"32:81:e0:57:e5:71", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:34.923302 env[1058]: 2024-02-12 20:26:34.917 [INFO][2437] k8s.go 491: Wrote updated endpoint to datastore ContainerID="001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c" Namespace="calico-system" Pod="csi-node-driver-vdblc" WorkloadEndpoint="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:34.949000 audit[2468]: NETFILTER_CFG table=filter:87 family=2 entries=40 op=nft_register_chain pid=2468 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:26:34.949000 audit[2468]: SYSCALL arch=c000003e syscall=46 success=yes exit=21096 a0=3 a1=7ffea9c68e60 a2=0 a3=7ffea9c68e4c items=0 ppid=2214 pid=2468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:34.949000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:26:35.083308 env[1058]: time="2024-02-12T20:26:35.081529868Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:26:35.083308 env[1058]: time="2024-02-12T20:26:35.081586003Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:26:35.083308 env[1058]: time="2024-02-12T20:26:35.081607043Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:26:35.083308 env[1058]: time="2024-02-12T20:26:35.081797119Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c pid=2479 runtime=io.containerd.runc.v2 Feb 12 20:26:35.105419 systemd[1]: Started cri-containerd-001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c.scope. Feb 12 20:26:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.126000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.126000 audit: BPF prog-id=92 op=LOAD Feb 12 20:26:35.127000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.127000 audit[2489]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2479 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:35.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030316166353265643039366531303538326463373435333165383330 Feb 12 20:26:35.127000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.127000 audit[2489]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2479 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:35.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030316166353265643039366531303538326463373435333165383330 Feb 12 20:26:35.127000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.127000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.127000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.127000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.127000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.127000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.127000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.127000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.127000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.127000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.127000 audit: BPF prog-id=93 op=LOAD Feb 12 20:26:35.127000 audit[2489]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000329d10 items=0 ppid=2479 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:35.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030316166353265643039366531303538326463373435333165383330 Feb 12 20:26:35.128000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.128000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.128000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.128000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.128000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.128000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.128000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.128000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.128000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.128000 audit: BPF prog-id=94 op=LOAD Feb 12 20:26:35.128000 audit[2489]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000329d58 items=0 ppid=2479 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:35.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030316166353265643039366531303538326463373435333165383330 Feb 12 20:26:35.129000 audit: BPF prog-id=94 op=UNLOAD Feb 12 20:26:35.129000 audit: BPF prog-id=93 op=UNLOAD Feb 12 20:26:35.129000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.129000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.129000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.129000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.129000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.129000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.129000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.129000 audit[2489]: AVC avc: denied { perfmon } for pid=2489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.129000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.129000 audit[2489]: AVC avc: denied { bpf } for pid=2489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:35.129000 audit: BPF prog-id=95 op=LOAD Feb 12 20:26:35.129000 audit[2489]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000380168 items=0 ppid=2479 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:35.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030316166353265643039366531303538326463373435333165383330 Feb 12 20:26:35.152304 env[1058]: time="2024-02-12T20:26:35.152260746Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vdblc,Uid:3156e51a-eccc-4b8f-ab23-6038b0834945,Namespace:calico-system,Attempt:1,} returns sandbox id \"001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c\"" Feb 12 20:26:35.718096 kubelet[1380]: E0212 20:26:35.718042 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:36.593671 systemd-networkd[959]: calid644a849803: Gained IPv6LL Feb 12 20:26:36.676902 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3525355111.mount: Deactivated successfully. Feb 12 20:26:36.718992 kubelet[1380]: E0212 20:26:36.718885 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:37.719991 kubelet[1380]: E0212 20:26:37.719869 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:38.042369 env[1058]: time="2024-02-12T20:26:38.042291956Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:38.044577 env[1058]: time="2024-02-12T20:26:38.044552034Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:38.046882 env[1058]: time="2024-02-12T20:26:38.046857438Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:38.051181 env[1058]: time="2024-02-12T20:26:38.051095996Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:38.052692 env[1058]: time="2024-02-12T20:26:38.052616677Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 20:26:38.055969 env[1058]: time="2024-02-12T20:26:38.055886049Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 20:26:38.056975 env[1058]: time="2024-02-12T20:26:38.056920979Z" level=info msg="CreateContainer within sandbox \"50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 20:26:38.083697 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2655080536.mount: Deactivated successfully. Feb 12 20:26:38.100987 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4247010624.mount: Deactivated successfully. Feb 12 20:26:38.111717 env[1058]: time="2024-02-12T20:26:38.111568639Z" level=info msg="CreateContainer within sandbox \"50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"5b484c6c99370c4c85d8cd5f0f96eb546d587d38bc0dc4312499a8820257c619\"" Feb 12 20:26:38.113505 env[1058]: time="2024-02-12T20:26:38.113428257Z" level=info msg="StartContainer for \"5b484c6c99370c4c85d8cd5f0f96eb546d587d38bc0dc4312499a8820257c619\"" Feb 12 20:26:38.156825 systemd[1]: Started cri-containerd-5b484c6c99370c4c85d8cd5f0f96eb546d587d38bc0dc4312499a8820257c619.scope. Feb 12 20:26:38.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.182117 kernel: kauditd_printk_skb: 270 callbacks suppressed Feb 12 20:26:38.182192 kernel: audit: type=1400 audit(1707769598.179:748): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.188884 kernel: audit: type=1400 audit(1707769598.179:749): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.188954 kernel: audit: type=1400 audit(1707769598.179:750): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.195846 kernel: audit: type=1400 audit(1707769598.179:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.195916 kernel: audit: type=1400 audit(1707769598.179:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.204144 kernel: audit: type=1400 audit(1707769598.179:753): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.204252 kernel: audit: type=1400 audit(1707769598.179:754): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.211893 kernel: audit: type=1400 audit(1707769598.179:755): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.211977 kernel: audit: type=1400 audit(1707769598.179:756): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.219321 kernel: audit: type=1400 audit(1707769598.179:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.179000 audit: BPF prog-id=96 op=LOAD Feb 12 20:26:38.180000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.180000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2140 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:38.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343834633663393933373063346338356438636435663066393665 Feb 12 20:26:38.180000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.180000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2140 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:38.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343834633663393933373063346338356438636435663066393665 Feb 12 20:26:38.180000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.180000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.180000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.180000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.180000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.180000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.180000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.180000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.180000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.180000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.180000 audit: BPF prog-id=97 op=LOAD Feb 12 20:26:38.180000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000359d10 items=0 ppid=2140 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:38.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343834633663393933373063346338356438636435663066393665 Feb 12 20:26:38.184000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.184000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.184000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.184000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.184000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.184000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.184000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.184000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.184000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.184000 audit: BPF prog-id=98 op=LOAD Feb 12 20:26:38.184000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000359d58 items=0 ppid=2140 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:38.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343834633663393933373063346338356438636435663066393665 Feb 12 20:26:38.191000 audit: BPF prog-id=98 op=UNLOAD Feb 12 20:26:38.191000 audit: BPF prog-id=97 op=UNLOAD Feb 12 20:26:38.191000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.191000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.191000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.191000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.191000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.191000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.191000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.191000 audit[2527]: AVC avc: denied { perfmon } for pid=2527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.191000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.191000 audit[2527]: AVC avc: denied { bpf } for pid=2527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:38.191000 audit: BPF prog-id=99 op=LOAD Feb 12 20:26:38.191000 audit[2527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c2168 items=0 ppid=2140 pid=2527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:38.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562343834633663393933373063346338356438636435663066393665 Feb 12 20:26:38.244270 env[1058]: time="2024-02-12T20:26:38.244168983Z" level=info msg="StartContainer for \"5b484c6c99370c4c85d8cd5f0f96eb546d587d38bc0dc4312499a8820257c619\" returns successfully" Feb 12 20:26:38.270179 kubelet[1380]: I0212 20:26:38.270153 1380 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-7pq25" podStartSLOduration=-9.223372027584684e+09 pod.CreationTimestamp="2024-02-12 20:26:29 +0000 UTC" firstStartedPulling="2024-02-12 20:26:31.952946383 +0000 UTC m=+52.469645920" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:26:38.26985374 +0000 UTC m=+58.786553297" watchObservedRunningTime="2024-02-12 20:26:38.270091236 +0000 UTC m=+58.786790773" Feb 12 20:26:38.720273 kubelet[1380]: E0212 20:26:38.720207 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:39.721525 kubelet[1380]: E0212 20:26:39.721458 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:39.750707 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2217577251.mount: Deactivated successfully. Feb 12 20:26:40.452160 env[1058]: time="2024-02-12T20:26:40.452046210Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:40.454902 env[1058]: time="2024-02-12T20:26:40.454845691Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:40.457871 env[1058]: time="2024-02-12T20:26:40.457838863Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:40.460790 env[1058]: time="2024-02-12T20:26:40.460766394Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:40.461685 env[1058]: time="2024-02-12T20:26:40.461660942Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 20:26:40.465063 env[1058]: time="2024-02-12T20:26:40.464991758Z" level=info msg="CreateContainer within sandbox \"001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 20:26:40.485519 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1344659357.mount: Deactivated successfully. Feb 12 20:26:40.496863 env[1058]: time="2024-02-12T20:26:40.496822570Z" level=info msg="CreateContainer within sandbox \"001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"7115448d6392575718aed09ac1bdad73d8dfbd853b7d0fe0e680057ebca24d3b\"" Feb 12 20:26:40.497736 env[1058]: time="2024-02-12T20:26:40.497715385Z" level=info msg="StartContainer for \"7115448d6392575718aed09ac1bdad73d8dfbd853b7d0fe0e680057ebca24d3b\"" Feb 12 20:26:40.526367 systemd[1]: Started cri-containerd-7115448d6392575718aed09ac1bdad73d8dfbd853b7d0fe0e680057ebca24d3b.scope. Feb 12 20:26:40.557000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.557000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f72365e09d8 items=0 ppid=2479 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:40.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731313534343864363339323537353731386165643039616331626461 Feb 12 20:26:40.557000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.557000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.557000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.557000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.557000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.557000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.557000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.557000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.557000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.557000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.557000 audit: BPF prog-id=100 op=LOAD Feb 12 20:26:40.557000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000279ca8 items=0 ppid=2479 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:40.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731313534343864363339323537353731386165643039616331626461 Feb 12 20:26:40.558000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.558000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.558000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.558000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.558000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.558000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.558000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.558000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.558000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.558000 audit: BPF prog-id=101 op=LOAD Feb 12 20:26:40.558000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000279cf8 items=0 ppid=2479 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:40.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731313534343864363339323537353731386165643039616331626461 Feb 12 20:26:40.559000 audit: BPF prog-id=101 op=UNLOAD Feb 12 20:26:40.559000 audit: BPF prog-id=100 op=UNLOAD Feb 12 20:26:40.559000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.559000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.559000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.559000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.559000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.559000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.559000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.559000 audit[2588]: AVC avc: denied { perfmon } for pid=2588 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.559000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.559000 audit[2588]: AVC avc: denied { bpf } for pid=2588 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:40.559000 audit: BPF prog-id=102 op=LOAD Feb 12 20:26:40.559000 audit[2588]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000279d88 items=0 ppid=2479 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:40.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731313534343864363339323537353731386165643039616331626461 Feb 12 20:26:40.588556 env[1058]: time="2024-02-12T20:26:40.588515083Z" level=info msg="StartContainer for \"7115448d6392575718aed09ac1bdad73d8dfbd853b7d0fe0e680057ebca24d3b\" returns successfully" Feb 12 20:26:40.590240 env[1058]: time="2024-02-12T20:26:40.590211094Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 20:26:40.670052 kubelet[1380]: E0212 20:26:40.669852 1380 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:40.714795 env[1058]: time="2024-02-12T20:26:40.714653562Z" level=info msg="StopPodSandbox for \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\"" Feb 12 20:26:40.722270 kubelet[1380]: E0212 20:26:40.722211 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:40.879906 env[1058]: 2024-02-12 20:26:40.805 [WARNING][2631] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d7cbb1d3-f6e3-4630-974b-70bf568b0e35", ResourceVersion:"1197", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 26, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.150", ContainerID:"50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0", Pod:"nginx-deployment-8ffc5cf85-7pq25", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia360425f500", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:40.879906 env[1058]: 2024-02-12 20:26:40.805 [INFO][2631] k8s.go 578: Cleaning up netns ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Feb 12 20:26:40.879906 env[1058]: 2024-02-12 20:26:40.805 [INFO][2631] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" iface="eth0" netns="" Feb 12 20:26:40.879906 env[1058]: 2024-02-12 20:26:40.805 [INFO][2631] k8s.go 585: Releasing IP address(es) ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Feb 12 20:26:40.879906 env[1058]: 2024-02-12 20:26:40.805 [INFO][2631] utils.go 188: Calico CNI releasing IP address ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Feb 12 20:26:40.879906 env[1058]: 2024-02-12 20:26:40.854 [INFO][2638] ipam_plugin.go 415: Releasing address using handleID ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" HandleID="k8s-pod-network.784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Workload="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:40.879906 env[1058]: 2024-02-12 20:26:40.854 [INFO][2638] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:40.879906 env[1058]: 2024-02-12 20:26:40.854 [INFO][2638] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:40.879906 env[1058]: 2024-02-12 20:26:40.872 [WARNING][2638] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" HandleID="k8s-pod-network.784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Workload="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:40.879906 env[1058]: 2024-02-12 20:26:40.872 [INFO][2638] ipam_plugin.go 443: Releasing address using workloadID ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" HandleID="k8s-pod-network.784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Workload="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:40.879906 env[1058]: 2024-02-12 20:26:40.875 [INFO][2638] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:40.879906 env[1058]: 2024-02-12 20:26:40.877 [INFO][2631] k8s.go 591: Teardown processing complete. ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Feb 12 20:26:40.879906 env[1058]: time="2024-02-12T20:26:40.879899221Z" level=info msg="TearDown network for sandbox \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\" successfully" Feb 12 20:26:40.880729 env[1058]: time="2024-02-12T20:26:40.879954795Z" level=info msg="StopPodSandbox for \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\" returns successfully" Feb 12 20:26:40.881181 env[1058]: time="2024-02-12T20:26:40.881142291Z" level=info msg="RemovePodSandbox for \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\"" Feb 12 20:26:40.881355 env[1058]: time="2024-02-12T20:26:40.881288024Z" level=info msg="Forcibly stopping sandbox \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\"" Feb 12 20:26:40.992475 env[1058]: 2024-02-12 20:26:40.943 [WARNING][2656] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d7cbb1d3-f6e3-4630-974b-70bf568b0e35", ResourceVersion:"1197", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 26, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.150", ContainerID:"50cffcf6b7195411dee3f181d05636b4933770902e3e467dd1f0f2b816b7d3b0", Pod:"nginx-deployment-8ffc5cf85-7pq25", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia360425f500", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:40.992475 env[1058]: 2024-02-12 20:26:40.943 [INFO][2656] k8s.go 578: Cleaning up netns ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Feb 12 20:26:40.992475 env[1058]: 2024-02-12 20:26:40.943 [INFO][2656] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" iface="eth0" netns="" Feb 12 20:26:40.992475 env[1058]: 2024-02-12 20:26:40.943 [INFO][2656] k8s.go 585: Releasing IP address(es) ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Feb 12 20:26:40.992475 env[1058]: 2024-02-12 20:26:40.943 [INFO][2656] utils.go 188: Calico CNI releasing IP address ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Feb 12 20:26:40.992475 env[1058]: 2024-02-12 20:26:40.968 [INFO][2662] ipam_plugin.go 415: Releasing address using handleID ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" HandleID="k8s-pod-network.784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Workload="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:40.992475 env[1058]: 2024-02-12 20:26:40.968 [INFO][2662] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:40.992475 env[1058]: 2024-02-12 20:26:40.968 [INFO][2662] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:40.992475 env[1058]: 2024-02-12 20:26:40.983 [WARNING][2662] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" HandleID="k8s-pod-network.784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Workload="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:40.992475 env[1058]: 2024-02-12 20:26:40.983 [INFO][2662] ipam_plugin.go 443: Releasing address using workloadID ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" HandleID="k8s-pod-network.784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Workload="172.24.4.150-k8s-nginx--deployment--8ffc5cf85--7pq25-eth0" Feb 12 20:26:40.992475 env[1058]: 2024-02-12 20:26:40.990 [INFO][2662] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:40.992475 env[1058]: 2024-02-12 20:26:40.991 [INFO][2656] k8s.go 591: Teardown processing complete. ContainerID="784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d" Feb 12 20:26:40.993576 env[1058]: time="2024-02-12T20:26:40.992368346Z" level=info msg="TearDown network for sandbox \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\" successfully" Feb 12 20:26:40.996365 env[1058]: time="2024-02-12T20:26:40.996328181Z" level=info msg="RemovePodSandbox \"784a4dd8c6a15546351950bb7a1edb479ce028e1877043cb3acc212522983a8d\" returns successfully" Feb 12 20:26:40.996941 env[1058]: time="2024-02-12T20:26:40.996896307Z" level=info msg="StopPodSandbox for \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\"" Feb 12 20:26:41.113093 env[1058]: 2024-02-12 20:26:41.051 [WARNING][2682] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150-k8s-csi--node--driver--vdblc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3156e51a-eccc-4b8f-ab23-6038b0834945", ResourceVersion:"1186", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.150", ContainerID:"001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c", Pod:"csi-node-driver-vdblc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid644a849803", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:41.113093 env[1058]: 2024-02-12 20:26:41.051 [INFO][2682] k8s.go 578: Cleaning up netns ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:41.113093 env[1058]: 2024-02-12 20:26:41.051 [INFO][2682] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" iface="eth0" netns="" Feb 12 20:26:41.113093 env[1058]: 2024-02-12 20:26:41.051 [INFO][2682] k8s.go 585: Releasing IP address(es) ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:41.113093 env[1058]: 2024-02-12 20:26:41.051 [INFO][2682] utils.go 188: Calico CNI releasing IP address ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:41.113093 env[1058]: 2024-02-12 20:26:41.076 [INFO][2689] ipam_plugin.go 415: Releasing address using handleID ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" HandleID="k8s-pod-network.a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Workload="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:41.113093 env[1058]: 2024-02-12 20:26:41.076 [INFO][2689] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:41.113093 env[1058]: 2024-02-12 20:26:41.076 [INFO][2689] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:41.113093 env[1058]: 2024-02-12 20:26:41.105 [WARNING][2689] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" HandleID="k8s-pod-network.a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Workload="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:41.113093 env[1058]: 2024-02-12 20:26:41.106 [INFO][2689] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" HandleID="k8s-pod-network.a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Workload="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:41.113093 env[1058]: 2024-02-12 20:26:41.109 [INFO][2689] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:41.113093 env[1058]: 2024-02-12 20:26:41.111 [INFO][2682] k8s.go 591: Teardown processing complete. ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:41.114485 env[1058]: time="2024-02-12T20:26:41.114424761Z" level=info msg="TearDown network for sandbox \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\" successfully" Feb 12 20:26:41.114717 env[1058]: time="2024-02-12T20:26:41.114638602Z" level=info msg="StopPodSandbox for \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\" returns successfully" Feb 12 20:26:41.115458 env[1058]: time="2024-02-12T20:26:41.115411601Z" level=info msg="RemovePodSandbox for \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\"" Feb 12 20:26:41.115684 env[1058]: time="2024-02-12T20:26:41.115605465Z" level=info msg="Forcibly stopping sandbox \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\"" Feb 12 20:26:41.254786 env[1058]: 2024-02-12 20:26:41.174 [WARNING][2710] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150-k8s-csi--node--driver--vdblc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"3156e51a-eccc-4b8f-ab23-6038b0834945", ResourceVersion:"1186", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 25, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.150", ContainerID:"001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c", Pod:"csi-node-driver-vdblc", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid644a849803", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:41.254786 env[1058]: 2024-02-12 20:26:41.174 [INFO][2710] k8s.go 578: Cleaning up netns ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:41.254786 env[1058]: 2024-02-12 20:26:41.174 [INFO][2710] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" iface="eth0" netns="" Feb 12 20:26:41.254786 env[1058]: 2024-02-12 20:26:41.174 [INFO][2710] k8s.go 585: Releasing IP address(es) ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:41.254786 env[1058]: 2024-02-12 20:26:41.174 [INFO][2710] utils.go 188: Calico CNI releasing IP address ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:41.254786 env[1058]: 2024-02-12 20:26:41.224 [INFO][2716] ipam_plugin.go 415: Releasing address using handleID ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" HandleID="k8s-pod-network.a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Workload="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:41.254786 env[1058]: 2024-02-12 20:26:41.224 [INFO][2716] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:41.254786 env[1058]: 2024-02-12 20:26:41.224 [INFO][2716] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:41.254786 env[1058]: 2024-02-12 20:26:41.243 [WARNING][2716] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" HandleID="k8s-pod-network.a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Workload="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:41.254786 env[1058]: 2024-02-12 20:26:41.243 [INFO][2716] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" HandleID="k8s-pod-network.a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Workload="172.24.4.150-k8s-csi--node--driver--vdblc-eth0" Feb 12 20:26:41.254786 env[1058]: 2024-02-12 20:26:41.248 [INFO][2716] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:41.254786 env[1058]: 2024-02-12 20:26:41.251 [INFO][2710] k8s.go 591: Teardown processing complete. ContainerID="a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59" Feb 12 20:26:41.258116 env[1058]: time="2024-02-12T20:26:41.258048142Z" level=info msg="TearDown network for sandbox \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\" successfully" Feb 12 20:26:41.263217 env[1058]: time="2024-02-12T20:26:41.263149839Z" level=info msg="RemovePodSandbox \"a5b4b87bcbf3f69139b8e271530d9ad638c44425418aae1b879b23662a07aa59\" returns successfully" Feb 12 20:26:41.723033 kubelet[1380]: E0212 20:26:41.722892 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:42.723816 kubelet[1380]: E0212 20:26:42.723690 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:43.428811 env[1058]: time="2024-02-12T20:26:43.428608584Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:43.436900 env[1058]: time="2024-02-12T20:26:43.436819703Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:43.441052 env[1058]: time="2024-02-12T20:26:43.440904944Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:43.446060 env[1058]: time="2024-02-12T20:26:43.445755311Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:43.448229 env[1058]: time="2024-02-12T20:26:43.448114455Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 20:26:43.454026 env[1058]: time="2024-02-12T20:26:43.453914612Z" level=info msg="CreateContainer within sandbox \"001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 20:26:43.503042 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount295545394.mount: Deactivated successfully. Feb 12 20:26:43.518052 env[1058]: time="2024-02-12T20:26:43.517885660Z" level=info msg="CreateContainer within sandbox \"001af52ed096e10582dc74531e8302fdc38ed790295ac3eb6d6c4abe4c61604c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"0b1160aca8fc960e10b8afd283bcf3fee517c2caafe91119150379eb417e3309\"" Feb 12 20:26:43.519837 env[1058]: time="2024-02-12T20:26:43.519773590Z" level=info msg="StartContainer for \"0b1160aca8fc960e10b8afd283bcf3fee517c2caafe91119150379eb417e3309\"" Feb 12 20:26:43.580367 systemd[1]: run-containerd-runc-k8s.io-0b1160aca8fc960e10b8afd283bcf3fee517c2caafe91119150379eb417e3309-runc.BhKfAx.mount: Deactivated successfully. Feb 12 20:26:43.585137 systemd[1]: Started cri-containerd-0b1160aca8fc960e10b8afd283bcf3fee517c2caafe91119150379eb417e3309.scope. Feb 12 20:26:43.612688 kernel: kauditd_printk_skb: 90 callbacks suppressed Feb 12 20:26:43.612853 kernel: audit: type=1400 audit(1707769603.606:772): avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.606000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.606000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff1e16216a8 items=0 ppid=2479 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:43.618954 kernel: audit: type=1300 audit(1707769603.606:772): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff1e16216a8 items=0 ppid=2479 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:43.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062313136306163613866633936306531306238616664323833626366 Feb 12 20:26:43.606000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.631980 kernel: audit: type=1327 audit(1707769603.606:772): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062313136306163613866633936306531306238616664323833626366 Feb 12 20:26:43.632179 kernel: audit: type=1400 audit(1707769603.606:773): avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.632209 kernel: audit: type=1400 audit(1707769603.606:773): avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.632233 kernel: audit: type=1400 audit(1707769603.606:773): avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.606000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.606000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.606000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.640971 kernel: audit: type=1400 audit(1707769603.606:773): avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.606000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.646653 kernel: audit: type=1400 audit(1707769603.606:773): avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.646762 kernel: audit: type=1400 audit(1707769603.606:773): avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.606000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.606000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.606000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.606000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.606000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.606000 audit: BPF prog-id=103 op=LOAD Feb 12 20:26:43.606000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003ea298 items=0 ppid=2479 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:43.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062313136306163613866633936306531306238616664323833626366 Feb 12 20:26:43.611000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.611000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.611000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.611000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.654963 kernel: audit: type=1400 audit(1707769603.606:773): avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.611000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.611000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.611000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.611000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.611000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.611000 audit: BPF prog-id=104 op=LOAD Feb 12 20:26:43.611000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000219128 items=0 ppid=2479 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:43.611000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062313136306163613866633936306531306238616664323833626366 Feb 12 20:26:43.611000 audit: BPF prog-id=104 op=UNLOAD Feb 12 20:26:43.612000 audit: BPF prog-id=103 op=UNLOAD Feb 12 20:26:43.612000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.612000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.612000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.612000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.612000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.612000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.612000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.612000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.612000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.612000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:43.612000 audit: BPF prog-id=105 op=LOAD Feb 12 20:26:43.612000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002191b8 items=0 ppid=2479 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:43.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062313136306163613866633936306531306238616664323833626366 Feb 12 20:26:43.667777 env[1058]: time="2024-02-12T20:26:43.667661422Z" level=info msg="StartContainer for \"0b1160aca8fc960e10b8afd283bcf3fee517c2caafe91119150379eb417e3309\" returns successfully" Feb 12 20:26:43.724972 kubelet[1380]: E0212 20:26:43.724764 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:43.838560 kubelet[1380]: I0212 20:26:43.838524 1380 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 20:26:43.839825 kubelet[1380]: I0212 20:26:43.839762 1380 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 20:26:44.317854 kubelet[1380]: I0212 20:26:44.317702 1380 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-vdblc" podStartSLOduration=-9.223371985537207e+09 pod.CreationTimestamp="2024-02-12 20:25:53 +0000 UTC" firstStartedPulling="2024-02-12 20:26:35.153565753 +0000 UTC m=+55.670265300" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:26:44.317253006 +0000 UTC m=+64.833952683" watchObservedRunningTime="2024-02-12 20:26:44.317568367 +0000 UTC m=+64.834267955" Feb 12 20:26:44.726175 kubelet[1380]: E0212 20:26:44.725874 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:45.727815 kubelet[1380]: E0212 20:26:45.727751 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:46.729787 kubelet[1380]: E0212 20:26:46.729551 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:47.411000 audit[2794]: NETFILTER_CFG table=filter:88 family=2 entries=18 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:47.411000 audit[2794]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffc1f990980 a2=0 a3=7ffc1f99096c items=0 ppid=1658 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:47.416000 audit[2794]: NETFILTER_CFG table=nat:89 family=2 entries=94 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:47.416000 audit[2794]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffc1f990980 a2=0 a3=7ffc1f99096c items=0 ppid=1658 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:47.500000 audit[2820]: NETFILTER_CFG table=filter:90 family=2 entries=30 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:47.500000 audit[2820]: SYSCALL arch=c000003e syscall=46 success=yes exit=10364 a0=3 a1=7ffec598bd70 a2=0 a3=7ffec598bd5c items=0 ppid=1658 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.500000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:47.502000 audit[2820]: NETFILTER_CFG table=nat:91 family=2 entries=94 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:47.502000 audit[2820]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffec598bd70 a2=0 a3=7ffec598bd5c items=0 ppid=1658 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:47.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:47.731358 kubelet[1380]: E0212 20:26:47.731106 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:47.742495 kubelet[1380]: I0212 20:26:47.742429 1380 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:26:47.756754 systemd[1]: Created slice kubepods-besteffort-pod065fb126_bb8a_465c_983c_0d80421116bd.slice. Feb 12 20:26:47.792985 kubelet[1380]: I0212 20:26:47.792856 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/065fb126-bb8a-465c-983c-0d80421116bd-data\") pod \"nfs-server-provisioner-0\" (UID: \"065fb126-bb8a-465c-983c-0d80421116bd\") " pod="default/nfs-server-provisioner-0" Feb 12 20:26:47.793248 kubelet[1380]: I0212 20:26:47.793014 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-drz9w\" (UniqueName: \"kubernetes.io/projected/065fb126-bb8a-465c-983c-0d80421116bd-kube-api-access-drz9w\") pod \"nfs-server-provisioner-0\" (UID: \"065fb126-bb8a-465c-983c-0d80421116bd\") " pod="default/nfs-server-provisioner-0" Feb 12 20:26:48.066450 env[1058]: time="2024-02-12T20:26:48.066291019Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:065fb126-bb8a-465c-983c-0d80421116bd,Namespace:default,Attempt:0,}" Feb 12 20:26:48.389658 systemd-networkd[959]: cali60e51b789ff: Link UP Feb 12 20:26:48.397007 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:26:48.397442 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 20:26:48.397723 systemd-networkd[959]: cali60e51b789ff: Gained carrier Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.221 [INFO][2822] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.150-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 065fb126-bb8a-465c-983c-0d80421116bd 1246 0 2024-02-12 20:26:47 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 172.24.4.150 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.150-k8s-nfs--server--provisioner--0-" Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.222 [INFO][2822] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.150-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.300 [INFO][2834] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" HandleID="k8s-pod-network.2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" Workload="172.24.4.150-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.327 [INFO][2834] ipam_plugin.go 268: Auto assigning IP ContainerID="2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" HandleID="k8s-pod-network.2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" Workload="172.24.4.150-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290bc0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.150", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 20:26:48.30089432 +0000 UTC"}, Hostname:"172.24.4.150", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.327 [INFO][2834] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.327 [INFO][2834] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.328 [INFO][2834] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.150' Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.331 [INFO][2834] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" host="172.24.4.150" Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.338 [INFO][2834] ipam.go 372: Looking up existing affinities for host host="172.24.4.150" Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.347 [INFO][2834] ipam.go 489: Trying affinity for 192.168.126.64/26 host="172.24.4.150" Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.351 [INFO][2834] ipam.go 155: Attempting to load block cidr=192.168.126.64/26 host="172.24.4.150" Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.355 [INFO][2834] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.64/26 host="172.24.4.150" Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.355 [INFO][2834] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.64/26 handle="k8s-pod-network.2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" host="172.24.4.150" Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.359 [INFO][2834] ipam.go 1682: Creating new handle: k8s-pod-network.2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32 Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.371 [INFO][2834] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.64/26 handle="k8s-pod-network.2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" host="172.24.4.150" Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.380 [INFO][2834] ipam.go 1216: Successfully claimed IPs: [192.168.126.67/26] block=192.168.126.64/26 handle="k8s-pod-network.2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" host="172.24.4.150" Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.380 [INFO][2834] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.67/26] handle="k8s-pod-network.2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" host="172.24.4.150" Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.381 [INFO][2834] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:26:48.420914 env[1058]: 2024-02-12 20:26:48.381 [INFO][2834] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.67/26] IPv6=[] ContainerID="2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" HandleID="k8s-pod-network.2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" Workload="172.24.4.150-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:48.424048 env[1058]: 2024-02-12 20:26:48.384 [INFO][2822] k8s.go 385: Populated endpoint ContainerID="2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.150-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"065fb126-bb8a-465c-983c-0d80421116bd", ResourceVersion:"1246", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 26, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.150", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.126.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:48.424048 env[1058]: 2024-02-12 20:26:48.385 [INFO][2822] k8s.go 386: Calico CNI using IPs: [192.168.126.67/32] ContainerID="2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.150-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:48.424048 env[1058]: 2024-02-12 20:26:48.385 [INFO][2822] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.150-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:48.424048 env[1058]: 2024-02-12 20:26:48.398 [INFO][2822] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.150-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:48.424719 env[1058]: 2024-02-12 20:26:48.400 [INFO][2822] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.150-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"065fb126-bb8a-465c-983c-0d80421116bd", ResourceVersion:"1246", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 26, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.150", ContainerID:"2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.126.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"52:82:47:5e:f8:90", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:26:48.424719 env[1058]: 2024-02-12 20:26:48.412 [INFO][2822] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="172.24.4.150-k8s-nfs--server--provisioner--0-eth0" Feb 12 20:26:48.460503 env[1058]: time="2024-02-12T20:26:48.460381862Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:26:48.460503 env[1058]: time="2024-02-12T20:26:48.460433489Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:26:48.460824 env[1058]: time="2024-02-12T20:26:48.460448257Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:26:48.460824 env[1058]: time="2024-02-12T20:26:48.460619087Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32 pid=2863 runtime=io.containerd.runc.v2 Feb 12 20:26:48.470000 audit[2874]: NETFILTER_CFG table=filter:92 family=2 entries=38 op=nft_register_chain pid=2874 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:26:48.470000 audit[2874]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffe657e7bd0 a2=0 a3=7ffe657e7bbc items=0 ppid=2214 pid=2874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:48.470000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:26:48.487042 systemd[1]: Started cri-containerd-2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32.scope. Feb 12 20:26:48.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.501000 audit: BPF prog-id=106 op=LOAD Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2863 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:48.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663030353331333631383061316637303338656235353764346131 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2863 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:48.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663030353331333631383061316637303338656235353764346131 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit: BPF prog-id=107 op=LOAD Feb 12 20:26:48.503000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000321a50 items=0 ppid=2863 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:48.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663030353331333631383061316637303338656235353764346131 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit: BPF prog-id=108 op=LOAD Feb 12 20:26:48.503000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000321a98 items=0 ppid=2863 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:48.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663030353331333631383061316637303338656235353764346131 Feb 12 20:26:48.503000 audit: BPF prog-id=108 op=UNLOAD Feb 12 20:26:48.503000 audit: BPF prog-id=107 op=UNLOAD Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { perfmon } for pid=2875 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit[2875]: AVC avc: denied { bpf } for pid=2875 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:48.503000 audit: BPF prog-id=109 op=LOAD Feb 12 20:26:48.503000 audit[2875]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000321ea8 items=0 ppid=2863 pid=2875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:48.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265663030353331333631383061316637303338656235353764346131 Feb 12 20:26:48.531723 env[1058]: time="2024-02-12T20:26:48.531666809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:065fb126-bb8a-465c-983c-0d80421116bd,Namespace:default,Attempt:0,} returns sandbox id \"2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32\"" Feb 12 20:26:48.533560 env[1058]: time="2024-02-12T20:26:48.533530865Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 20:26:48.734093 kubelet[1380]: E0212 20:26:48.731459 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:48.915873 systemd[1]: run-containerd-runc-k8s.io-2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32-runc.MXcPIZ.mount: Deactivated successfully. Feb 12 20:26:49.732140 kubelet[1380]: E0212 20:26:49.732059 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:50.238715 systemd-networkd[959]: cali60e51b789ff: Gained IPv6LL Feb 12 20:26:50.732397 kubelet[1380]: E0212 20:26:50.732281 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:51.732838 kubelet[1380]: E0212 20:26:51.732758 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:52.733019 kubelet[1380]: E0212 20:26:52.732956 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:52.876880 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1354366392.mount: Deactivated successfully. Feb 12 20:26:53.733692 kubelet[1380]: E0212 20:26:53.733591 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:54.734032 kubelet[1380]: E0212 20:26:54.733952 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:55.734768 kubelet[1380]: E0212 20:26:55.734649 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:56.183535 env[1058]: time="2024-02-12T20:26:56.183416821Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:56.188013 env[1058]: time="2024-02-12T20:26:56.187904409Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:56.192487 env[1058]: time="2024-02-12T20:26:56.192414358Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:56.196732 env[1058]: time="2024-02-12T20:26:56.196676459Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:26:56.199133 env[1058]: time="2024-02-12T20:26:56.199059806Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 12 20:26:56.205060 env[1058]: time="2024-02-12T20:26:56.205010702Z" level=info msg="CreateContainer within sandbox \"2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 20:26:56.233711 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1941403922.mount: Deactivated successfully. Feb 12 20:26:56.249144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2894579037.mount: Deactivated successfully. Feb 12 20:26:56.271671 env[1058]: time="2024-02-12T20:26:56.271551740Z" level=info msg="CreateContainer within sandbox \"2ef0053136180a1f7038eb557d4a13711bcf8fa2875d6fcfc3807db7e045ff32\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"f0e4fc5c31f619cf1de9d1fca57aa120887a9fd3a06c0e99ebbfce07a57a1747\"" Feb 12 20:26:56.273328 env[1058]: time="2024-02-12T20:26:56.273277153Z" level=info msg="StartContainer for \"f0e4fc5c31f619cf1de9d1fca57aa120887a9fd3a06c0e99ebbfce07a57a1747\"" Feb 12 20:26:56.322025 systemd[1]: Started cri-containerd-f0e4fc5c31f619cf1de9d1fca57aa120887a9fd3a06c0e99ebbfce07a57a1747.scope. Feb 12 20:26:56.346379 kernel: kauditd_printk_skb: 105 callbacks suppressed Feb 12 20:26:56.346508 kernel: audit: type=1400 audit(1707769616.340:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.346538 kernel: audit: type=1400 audit(1707769616.340:802): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.353128 kernel: audit: type=1400 audit(1707769616.340:803): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.353186 kernel: audit: type=1400 audit(1707769616.340:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.356160 kernel: audit: type=1400 audit(1707769616.340:805): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.360533 kernel: audit: type=1400 audit(1707769616.340:806): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.363117 kernel: audit: type=1400 audit(1707769616.340:807): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.367998 kernel: audit: type=1400 audit(1707769616.340:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.371133 kernel: audit: type=1400 audit(1707769616.340:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.379983 kernel: audit: type=1400 audit(1707769616.345:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.345000 audit: BPF prog-id=110 op=LOAD Feb 12 20:26:56.351000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.351000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2863 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:56.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630653466633563333166363139636631646539643166636135376161 Feb 12 20:26:56.351000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.351000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2863 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:56.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630653466633563333166363139636631646539643166636135376161 Feb 12 20:26:56.351000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.351000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.351000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.351000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.351000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.351000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.351000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.351000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.351000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.351000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.351000 audit: BPF prog-id=111 op=LOAD Feb 12 20:26:56.351000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ca720 items=0 ppid=2863 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:56.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630653466633563333166363139636631646539643166636135376161 Feb 12 20:26:56.352000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.352000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.352000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.352000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.352000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.352000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.352000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.352000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.352000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.352000 audit: BPF prog-id=112 op=LOAD Feb 12 20:26:56.352000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ca768 items=0 ppid=2863 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:56.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630653466633563333166363139636631646539643166636135376161 Feb 12 20:26:56.362000 audit: BPF prog-id=112 op=UNLOAD Feb 12 20:26:56.362000 audit: BPF prog-id=111 op=UNLOAD Feb 12 20:26:56.362000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.362000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.362000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.362000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.362000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.362000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.362000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.362000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.362000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.362000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:26:56.362000 audit: BPF prog-id=113 op=LOAD Feb 12 20:26:56.362000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cab78 items=0 ppid=2863 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:56.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630653466633563333166363139636631646539643166636135376161 Feb 12 20:26:56.438766 env[1058]: time="2024-02-12T20:26:56.438617969Z" level=info msg="StartContainer for \"f0e4fc5c31f619cf1de9d1fca57aa120887a9fd3a06c0e99ebbfce07a57a1747\" returns successfully" Feb 12 20:26:56.452000 audit[2942]: AVC avc: denied { search } for pid=2942 comm="rpcbind" name="crypto" dev="proc" ino=22371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c491,c946 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 20:26:56.452000 audit[2942]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fc1a76fd0c0 a2=0 a3=0 items=0 ppid=2924 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c491,c946 key=(null) Feb 12 20:26:56.452000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 20:26:56.491193 kubelet[1380]: I0212 20:26:56.491147 1380 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.223372027363697e+09 pod.CreationTimestamp="2024-02-12 20:26:47 +0000 UTC" firstStartedPulling="2024-02-12 20:26:48.533077394 +0000 UTC m=+69.049776942" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:26:56.488592576 +0000 UTC m=+77.005292113" watchObservedRunningTime="2024-02-12 20:26:56.491079209 +0000 UTC m=+77.007778746" Feb 12 20:26:56.561000 audit[2972]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:56.561000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffea004bf00 a2=0 a3=7ffea004beec items=0 ppid=1658 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:56.561000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:56.566000 audit[2972]: NETFILTER_CFG table=nat:94 family=2 entries=178 op=nft_register_chain pid=2972 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 20:26:56.566000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=72324 a0=3 a1=7ffea004bf00 a2=0 a3=7ffea004beec items=0 ppid=1658 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:26:56.566000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 20:26:56.602000 audit[2974]: AVC avc: denied { search } for pid=2974 comm="dbus-daemon" name="crypto" dev="proc" ino=22371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c491,c946 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 20:26:56.602000 audit[2974]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fbabe7510c0 a2=0 a3=0 items=0 ppid=2924 pid=2974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c491,c946 key=(null) Feb 12 20:26:56.602000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 20:26:56.610000 audit[2975]: AVC avc: denied { watch } for pid=2975 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538068 scontext=system_u:system_r:svirt_lxc_net_t:s0:c491,c946 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c491,c946 tclass=dir permissive=0 Feb 12 20:26:56.610000 audit[2975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=55f5a33ef7e0 a2=2c8 a3=7fff5e96952c items=0 ppid=2924 pid=2975 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c491,c946 key=(null) Feb 12 20:26:56.610000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 20:26:56.653000 audit[2976]: AVC avc: denied { read } for pid=2976 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=23563 scontext=system_u:system_r:svirt_lxc_net_t:s0:c491,c946 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 20:26:56.653000 audit[2976]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7fd7c40d3320 a1=80000 a2=d a3=7ffc282c1d10 items=0 ppid=2924 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c491,c946 key=(null) Feb 12 20:26:56.653000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 20:26:56.656000 audit[2976]: AVC avc: denied { search } for pid=2976 comm="ganesha.nfsd" name="crypto" dev="proc" ino=22371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c491,c946 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 20:26:56.656000 audit[2976]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fd7c36270c0 a2=0 a3=0 items=0 ppid=2924 pid=2976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c491,c946 key=(null) Feb 12 20:26:56.656000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 20:26:56.736061 kubelet[1380]: E0212 20:26:56.735839 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:57.736772 kubelet[1380]: E0212 20:26:57.736692 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:58.737528 kubelet[1380]: E0212 20:26:58.737437 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:26:59.737778 kubelet[1380]: E0212 20:26:59.737695 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:00.670177 kubelet[1380]: E0212 20:27:00.670080 1380 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:00.739864 kubelet[1380]: E0212 20:27:00.739759 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:01.740087 kubelet[1380]: E0212 20:27:01.739992 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:01.961401 systemd[1]: run-containerd-runc-k8s.io-f514fad9d1aa78e50c4b0490944dbe5cd0aca9e715cd44de158f0b6edbcb2774-runc.RIvVQc.mount: Deactivated successfully. Feb 12 20:27:02.741144 kubelet[1380]: E0212 20:27:02.741076 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:03.743140 kubelet[1380]: E0212 20:27:03.743050 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:04.743973 kubelet[1380]: E0212 20:27:04.743785 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:05.744509 kubelet[1380]: E0212 20:27:05.744423 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:06.744847 kubelet[1380]: E0212 20:27:06.744727 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:07.747289 kubelet[1380]: E0212 20:27:07.747217 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:08.749010 kubelet[1380]: E0212 20:27:08.748907 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:09.749322 kubelet[1380]: E0212 20:27:09.749181 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:10.750309 kubelet[1380]: E0212 20:27:10.750182 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:11.751250 kubelet[1380]: E0212 20:27:11.751104 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:12.751505 kubelet[1380]: E0212 20:27:12.751372 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:13.751719 kubelet[1380]: E0212 20:27:13.751630 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:14.753536 kubelet[1380]: E0212 20:27:14.753424 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:15.754895 kubelet[1380]: E0212 20:27:15.754836 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:16.756842 kubelet[1380]: E0212 20:27:16.756765 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:17.758109 kubelet[1380]: E0212 20:27:17.758028 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:18.758977 kubelet[1380]: E0212 20:27:18.758792 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:19.760039 kubelet[1380]: E0212 20:27:19.759906 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:20.669987 kubelet[1380]: E0212 20:27:20.669886 1380 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:20.760266 kubelet[1380]: E0212 20:27:20.760158 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:20.875461 kubelet[1380]: I0212 20:27:20.875284 1380 topology_manager.go:210] "Topology Admit Handler" Feb 12 20:27:20.890708 systemd[1]: Created slice kubepods-besteffort-pod7b0e3b5f_09ef_4a69_9058_db9c5126f736.slice. Feb 12 20:27:21.061399 kubelet[1380]: I0212 20:27:21.061324 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dmc5w\" (UniqueName: \"kubernetes.io/projected/7b0e3b5f-09ef-4a69-9058-db9c5126f736-kube-api-access-dmc5w\") pod \"test-pod-1\" (UID: \"7b0e3b5f-09ef-4a69-9058-db9c5126f736\") " pod="default/test-pod-1" Feb 12 20:27:21.062492 kubelet[1380]: I0212 20:27:21.062424 1380 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-69f48cc4-cdca-40d1-bbe7-4d1001fdca64\" (UniqueName: \"kubernetes.io/nfs/7b0e3b5f-09ef-4a69-9058-db9c5126f736-pvc-69f48cc4-cdca-40d1-bbe7-4d1001fdca64\") pod \"test-pod-1\" (UID: \"7b0e3b5f-09ef-4a69-9058-db9c5126f736\") " pod="default/test-pod-1" Feb 12 20:27:21.241265 kernel: Failed to create system directory netfs Feb 12 20:27:21.241559 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 12 20:27:21.241621 kernel: audit: type=1400 audit(1707769641.229:826): avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.229000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.256039 kernel: Failed to create system directory netfs Feb 12 20:27:21.256169 kernel: audit: type=1400 audit(1707769641.229:826): avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.229000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.271605 kernel: Failed to create system directory netfs Feb 12 20:27:21.271754 kernel: audit: type=1400 audit(1707769641.229:826): avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.271812 kernel: Failed to create system directory netfs Feb 12 20:27:21.271858 kernel: audit: type=1400 audit(1707769641.229:826): avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.229000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.229000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.229000 audit[3033]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55be8ff695e0 a1=153bc a2=55be8f5682b0 a3=5 items=0 ppid=50 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:21.293590 kernel: audit: type=1300 audit(1707769641.229:826): arch=c000003e syscall=175 success=yes exit=0 a0=55be8ff695e0 a1=153bc a2=55be8f5682b0 a3=5 items=0 ppid=50 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:21.293659 kernel: audit: type=1327 audit(1707769641.229:826): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 20:27:21.229000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.317614 kernel: Failed to create system directory fscache Feb 12 20:27:21.317674 kernel: audit: type=1400 audit(1707769641.300:827): avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.317706 kernel: Failed to create system directory fscache Feb 12 20:27:21.317728 kernel: Failed to create system directory fscache Feb 12 20:27:21.317748 kernel: Failed to create system directory fscache Feb 12 20:27:21.320072 kernel: audit: type=1400 audit(1707769641.300:827): avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.320130 kernel: Failed to create system directory fscache Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.324860 kernel: audit: type=1400 audit(1707769641.300:827): avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.324909 kernel: Failed to create system directory fscache Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.329556 kernel: audit: type=1400 audit(1707769641.300:827): avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.329601 kernel: Failed to create system directory fscache Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.335547 kernel: Failed to create system directory fscache Feb 12 20:27:21.335593 kernel: Failed to create system directory fscache Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.337494 kernel: Failed to create system directory fscache Feb 12 20:27:21.337538 kernel: Failed to create system directory fscache Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.339455 kernel: Failed to create system directory fscache Feb 12 20:27:21.339514 kernel: Failed to create system directory fscache Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.300000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.342021 kernel: Failed to create system directory fscache Feb 12 20:27:21.344971 kernel: FS-Cache: Loaded Feb 12 20:27:21.300000 audit[3033]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55be9017e9c0 a1=4c0fc a2=55be8f5682b0 a3=5 items=0 ppid=50 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:21.300000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.391148 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.391232 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.391315 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.393328 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.393388 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.395464 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.396685 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.399677 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.399743 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.399789 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.402243 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.402294 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.404713 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.404778 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.406920 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.406995 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.408996 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.409066 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.411185 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.411258 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.413314 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.413438 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.415509 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.415593 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.417656 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.417726 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.419912 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.419998 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.422090 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.422170 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.424136 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.424209 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.426284 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.426360 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.428347 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.428482 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.430466 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.430551 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.432671 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.432753 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.435030 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.435166 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.435882 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.436853 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.437788 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.438720 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.439669 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.440622 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.441561 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.442507 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.443449 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.444410 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.445346 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.446285 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.447241 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.448199 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.449172 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.450083 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.451983 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.452111 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.452885 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.453836 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.454778 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.455723 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.456677 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.457616 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.458594 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.459508 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.460479 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.461413 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.462358 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.463310 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.464256 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.465223 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.466168 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.467104 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.468068 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.470202 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.470343 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.470873 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.471809 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.472766 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.473710 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.474646 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.475597 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.476547 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.477501 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.478442 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.479446 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.480321 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.481274 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.482222 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.483169 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.484112 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.485075 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.486983 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.487070 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.487870 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.488828 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.489765 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.490707 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.491646 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.492611 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.493553 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.494482 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.495415 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.496478 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.497365 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.498342 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.499239 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.500187 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.501144 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.502090 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.504011 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.504132 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.504898 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.505851 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.506795 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.507746 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.508713 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.510952 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.511044 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.513269 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.513331 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.515589 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.515649 kernel: Failed to create system directory sunrpc Feb 12 20:27:21.372000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.527781 kernel: RPC: Registered named UNIX socket transport module. Feb 12 20:27:21.527880 kernel: RPC: Registered udp transport module. Feb 12 20:27:21.527980 kernel: RPC: Registered tcp transport module. Feb 12 20:27:21.528917 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 20:27:21.372000 audit[3033]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55be901caad0 a1=1588c4 a2=55be8f5682b0 a3=5 items=6 ppid=50 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:21.372000 audit: CWD cwd="/" Feb 12 20:27:21.372000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:21.372000 audit: PATH item=1 name=(null) inode=23866 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:21.372000 audit: PATH item=2 name=(null) inode=23866 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:21.372000 audit: PATH item=3 name=(null) inode=23867 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:21.372000 audit: PATH item=4 name=(null) inode=23866 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:21.372000 audit: PATH item=5 name=(null) inode=23868 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 20:27:21.372000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.585250 kernel: Failed to create system directory nfs Feb 12 20:27:21.585432 kernel: Failed to create system directory nfs Feb 12 20:27:21.585487 kernel: Failed to create system directory nfs Feb 12 20:27:21.585522 kernel: Failed to create system directory nfs Feb 12 20:27:21.585558 kernel: Failed to create system directory nfs Feb 12 20:27:21.585593 kernel: Failed to create system directory nfs Feb 12 20:27:21.585628 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.587029 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.587597 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.588916 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.591430 kernel: Failed to create system directory nfs Feb 12 20:27:21.591530 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.597959 kernel: Failed to create system directory nfs Feb 12 20:27:21.598040 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.600186 kernel: Failed to create system directory nfs Feb 12 20:27:21.600236 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.602437 kernel: Failed to create system directory nfs Feb 12 20:27:21.602488 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.604644 kernel: Failed to create system directory nfs Feb 12 20:27:21.604694 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.606822 kernel: Failed to create system directory nfs Feb 12 20:27:21.606871 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.610124 kernel: Failed to create system directory nfs Feb 12 20:27:21.610186 kernel: Failed to create system directory nfs Feb 12 20:27:21.610253 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.612253 kernel: Failed to create system directory nfs Feb 12 20:27:21.612346 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.613534 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.615584 kernel: Failed to create system directory nfs Feb 12 20:27:21.615706 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.616756 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.618996 kernel: Failed to create system directory nfs Feb 12 20:27:21.619099 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.621238 kernel: Failed to create system directory nfs Feb 12 20:27:21.621325 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.623330 kernel: Failed to create system directory nfs Feb 12 20:27:21.623391 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.625423 kernel: Failed to create system directory nfs Feb 12 20:27:21.625473 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.627509 kernel: Failed to create system directory nfs Feb 12 20:27:21.627596 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.629626 kernel: Failed to create system directory nfs Feb 12 20:27:21.629686 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.631734 kernel: Failed to create system directory nfs Feb 12 20:27:21.631824 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.633825 kernel: Failed to create system directory nfs Feb 12 20:27:21.633876 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.635829 kernel: Failed to create system directory nfs Feb 12 20:27:21.635886 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.637956 kernel: Failed to create system directory nfs Feb 12 20:27:21.638057 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.639963 kernel: Failed to create system directory nfs Feb 12 20:27:21.640011 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.641015 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.643100 kernel: Failed to create system directory nfs Feb 12 20:27:21.643193 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.645167 kernel: Failed to create system directory nfs Feb 12 20:27:21.645254 kernel: Failed to create system directory nfs Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.564000 audit[3033]: AVC avc: denied { confidentiality } for pid=3033 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.647173 kernel: Failed to create system directory nfs Feb 12 20:27:21.664798 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 20:27:21.564000 audit[3033]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55be9036d680 a1=e29dc a2=55be8f5682b0 a3=5 items=0 ppid=50 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:21.564000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.725671 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.725840 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.725894 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.726502 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.727361 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.728255 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.729190 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.730104 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.732088 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.732217 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.734067 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.734191 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.734899 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.735823 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.736751 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.738690 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.738826 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.739539 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.740475 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.741382 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.742312 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.743249 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.744197 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.745167 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.746130 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.747085 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.749012 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.749157 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.750034 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.750857 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.751829 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.752789 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.753739 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.754870 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.755866 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.756842 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.758842 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.759001 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.759851 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.761062 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.761259 kubelet[1380]: E0212 20:27:21.760974 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:21.762224 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.762910 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.763859 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.764841 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.765778 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.766719 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.767667 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.768676 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.769569 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.770559 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.771689 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.772469 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.773424 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.774375 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.775330 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.776402 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.777610 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.778697 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.779679 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.780741 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.781865 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.782812 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.783695 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.784608 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.785554 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.786506 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.787397 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.788281 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.789288 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.790133 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.791076 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.792864 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.793050 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.793823 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.795267 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.795673 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.796614 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.797890 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.799077 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.800227 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.801361 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.802392 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.803401 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.804293 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.805248 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.806153 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.807071 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.808859 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.809001 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.809789 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.810671 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.811614 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.812524 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.813485 kernel: Failed to create system directory nfs4 Feb 12 20:27:21.704000 audit[3038]: AVC avc: denied { confidentiality } for pid=3038 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:21.990093 kernel: NFS: Registering the id_resolver key type Feb 12 20:27:21.990304 kernel: Key type id_resolver registered Feb 12 20:27:21.990368 kernel: Key type id_legacy registered Feb 12 20:27:21.704000 audit[3038]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fa3df863010 a1=1d3cc4 a2=5576d98962b0 a3=5 items=0 ppid=50 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:21.704000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.009367 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.009418 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.010556 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.011691 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.012763 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.013880 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.016050 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.016089 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.017120 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.018162 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.019200 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.020250 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.021363 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.022469 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.023535 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.024618 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.025736 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.026892 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.029010 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.029044 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.030129 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.031162 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.032204 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.033313 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.034397 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.035481 kernel: Failed to create system directory rpcgss Feb 12 20:27:22.001000 audit[3040]: AVC avc: denied { confidentiality } for pid=3040 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 20:27:22.001000 audit[3040]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f396bfb8010 a1=4f524 a2=563371ee42b0 a3=5 items=0 ppid=50 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:22.001000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 20:27:22.087892 nfsidmap[3046]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Feb 12 20:27:22.096070 nfsidmap[3047]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain 'novalocal' Feb 12 20:27:22.112000 audit[1122]: AVC avc: denied { watch_reads } for pid=1122 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:27:22.112000 audit[1122]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5600c920bd70 a2=10 a3=58fb647d76a583ad items=0 ppid=1 pid=1122 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:22.112000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 20:27:22.112000 audit[1122]: AVC avc: denied { watch_reads } for pid=1122 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:27:22.112000 audit[1122]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5600c920bd70 a2=10 a3=58fb647d76a583ad items=0 ppid=1 pid=1122 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:22.112000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 20:27:22.112000 audit[1122]: AVC avc: denied { watch_reads } for pid=1122 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:27:22.112000 audit[1122]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=5600c920bd70 a2=10 a3=58fb647d76a583ad items=0 ppid=1 pid=1122 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:22.112000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 20:27:22.114000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:27:22.114000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:27:22.114000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2400 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 20:27:22.398785 env[1058]: time="2024-02-12T20:27:22.398661283Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:7b0e3b5f-09ef-4a69-9058-db9c5126f736,Namespace:default,Attempt:0,}" Feb 12 20:27:22.715568 systemd-networkd[959]: cali5ec59c6bf6e: Link UP Feb 12 20:27:22.723154 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 20:27:22.723325 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 20:27:22.722741 systemd-networkd[959]: cali5ec59c6bf6e: Gained carrier Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.533 [INFO][3050] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {172.24.4.150-k8s-test--pod--1-eth0 default 7b0e3b5f-09ef-4a69-9058-db9c5126f736 1353 0 2024-02-12 20:26:50 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 172.24.4.150 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.150-k8s-test--pod--1-" Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.533 [INFO][3050] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.150-k8s-test--pod--1-eth0" Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.598 [INFO][3061] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" HandleID="k8s-pod-network.dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" Workload="172.24.4.150-k8s-test--pod--1-eth0" Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.624 [INFO][3061] ipam_plugin.go 268: Auto assigning IP ContainerID="dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" HandleID="k8s-pod-network.dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" Workload="172.24.4.150-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000292be0), Attrs:map[string]string{"namespace":"default", "node":"172.24.4.150", "pod":"test-pod-1", "timestamp":"2024-02-12 20:27:22.598408146 +0000 UTC"}, Hostname:"172.24.4.150", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.624 [INFO][3061] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.625 [INFO][3061] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.625 [INFO][3061] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '172.24.4.150' Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.628 [INFO][3061] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" host="172.24.4.150" Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.636 [INFO][3061] ipam.go 372: Looking up existing affinities for host host="172.24.4.150" Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.646 [INFO][3061] ipam.go 489: Trying affinity for 192.168.126.64/26 host="172.24.4.150" Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.651 [INFO][3061] ipam.go 155: Attempting to load block cidr=192.168.126.64/26 host="172.24.4.150" Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.658 [INFO][3061] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.126.64/26 host="172.24.4.150" Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.659 [INFO][3061] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.126.64/26 handle="k8s-pod-network.dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" host="172.24.4.150" Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.663 [INFO][3061] ipam.go 1682: Creating new handle: k8s-pod-network.dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.675 [INFO][3061] ipam.go 1203: Writing block in order to claim IPs block=192.168.126.64/26 handle="k8s-pod-network.dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" host="172.24.4.150" Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.701 [INFO][3061] ipam.go 1216: Successfully claimed IPs: [192.168.126.68/26] block=192.168.126.64/26 handle="k8s-pod-network.dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" host="172.24.4.150" Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.701 [INFO][3061] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.126.68/26] handle="k8s-pod-network.dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" host="172.24.4.150" Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.701 [INFO][3061] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.702 [INFO][3061] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.126.68/26] IPv6=[] ContainerID="dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" HandleID="k8s-pod-network.dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" Workload="172.24.4.150-k8s-test--pod--1-eth0" Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.708 [INFO][3050] k8s.go 385: Populated endpoint ContainerID="dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.150-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"7b0e3b5f-09ef-4a69-9058-db9c5126f736", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 26, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.150", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:27:22.748204 env[1058]: 2024-02-12 20:27:22.708 [INFO][3050] k8s.go 386: Calico CNI using IPs: [192.168.126.68/32] ContainerID="dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.150-k8s-test--pod--1-eth0" Feb 12 20:27:22.750026 env[1058]: 2024-02-12 20:27:22.708 [INFO][3050] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.150-k8s-test--pod--1-eth0" Feb 12 20:27:22.750026 env[1058]: 2024-02-12 20:27:22.724 [INFO][3050] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.150-k8s-test--pod--1-eth0" Feb 12 20:27:22.750026 env[1058]: 2024-02-12 20:27:22.725 [INFO][3050] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.150-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"172.24.4.150-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"7b0e3b5f-09ef-4a69-9058-db9c5126f736", ResourceVersion:"1353", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 20, 26, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"172.24.4.150", ContainerID:"dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.126.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"92:62:76:e4:95:58", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 20:27:22.750026 env[1058]: 2024-02-12 20:27:22.734 [INFO][3050] k8s.go 491: Wrote updated endpoint to datastore ContainerID="dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="172.24.4.150-k8s-test--pod--1-eth0" Feb 12 20:27:22.761593 kubelet[1380]: E0212 20:27:22.761523 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:22.898460 env[1058]: time="2024-02-12T20:27:22.898195095Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 20:27:22.898460 env[1058]: time="2024-02-12T20:27:22.898290295Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 20:27:22.899000 env[1058]: time="2024-02-12T20:27:22.898370406Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 20:27:22.899982 env[1058]: time="2024-02-12T20:27:22.899731049Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b pid=3087 runtime=io.containerd.runc.v2 Feb 12 20:27:22.911000 audit[3099]: NETFILTER_CFG table=filter:95 family=2 entries=38 op=nft_register_chain pid=3099 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 20:27:22.911000 audit[3099]: SYSCALL arch=c000003e syscall=46 success=yes exit=19080 a0=3 a1=7fff1ada3dd0 a2=0 a3=7fff1ada3dbc items=0 ppid=2214 pid=3099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:22.911000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 20:27:22.958907 systemd[1]: run-containerd-runc-k8s.io-dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b-runc.mu6poL.mount: Deactivated successfully. Feb 12 20:27:22.969026 systemd[1]: Started cri-containerd-dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b.scope. Feb 12 20:27:22.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.980000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.980000 audit: BPF prog-id=114 op=LOAD Feb 12 20:27:22.983000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.983000 audit[3100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3087 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:22.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303339356138323761613361386636613666663337393662633532 Feb 12 20:27:22.983000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.983000 audit[3100]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3087 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:22.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303339356138323761613361386636613666663337393662633532 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit: BPF prog-id=115 op=LOAD Feb 12 20:27:22.984000 audit[3100]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000292fd0 items=0 ppid=3087 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:22.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303339356138323761613361386636613666663337393662633532 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.984000 audit: BPF prog-id=116 op=LOAD Feb 12 20:27:22.984000 audit[3100]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000293018 items=0 ppid=3087 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:22.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303339356138323761613361386636613666663337393662633532 Feb 12 20:27:22.985000 audit: BPF prog-id=116 op=UNLOAD Feb 12 20:27:22.985000 audit: BPF prog-id=115 op=UNLOAD Feb 12 20:27:22.986000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.986000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.986000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.986000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.986000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.986000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.986000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.986000 audit[3100]: AVC avc: denied { perfmon } for pid=3100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.986000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.986000 audit[3100]: AVC avc: denied { bpf } for pid=3100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:22.986000 audit: BPF prog-id=117 op=LOAD Feb 12 20:27:22.986000 audit[3100]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000293428 items=0 ppid=3087 pid=3100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:22.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463303339356138323761613361386636613666663337393662633532 Feb 12 20:27:23.017045 env[1058]: time="2024-02-12T20:27:23.016992997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:7b0e3b5f-09ef-4a69-9058-db9c5126f736,Namespace:default,Attempt:0,} returns sandbox id \"dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b\"" Feb 12 20:27:23.018709 env[1058]: time="2024-02-12T20:27:23.018649767Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 20:27:23.529604 env[1058]: time="2024-02-12T20:27:23.529495847Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:23.532886 env[1058]: time="2024-02-12T20:27:23.532829304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:23.536752 env[1058]: time="2024-02-12T20:27:23.536675488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:23.541000 env[1058]: time="2024-02-12T20:27:23.540896907Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 20:27:23.543821 env[1058]: time="2024-02-12T20:27:23.543750913Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 20:27:23.556909 env[1058]: time="2024-02-12T20:27:23.556827208Z" level=info msg="CreateContainer within sandbox \"dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 20:27:23.594006 env[1058]: time="2024-02-12T20:27:23.593852053Z" level=info msg="CreateContainer within sandbox \"dc0395a827aa3a8f6a6ff3796bc52cfe51aec11bcfe66856b750548dd9b07e3b\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"067c5a3152f3cd55f1de7d4d040dc63af08ecaa436c8b23228eb79e23ee4f8e7\"" Feb 12 20:27:23.596031 env[1058]: time="2024-02-12T20:27:23.595969511Z" level=info msg="StartContainer for \"067c5a3152f3cd55f1de7d4d040dc63af08ecaa436c8b23228eb79e23ee4f8e7\"" Feb 12 20:27:23.647440 systemd[1]: run-containerd-runc-k8s.io-067c5a3152f3cd55f1de7d4d040dc63af08ecaa436c8b23228eb79e23ee4f8e7-runc.YNFSpw.mount: Deactivated successfully. Feb 12 20:27:23.652995 systemd[1]: Started cri-containerd-067c5a3152f3cd55f1de7d4d040dc63af08ecaa436c8b23228eb79e23ee4f8e7.scope. Feb 12 20:27:23.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.663000 audit: BPF prog-id=118 op=LOAD Feb 12 20:27:23.664000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.664000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3087 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:23.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036376335613331353266336364353566316465376434643034306463 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3087 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036376335613331353266336364353566316465376434643034306463 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit: BPF prog-id=119 op=LOAD Feb 12 20:27:23.665000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020d8c0 items=0 ppid=3087 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036376335613331353266336364353566316465376434643034306463 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit: BPF prog-id=120 op=LOAD Feb 12 20:27:23.665000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020d908 items=0 ppid=3087 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036376335613331353266336364353566316465376434643034306463 Feb 12 20:27:23.665000 audit: BPF prog-id=120 op=UNLOAD Feb 12 20:27:23.665000 audit: BPF prog-id=119 op=UNLOAD Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { perfmon } for pid=3134 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit[3134]: AVC avc: denied { bpf } for pid=3134 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 20:27:23.665000 audit: BPF prog-id=121 op=LOAD Feb 12 20:27:23.665000 audit[3134]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00020dd18 items=0 ppid=3087 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 20:27:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036376335613331353266336364353566316465376434643034306463 Feb 12 20:27:23.688803 env[1058]: time="2024-02-12T20:27:23.688716583Z" level=info msg="StartContainer for \"067c5a3152f3cd55f1de7d4d040dc63af08ecaa436c8b23228eb79e23ee4f8e7\" returns successfully" Feb 12 20:27:23.762355 kubelet[1380]: E0212 20:27:23.762251 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:24.465568 systemd-networkd[959]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 20:27:24.605375 kubelet[1380]: I0212 20:27:24.605274 1380 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=-9.22337200224962e+09 pod.CreationTimestamp="2024-02-12 20:26:50 +0000 UTC" firstStartedPulling="2024-02-12 20:27:23.018353779 +0000 UTC m=+103.535053316" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 20:27:24.603845421 +0000 UTC m=+105.120545008" watchObservedRunningTime="2024-02-12 20:27:24.605154456 +0000 UTC m=+105.121854043" Feb 12 20:27:24.762989 kubelet[1380]: E0212 20:27:24.762709 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:25.763957 kubelet[1380]: E0212 20:27:25.763839 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:26.764025 kubelet[1380]: E0212 20:27:26.763979 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:27.765096 kubelet[1380]: E0212 20:27:27.764986 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:28.765649 kubelet[1380]: E0212 20:27:28.765553 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:29.766888 kubelet[1380]: E0212 20:27:29.766728 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:30.767122 kubelet[1380]: E0212 20:27:30.767011 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:31.768305 kubelet[1380]: E0212 20:27:31.768231 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:31.956388 systemd[1]: run-containerd-runc-k8s.io-f514fad9d1aa78e50c4b0490944dbe5cd0aca9e715cd44de158f0b6edbcb2774-runc.QYDBz5.mount: Deactivated successfully. Feb 12 20:27:32.769607 kubelet[1380]: E0212 20:27:32.769482 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:33.770246 kubelet[1380]: E0212 20:27:33.770098 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:34.770988 kubelet[1380]: E0212 20:27:34.770895 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:35.772789 kubelet[1380]: E0212 20:27:35.772736 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 20:27:36.774390 kubelet[1380]: E0212 20:27:36.774293 1380 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"